You are troubleshooting a WLAN problem and you suspect hidden node as the cause. What should you look for in a protocol analyzers?
In a mesh BSS (MBSS), according to the 802.11-2016 standard, what device connect the mesh to an Ethernet network?
You are performing a post-implementation validation survey. What basic tool can be used to easily locate areas of high co-channel interference?
What common feature of MDM solutions can be used to protect enterprise data on mobile devices?
You have been tasked with creating a wireless link between two buildings on a single campus. The link must support at least 150 Mbps data rates. What kind of WLAN technology role should you deploy?
A natural disaster has occurred in a remote area that is approximately 40 miles from the response team headquarters. The response team must setup a local wireless network using 802.11 WLAN access points. What is the best method, of those listed, for implementation of a network backhaul for communications across the Internet in this scenario?
What Linux shell command can be used to view the hardware and PHY capabilities of a wireless adapter in detail including channel widths, output power setting, channels supported, and more?
A standard PoE injector is used to power an access point requiring 802.3at. CAT6 cabling is in use. What is the maximum distance supported between the access point and the Ethernet switch with the use of a midspan power injector?
An IEEE 802.11 amendment is in the daft state. What impact does this draft amendment have on the 802.11 standard?
You are deploying a WLAN monitoring solution that utilizes distributed sensor devices. Where should sensors be deployed for best results? Choose the single best answer.