1. In the context of mobile devices, what does the term tethering involve?
- connecting a mobile device to a USB port on a computer in order to charge the mobile device
- connecting a mobile device to another mobile device or computer to share a network connection
- connecting a mobile device to a 4G cellular network
- connecting a mobile device to a hands-free headset
Explanation: Tethering allows a laptop or PC to use the Internet connection of a mobile device such as a cell phone, usually through a cellular data connection. This allows devices to connect to the Internet in locations where there is no Wi-Fi or cabled connection, but where there is still a cellular data connection.
2. Which feature of 802.11n wireless access points allows them to transmit data at faster speeds than previous versions of 802.11 Wi-Fi standards did?
Explanation: Multiple-input multiple-output (MIMO) technology allows 802.11n devices to use multiple antennas in order to increase the available bandwidth for the wireless network. Single Point Setup (SPS) is a Cisco technology that makes AP deployment easier by supporting clustering from a single management interface. Wi-Fi Protected Setup (WPS) is used to simplify connecting clients to secure wireless networks. Man-in-the-middle (MITM) is a type of security attack where the attacker attempts to insert themselves into the middle of a data stream.
3. Which method of wireless authentication is currently considered to be the strongest?
- shared key
Explanation: WPA2 can use the AES encryption standard, which is currently the strongest method of encrypting wireless data.
4. Which parameter is commonly used to identify a wireless network name when a home wireless AP is being configured?
Explanation: The SSID is used to name a wireless network. This parameter is required in order for a wireless client to attach to a wireless AP.
5. Which characteristic describes a wireless client operating in active mode?
- ability to dynamically change channels
- must be configured for security before attaching to an AP
- must know the SSID to connect to an AP
- broadcasts probes that request the SSID
Explanation: A wireless client operating in active mode must know the name of the SSID. Probe requests are broadcast by a client across multiple channels and include the SSID name and supported standards. Active mode is used if an AP is configured to not broadcast beacon frames.
6. Which IEEE standard operates at wireless frequencies in both the 5 GHz and 2.4 GHz ranges?
Explanation: The 802.11n standard is backwards compatible with both the 802.11a and 802.11b standards and therefore operates at both 5 GHz and 2.4 GHz.
7. Which statement describes an autonomous access point?
- It is a standalone access point.
- It is managed by a WLAN controller.
- It is server-dependent.
- It is used for networks that require a large number of access points.
Explanation: An autonomous access point is used in environments that require a small number of access points. As network demands increase, more access points can be added to the environment with each access point acting independently of another. An autonomous access point can be configured using either a GUI or CLI.
8. Which two roles are typically performed by a wireless router that is used in a home or small business? (Choose two.)
- Ethernet switch
- RADIUS authentication server
- WLAN controller
- access point
Explanation: In addition to its roles as router, a typical SOHO wireless router acts as both a wireless access point and an Ethernet switch. RADIUS authentication is provided by an external server. A WLAN controller is used in enterprise deployments to manage groups of lightweight access points. A repeater is a device that enhances an incoming signal and retransmits it.
9. Which protocol and port numbers are used by both IPv4 and IPv6 CAPWAP tunnels? (Choose two.)
- 17 and 163
- 5246 and 5247
Explanation: CAPWAP can operate either over IPv4 or IPv6 and can use UDP ports 5246 and 5247.
10. If three 802.11b access points need to be deployed in close proximity, which three frequency channels should be used? (Choose three.)
Explanation: In order to minimize interference, one of the three non-overlapping channels should be used in 2.4GHz Wi-Fi networks: 1, 6, or 11.
11. Which type of telecommunication technology is used to provide Internet access to vessels at sea?
- municipal WiFi
Explanation: Internet access by means of satellites is available across the world. Temporary installations, airplanes in flight, and naval vessels benefit from the use of satellite internet. Municipal Wi-Fi, WiMax, and cellular technology are not able to support the mobile requirements of naval vessels and airplanes in transit.
12. Which wireless network topology is being configured by a technician who is installing a keyboard, a mouse, and headphones, each of which uses Bluetooth?
- ad hoc mode
- infrastructure mode
- mixed mode
Explanation: Tethering enables a wireless device such as a phone to provide wireless Internet connectivity to other devices, thus creating a hotspot. Infrastructure mode is the type of wireless network that is created when an access point is being used. Mixed mode allows older wireless NICs to attach to an access point that can use a newer wireless standard.
13. Which type of wireless topology is created when two or more Basic Service Sets are interconnected by Ethernet?
- ad hoc WLAN
- WiFi Direct
Explanation: Wireless devices operate in either ad hoc or infrastructure modes. An ad hoc WLAN, also referred to as an independent basic service set (IBISS), operates on a peer-to-peer basis without a network. Infrastructure modes can consist of a single Basic Service Set (BSS) with an AP interconnecting associated stations, or an Extended Service Set (ESS), with two or more BSSes interconnected over a wire distribution system such as Ethernet. WiFi Direct is a compatibility certification unrelated to WLAN topologies.
14. What Wi-Fi management frame is regularly broadcast by APs to announce their presence?
Explanation: Beacon frames are broadcast periodically by the AP to advertise its wireless networks to potential clients. Probing, association, and authentication frames are only sent when a client is associating to the AP.