12.1
12.2
12.3
12.4
Bonus
100

What is the primary difference between Wi-Fi and cellular radio in terms of operation?


Cellular radio has a shorter effective range than Wi-Fi.

Cellular radio is typically used for private infrastructure, whereas Wi-Fi is not.

Wi-Fi uses a broader radio spectrum compared to cellular radio.

Wi-Fi is operated by individual users, while cellular radio is operated by telecommunications providers


Wi-Fi is operated by individual users, while cellular radio is operated by telecommunications providers

100

What is the purpose of configuring access points (APs) with the same ESSID and security configuration in an extended service area (ESA)?


To increase the interference between overlapping BSAs

To prevent clients from connecting to the network

To limit the signal strength of each AP

To create a seamless roaming experience for clients


To create a seamless roaming experience for clients

100

Which of the following might be prohibited by acceptable use policies in a BYOD environment? (Select two.)

Installing nonstore apps

Using enterprise mobility management suites

Rooting/jailbreaking a device


Agreeing to device inspections

Keeping the device up to date with patches

Installing nonstore apps

Rooting/jailbreaking a device

100

What is the purpose of using a Wi-Fi analyzer?

To encrypt wireless communications

To increase the Wi-Fi signal strength

To physically extend the range of a Wi-Fi network

To measure signal strength and noise


To measure signal strength and noise

100

An organization is transitioning from a legacy multimode fiber network to a more modern infrastructure but wishes to reuse some of the existing fiber optic cables where possible. The current setup predominantly uses an older connector type known for its push-and-twist locking mechanism.

For compatibility with new equipment, which connector type should the organization consider for adapters or replacements?


Straight Tip (ST)

Subscriber Connector (SC)

Mini-MT

Local Connector (LC)

Straight Tip (ST)

200

Which modulation scheme is introduced with Wi-Fi 6?

QAM

DSSS

FHSS

OFDMA

OFDMA

200

What is a station in the context of Wi-Fi networks?


A wireless client device or radio

A network switch

A network cable

A router

A wireless client device or radio

200

What might users have to agree to as part of a BYOD policy?


Installing any app they wish without restrictions

Refusing to use enterprise mobility management suites

Permitting inspection of the device

Prohibiting the use of security patches

Permitting inspection of the device

200

You are a network administrator for a large office building. Employees have been complaining about weak Wi-Fi signals and intermittent connections in the conference room. Upon investigation, you notice that the conference room has large glass windows on one side and is furnished with several metal-framed chairs and a large metal conference table.

Based on this information, which of the following actions is MOST likely to improve the Wi-Fi signal in the conference room?


Increase the power output of the access point (AP).

Replace the metal furniture with wooden furniture.

Install a new AP inside the conference room.

Apply a Wi-Fi-friendly film to the glass windows.

Replace the metal furniture with wooden furniture.

200

How is SOHO subscriber Internet access PRIMARILY facilitated?

Through direct fiber-optic connections to each home

Using only wireless cellular networks

Via the public switched telephone network (PSTN)

Through satellite communication systems

Via the public switched telephone network (PSTN)

300

What is the primary function of Assisted GPS (A-GPS)?


To replace GPS with a more advanced technology

To improve the accuracy of traditional GPS by using cellular data

To increase the battery life of devices using GPS

To provide GPS services in areas without satellite coverage

To improve the accuracy of traditional GPS by using cellular data

300

What is the maximum length of an SSID?

24 bytes

16 bytes

64 bytes

32 bytes


32 bytes

300

What happens after the supplicant device is authenticated by the AAA server in an enterprise authentication setup?


The supplicant is disconnected from the network.

The access point generates a master key (MK).

The AAA server blocks the supplicant from accessing the network.

The AAA server transmits a master key (MK) to the supplicant.


The AAA server transmits a master key (MK) to the supplicant.

300

What does overcapacity in a wireless network refer to?


The physical damage of an Access Point (AP) due to overheating.

The situation where the number of client devices exceeds the number of available IP addresses.

The process of adding more APs to a network to increase its coverage area.

The condition where too many client devices connect to the same AP, causing network issues.


The condition where too many client devices connect to the same AP, causing network issues.

300

What does QSFP+ support that QSFP does not?

40 GbE by provisioning 4 x 10 Gbps links

4 x 1 Gbps links aggregated to a single 4 Gbps channel

Gigabit Ethernet data rates

1 Gbps links

40 GbE by provisioning 4 x 10 Gbps links

400

What is the function of the Request to Send (RTS) and Clear To Send (CTS) mechanism in IEEE 802.11 networks?

To further reduce the incidence of collisions

To increase the transmission speed

To assign IP addresses to devices

To encrypt data transmissions

To further reduce the incidence of collisions

400

What is a Mesh Basic Service Set (MBSS) in the context of wireless networking?


A configuration where all devices must connect through a single access point

A proprietary protocol for connecting wireless devices

A set of wireless networks connected in a linear fashion

A network setup where nodes can discover each other and form a mesh network


A network setup where nodes can discover each other and form a mesh network

400

Which of the following attacks aim to recover the encryption key in WEP and original WPA versions?


Cross-site scripting attacks

Replay attacks

Phishing attacks

SQL injection attacks

Replay attacks

400

What is a common method to dynamically manage network load and reduce overutilization in a wireless network facing overcapacity issues?


Reducing the encryption level of the network

Reassigning wireless channels dynamically

Deploying additional DHCP servers

Increasing the AP's transmit power

Reassigning wireless channels dynamically

400

What is the role of a Media Access Control (MAC) address in the context of host interfaces at the Data Link Layer?


It serves as a global IP address for devices to communicate over the Internet.

It acts as a unique identifier assigned to each host interface, such as NIC ports in computers and radios in mobile devices.

It encrypts data packets for secure transmission between devices.

It is used to determine the routing path across multiple networks.

It acts as a unique identifier assigned to each host interface, such as NIC ports in computers and radios in mobile devices.

500

What is the primary aim of Wi-Fi 6 (802.11ax)?

To double the speed of Wi-Fi 5

To support only the 2.4 GHz band

To approximate 10G connection speeds

To eliminate the need for Wi-Fi passwords

To approximate 10G connection speeds

500

A local community center wants to provide internet access to a nearby park for public use. The park is located directly east of the community center building. The community center's IT specialist needs to set up an outdoor access point on the building to cover the park area with a strong and focused signal.

Which type of antenna should the IT specialist use for this outdoor access point?


Downtilt omnidirectional antenna

Omnidirectional antenna

Parabolic antenna

Yagi antenna


Yagi antenna

500

What was the primary purpose of developing the first version of Wi-Fi Protected Access (WPA)?


To fix critical vulnerabilities in the WEP standard

To increase the speed of wireless connections

To introduce a new encryption key generation method

To reduce the cost of wireless network implementation

To fix critical vulnerabilities in the WEP standard

500

What is the recommended AP power setting relative to the weakest client power?


Equal to the weakest client power

2/3rds of the weakest client power

Half of the weakest client power

Twice the weakest client power

2/3rds of the weakest client power

500

A company is planning to reorganize its network infrastructure to improve efficiency and reduce the complexity of its routing tables. They currently have eight /24 networks that are contiguous. The network administrator suggests using CIDR to summarize these networks into a single entry.

What CIDR notation would achieve this?

answer

/22

/24

/23


/21


/21 

A /21 CIDR notation can summarize eight contiguous /24 networks into a single network. This is because a /21 network encompasses 2^11 = 2048 addresses, and since each /24 network represents 256 addresses, eight of them would total 2048 addresses. This summarization significantly simplifies the routing table by reducing eight entries to just one.

M
e
n
u