You were previously onsite at XYZ's facility to conduct a pre-deployment RF site survey. The WLAN has been deployed according to your recommendations and you are onsite again to perform a post-deployment validation survey.
When performing this type of post-deployment RF site survey voice over Wi-Fi, what is an action that must be performed?
A. Spectrum analysis to locate and identify RF interference sources.
B. Frequency-band hopping analysis to detect improper RF channel implementations.
C. Application analysis with an active phone call on an VoWiFi handset.
D. Protocol analysis to discover channel use on neighboring APs.
What authentication method is referenced in the 802.11-2016 and 802.11-2020 specifications and is recommended for robust WI-AN client security?
A. SSL
B. 802.1X/EAP
C. IPSec
D. WEP
What cipher suite is specified by the 802.11-2016 standard and is not deprecated?
A. Wired Equivalent Privacy
B. Temporal Key Integrity Protocol
C. Counter Mode with CBC-MAC Pro tocol
D. Extensible Authentication Protocol
When considering data rates available in HT and VHT PHY devices, in addition to the modulation, coding, channel width, and spatial streams, what impacts the data rate according to the MCS tables?
A. Frequency band in use
B. client drivers
C. guard interval
D. Antenna Height
An IEEE 802.11 amendment is in the daft state. What impact does this draft amendment have on the 802.11 standard?
A. Devices will be released based on the draft amendment and the draft amendment features are part of the standard.
B. No impact: Until an amendment is ratified, it does not become part of the standard.
C. No impact: Draft amendments do not become part of the standard until a working group is formed.
D. The standard is changed to reflect the new capabilities as soon as an amendment enters the draft stage.
During a post-implementation survey, you have detected a non-802.11 wireless device transmitting in the area used by handheld 802.11g scanners. What is the most important factor in determining the impact of this non-802.11 device?
A. Receive sensitivity
B. Channel occupied
C. Airtime utilization
D. Protocols utilized
You are evaluating a connection that states the data rate is 150 Mbps. What is the expected throughput of this connection?
A. Less than 150 Mbps because of 802.11 overhead and contention
B. 54 Mbps because that is the actual maximum throughput of an 802.11 connection
C. More than 150 Mbps because of compression
D. 150 Mbps because the data rate is equal to the throughput
What security solution is required to be used in place of Open System Authentication for all open network 802.11 implementations in the 6 GHz band?
A. OWE
B. Kerberos
C. WPA3-Enterprise
D. WPA3-SAE
A non-802.11 device is suspected of causing interference on the WLAN. You are not certain of the location or type of device. What is the best solution for locating this non- 802.11 device?
A. Access point spectrum analyzer
B. Laptop-based spectrum analyzer with an omni-directional antenna
C. Laptop-based spectrum analyzer with an omni-directional antenna
D. Laptop-based spectrum analyzer with a directional antenna
What feature of 802.1 lax (HE) is managed with beacon and trigger frames and is primarily a power management method, but also provides more efficient access to the channel used within a BSS?
A. TWT
B. BSS Color
C. UL-MU-MIMO
D. OFDMA