A WLAN is implemented using wireless controllers. The APs must locate the controllers when powered on and connected to the network. Which one of the following methods is commonly used to locate the controllers by the APs?
You are deploying a WLAN monitoring solution that utilizes distributed sensor devices. Where should sensors be deployed for best results?
What primary metric of scanning can stations use to select the best AP for connectivity to the desired BSS?
You are troubleshooting a WLAN problem and you suspect hidden node as the cause. What should you look for in a protocol analyzers?
A natural disaster has occurred in a remote area that is approximately 40 miles from the response team headquarters. The response team must setup a local wireless network using 802.11 WLAN access points. What is the best method, of those listed, for implementation of a network backhaul for communications across the Internet in this scenario?
When antenna gain is reported in dBI, the gain of the antenna is compared to what theoretical antenna?
What statement about 802.11 WLAN performance is true?
You administer a small WLAN with nine access points. As a small business, you do not run a RADIUS server and use WPA2-Personal for security. Recently, you changed the passphrase for WPA2-Personal in all APs and clients. Several users are now reporting the inability to connect to the network at times and it is constrained to one area of the building. When using a WLAN scanner, you see that the AP covering that area is online and has a strong signal. No other changes have been made to the environment and all access points are the same model. What is the likely problem?
What statement about 802.11 WLAN performance is true?
What cipher suite is specified by the 802.11-2016 standard and is not deprecated?