802.11k Neighbor Requests and Neighbor Reports are sent in what type of Management Frames?
802.11k Neighbor Requests and Neighbor Reports are sent in what type of Management Frames? A. RRM B. Action C. Beacon D. Reassociation Request and Reassociation Response
The network administrator at ABC Engineering has taken a large packet capture from one of their APs running in
The network administrator at ABC Engineering has taken a large packet capture from one of their APs running in monitor mode. She has very little knowledge of 802.11 protocols but would like to use the capture file to evaluate the overall health and performance of their wireless network. When she asks your advice, which tool […]
Which one of the these is the most important in the WLAN troubleshooting methodology among those listed?
Which one of the these is the most important in the WLAN troubleshooting methodology among those listed? A. Interview the network manager about the issues being experienced B. Talk to the end users about their experiences C. Observe the problem D. Obtain detailed knowledge of the wireless vendors debug and logging options
Protocol analyzers may present field values in either binary, decimal or hexadecimal. What precedes a hexadeci
Protocol analyzers may present field values in either binary, decimal or hexadecimal. What precedes a hexadecimal value to indicate it is hexadecimal? A. 0x B. % C. HEX D. 16x
You are performing a multiple adapter channel aggregation capture to troubleshoot a VoIP roaming problem and w
You are performing a multiple adapter channel aggregation capture to troubleshoot a VoIP roaming problem and would like to measure the roaming time from the last VoIP packet sent on the old AP’s channel to the first VoIP packet sent on the new AP’s channel. Which timing column in the packet view would measure this […]
When configuring a long term, forensic packet capture and saving all packets to disk which of the following is
When configuring a long term, forensic packet capture and saving all packets to disk which of the following is not a consideration? A. Total capture storage space B. Individual trace file size C. Real-time packet decodes D. Analyzer location
When performing packet capture (in a non-FT environment) which frames are required in order for PSK frame decr
Given a protocol analyzer can decrypt WPA2-PSK data packets providing the PSK and SSID are configured in the analyzer software. When performing packet capture (in a non-FT environment) which frames are required in order for PSK frame decryption to be possible? A. Authentication B. Reassociation C. 4-Way Handshake D. Probe Response
Using a portable analyzer you perform a packet capture next to a client STA and you can see that the STA is as
Using a portable analyzer you perform a packet capture next to a client STA and you can see that the STA is associated to a BSS. You observe the STA sending packets to the AP and the AP sending packets to the STA. Less the 2% of all packets are retransmissions. You move to capture […]
Which one of the best following is an advantage of using display filters instead of capture-time filters?
Which one of the best following is an advantage of using display filters instead of capture-time filters? A. Display filters allow for focused analysis on just the packets of interest B. Once created display filters are reusable for later captures C. Display filters only hide the packets from view and the filtered packets can be […]
Which one of the following should be the first step when troubleshooting a WLAN issue?
Which one of the following should be the first step when troubleshooting a WLAN issue? A. Identify capture locations B. Identify probable causes C. Perform an initial WLAN scan and see if any obvious issues stand out D. Define the problem