Professional Documents
Culture Documents
1. Which of the following statements best describe security considerations during a wireless site
survey? (Choose all that apply.)
D. During the survey, both mutual authentication and encryption should be implemented. ABC
2. ACME Hospital uses a connection-oriented telemetry monitoring system in the cardiac care unit.
Management wants the application available over a WLAN. Uptime is very important because of the
critical nature of the monitoring system. What should the site survey and design engineer be looking for
that might cause a loss of communication over the WLAN? (Choose all that apply.)
3. Which of the following tools might be used in an outdoor site survey of an area designed to provide
outdoor coverage? (Choose all that apply.)
4. Name a unique consideration when deploying a wireless network in a hotel or other hospitality
business. (Choose the best answer.)
5. Which documents might be needed prior to performing an indoor site survey for a new wireless LAN?
(Choose all that apply.)
A. Install a 2.4 GHz access point on channel 6 and use the highest available transmit power setting to
overpower the WLANs of the other businesses.
B. Speak with the other businesses. Suggest that they use channels 1 and 6 at lower power settings.
Install a 2.4 GHz access point using channel 9.
C. Speak with the other businesses. Suggest that they use channels 1 and 11 at lower power settings.
Install a 2.4 GHz access point using channel 6.
E. Install a wireless intrusion prevention system (WIPS). Classify the other businesses’
7. The Harkins Corporation has hired you to make recommendations about a future wireless
deployment that will require more than 300 access points to meet all coverage requirements. What is
the most cost-efficient and practical recommendation in regard to providing electrical power to the
access points?
A. Recommend that the customer replace older edge switches with new switches that have inline
PoE.
B. Recommend that the customer replace the core switch with a new core switch that has inline PoE.
D. Recommend that the customer hire an electrician to install new electrical outlets. A
8. During the interview process, which topics will be discussed so that the WLAN will integrate properly
into the existing wired architecture?
9. The Jackson County Regional Hospital has hired you for a wireless site survey. Prior to conducting the
site survey, you should consult with employees from which departments? (Choose all that apply.)
10. What additional documentation is usually provided along with the final site survey deliverable?
(Choose all that apply.)
12. Which of the following tools can be used in an indoor site survey? (Choose all that apply.)
13. Name potential sources of interference in the 5 GHz U-NII bands. (Choose all that apply.)
14. Which of these measurements are taken during a passive manual site survey? (Choose all that
apply.)
15. Name potential sources of interference that might be found during a 2.4 GHz site survey. (Choose all
that apply.)
16. Which access point settings should be recorded during an AP-on-a-stick site survey? (Choose all that
apply.)
17. Which type of site survey uses modeling algorithms and attenuation values to create visual models
of RF coverage?
A. Create one wireless VLAN. Segment the data clients, VoWiFi phones, and guest users from the
wired network. Use 802.1X/EAP authentication and CCMP/AES encryption for a wireless security
solution.
B. Create three separate VLANs. Segment the data clients, VoWiFi phones, and guest users into three
distinct VLANs. Use 802.1X/EAP authentication and TKIP encryption for security in the data VLAN. Use
WPA2-Personal in the voice VLAN. The guest VLAN will have no security, other than possibly a captive
portal.
C. Create three separate VLANs. Segment the data clients, VoWiFi phones, and guest users into three
distinct VLANs. Use 802.1X/EAP authentication with CCMP/AES encryption for security in the data
VLAN. Use WPA2-Personal in the voice VLAN. The guest VLAN traffic will require a captive web portal
and a guest firewall policy for security.
D. Create two separate VLANs. The data and voice clients will share one VLAN, while the guest users
will reside in another. Use 802.1X/EAP authentication and CCMP/AES encryption for security in the
data/voice VLAN. The guest VLAN will have no security, other than possibly a captive portal.
19. Which type of WLAN site survey is the most important survey that should always be performed
regardless of the vertical deployment?
20. Name the necessary calculations for an outdoor bridging survey under 5 miles. (Choose all that
apply.)