Download as pdf or txt
Download as pdf or txt
You are on page 1of 75

Here are 200 true/false questions generated from the WLAN PDF files:

1. Wireless Personal Area Networks (WPANs) provide wireless connections in personal areas,
which are generally point-to-point connections and small-scale network connections. True

2. WPAN technologies include Bluetooth, ZigBee, and Near Field Communication (NFC). True

3. ZigBee applies to high-speed and high-power wireless networks, such as sensor networks and
wireless meter reading networks. False

4. NFC is a long-distance high-frequency wireless communication technology. False

5. Wireless Local Area Networks (WLANs) use 3.4 GHz and 5.8 GHz frequency bands. False

6. WLANs have high energy consumption compared to wired networks. True

7. WLANs support multiple users and flexible network design. True

8. 802.11n/ac/ax are the main WLAN technologies. True

9. Wireless Metropolitan Area Networks (WMANs) provide wireless backbone coverage over a
metropolitan area. True

10. WMANs use licensed frequency bands that are not prone to interference. False

11. WiMAX (802.16) is a common WMAN technology. True

12. Wi-Fi is just another term for the IEEE 802.11 standards. True

13. The Wi-Fi Alliance uses the term "Wi-Fi CERTIFIED" to refer to certified 802.11 products that
have passed interoperability testing. True

14. Wireless network technologies were invented after the wired Ethernet standards. False

15. ALOHAnet created in 1971 was one of the earliest wireless networks, based on the University
of Hawaii. True

16. The 802.11 standard was formally approved in 1990 to define WLAN technologies. True

17. 802.11n uses only the 2.4 GHz frequency band while 802.11ac uses only the 5 GHz band. False

18. 802.11ax aims to deliver high-speed, high-quality WLAN services. True

19. Orthogonal Frequency Division Multiplexing (OFDM) divides a channel into multiple
narrowband subcarriers. True

20. With OFDM, multiple signals can be transmitted concurrently on different subcarriers. True
21. Baseband signals have a high frequency range suitable for long distance transmission. False

22. Modulation converts baseband signals into RF signals for efficient transmission. True

23. An intermediate frequency (IF) is used in traditional modulation before converting signals into
RF. True

24. Zero-IF (ZIF) modulation converts directly between baseband and RF signals. True

25. Guided electromagnetic waves propagate in a specified path like transmission lines. True

26. Unguided waves can propagate freely in space in any direction. True

27. Radio waves are a type of electromagnetic waves that can propagate in vacuum and air. True

28. Radio waves have frequencies in the range of 3 kHz to 300 MHz. False

29. A higher frequency radio wave has a longer wavelength compared to a lower frequency wave.
False

30. The phase difference between two radio waves impacts their propagation pattern. True

31. Information signals cannot be transmitted by modulating properties of a radio wave. False

32. WLANs use the license-free ISM bands approved for Industrial, Scientific and Medical usage.
True

33. The 2.4 GHz ISM band has less interference than the 5 GHz ISM bands for WLAN usage. False

34. The channels used for WLANs in specific ISM bands are globally harmonized. False

35. WLAN channels in the 5 GHz band have shorter range but higher throughput than 2.4 GHz
channels. True

36. BPSK, QPSK, 16-QAM, 64-QAM are examples of digital modulation techniques used in WLANs.
True

37. 256-QAM carries 8 bits per symbol, 1024-QAM carries 10 bits per symbol. True

38. OFDM divides a wideband channel into many narrowband subcarriers to transmit multiple
signals. True

39. Forward error correction adds redundant bits to facilitate detection and correction of errors.
True

40. Convolutional coding is a technique used for error correction in WLANs. True

41. A higher coding rate leads to higher data rates in WLAN transmissions. True
42. 802.11n supports up to 4 spatial streams using MIMO antennas. True

43. Spatial multiplexing in MIMO allows independent data streams to be transmitted over
multiple antennas. True

44. Channel bonding aggregates multiple 20 MHz channels to increase bandwidth in 802.11n. True

45. 802.11n can achieve a PHY rate of up to 600 Mbps using four spatial streams. True

46. Short guard interval reduces overhead and increases data bits transmitted. True

47. 802.11ac provides higher throughput than 802.11n using newer techniques. True

48. 802.11ac introduces downlink multiuser MIMO for transmitting to multiple clients
simultaneously. True

49. 802.11ax defines uplink multiuser transmissions for higher efficiency. True

50. 1024-QAM enables a higher modulation order for increased throughput in 802.11ax. True

51. 802.11ax uses OFDMA to divide channels into resource units for multiple access. True

52. BSS coloring in 802.11ax differentiates between overlapping BSSs to reduce interference. True

53. An AP transmits regular beacon frames to announce presence of a wireless network. True

54. A STA uses active scanning to discover nearby APs and networks. True

55. In passive scanning, the STA listens for beacon frames to find networks. True

56. A STA must be authenticated before associating with an AP and SSID on the WLAN. True

57. Open system authentication involves a challenge-response protocol for access. False

58. The shared key authentication protocol uses WEP for authentication. True

59. To associate with an AP, the STA sends an Association Request frame. True

60. After association, the STA can exchange data frames with the AP. True

61. Roaming between APs involves scanning, authentication and reassociation. True

62. Intra-AC roaming means movement between APs on the same AC/controller. True

63. Inter-AC roaming involves APs managed by different controllers. True

64. An inter-AC tunnel syncs data between controllers for seamless L3 roaming. True
65. Layer 2 roaming keeps the same IP address but L3 roaming changes the IP subnet. True

66. The home agent anchor IP is needed to forward traffic during L3 roaming events. True

67. CSMA/CA avoids collisions by using RTS/CTS and random backoff mechanisms. True

68. CSMA/CA ensures collision-free transmissions on the wireless medium. False

69. The Distributed Coordination Function (DCF) uses CSMA/CA for channel access. True

70. CSMA/CA draws a random backoff count to wait before transmitting data. True

71. The Point Coordination Function (PCF) uses polling for scheduled channel access. True

72. PCF polling enables prioritized access for voice and video traffic. True

73. MAC layer frames include management frames used for control signaling. True

74. Association and authentication are handled through management frame exchanges. True

75. Management frames help APs coordinate and synchronize transmissions. True

76. AMPDU aggregates multiple MPDUs to amortize overhead of PHY transmissions. True

77. Block ACK further improves efficiency by acknowledging multiple frames together. True

78. STBC helps improve reception reliability using redundancy in space and time. True

79. LDPC enables efficient error correction by sending redundant parity information. True

80. MU-MIMO allows simultaneous transmissions to multiple clients at once. True

81. Spatial streams correspond to independent data streams between transmitter and receiver.
True

82. 802.11ax uses OFDMA for dividing channel into resource units for multiple access. True

83. DFS helps avoid interference with radar systems by frequency hopping. False

84. TWT enables scheduled wake up times for improved battery life of client devices. True

85. BSS color allows grouping of BSSs to reduce interference in 802.11ax. True

86. Dynamic frequency selection (DFS) detects radar signals and avoids interference. True

87. Short guard interval reduces overhead and increases data transmission time. True
88. STBC transmits redundant streams across space and time to improve reception. True

89. LDPC improves reception through forward error correction coding. True

90. MU-MIMO enables simultaneous transmission to multiple clients, improving downlink


capacity. True

91. Spatial streams allow independent data streams between transmitter and receiver. True

92. 1024-QAM modulation carries more data bits than 256-QAM modulation. True

93. Station management involves AP configuration, software upgrade, monitoring and


diagnostics. True

94. The AC discovery process using DHCP and DNS is defined in CAPWAP. True

95. CAPWAP uses DTLS encryption to secure control and data connections. True

96. An AP scans for available ACs when booting up. True

97. The AC can restrict AP access using whitelisting of serial numbers or MAC addresses. True

98. After discovery, the AP establishes CAPWAP tunnels for control and data traffic. True

99. The AC provisions the AP with software image, configurations, licenses for normal operation.
True

100. Direct data forwarding avoids tunneling overhead by switching traffic locally. True

101. Active/standby high availability on ACs maintains controller redundancy. True

102. HSB sync sessions ensure stateful failover between active and standby ACs. True

103. The AP CAPWAP layer joins a new AC seamlessly if the primary AC fails. True

104. Airtime scheduling can allocate channel access time to minimize collisions. True

105. Band steering helps direct dual-band clients to preferred 5GHz networks. True

106. Load balancing moves clients to optimal APs based on WLAN conditions. True

107. When roaming, the client STA scans and reassociates before disassociating the old AP. True

108. Intra-AC roaming means movement between APs managed by same controller. True

109. Inter-AC roaming involves APs controlled by different controllers. True

110. The authentication server matches credentials and determines access rights for a user. True
111. Open system authentication allows any device to connect without authentication. True

112. WPA2-Personal uses a pre-shared key for authentication and encryption. True

113. The robust security network (RSN) defines the IEEE 802.11i security standard. True

114. CCMP provides stronger encryption than TKIP for WPA2 connections. True

115. Fast BSS transition (FT) enables secure roaming between different APs. True

116. A supplicant is the client device that needs network access and authentication. True

117. The authenticator enforces authentication and controls network access. True

118. The authentication server matches credentials and determines access rights. True

119. Mutual authentication verifies identities of both client and authentication server. True

120. Key caching on APs avoids full EAP authentication each roam. True

121. PMK caching speeds up roaming by retaining shared keys on APs. True

122. Opportunistic key caching retains PMK after clients roam from an AP. True

123. The RADIUS server matches credentials and makes access control decisions. True

124. PEAP encapsulates EAP in a TLS tunnel for authentication. True

125. EAP-TLS uses client-side certificates instead of passwords for strong authentication. True

126. TACACS+ seperates authentication, authorization and accounting functions. True

127. 802.1X configures port-based access control using EAP authentication. True

128. Portal authentication redirects web traffic to a login page for credentials. True

129. Open SSIDs allow clients to connect without any authentication. True

130. MAC address filtering controls access based on client MAC addresses. True

131. Users must accept terms and conditions when connecting to a guest SSID. True

132. PSK authentication uses a pre-shared key between AP and client for access. True

133. WPA3 introduces new authentication protocols like SAE and Suite B. True

134. OWE authentication encrypts open networks to provide data privacy. True
135. SAE handshake replaces PSK with a password authenticated key exchange. True

136. Suite B cryptography uses elliptic curves for key exchange strength. True

137. WIDS monitors the WLAN for rogue APs and other security threats. True

138. Rogue AP detection identifies unauthorized or external APs. True

139. WIPS can disable or contain rogue APs and other wireless threats. True

140. Client isolation blocks L2 traffic between associated wireless clients. True

141. HTTPS inspection decrypts SSL traffic for visibility and control. True

142. Wang posters and Honeypots attract attackers to divert them from real networks. True

143. Evil twin APs mimic real networks to trick users into connecting to them. True

144. DoS attacks flood the network to disrupt connectivity and availability. True

145. Transmission power directly impacts the coverage range of an AP. True

146. Higher gain directional antennas focus signals in a specific area. True

147. AP placement, antennas and transmit power all affect cell sizing. True

148. Overlapping AP cells with lower power reduce co-channel interference. True

149. APs should use varying channels to minimize interference on the WLAN. True

150. Radio resource management dynamically assigns channels to APs. True

151. DFS avoids interference by switching channels if radar is detected. True

152. In a centralized WLAN, the controller handles RRM across APs. True

153. The country code configures channels and power as per local regulations. True

154. Clients connect to the AP with the strongest received signal strength (RSSI). True

155. PHY data rates dynamically adapt to channel conditions using MCS. True

156. Fast roaming involves pre-authentication and PMK caching. True

157. OKC opportunistically retains PMK after clients roam from an AP. True

158. PKC proactively caches PMK on APs where client may roam. True
159. H-controller designates a backup controller for mobility resiliency. True

160. The R1 key is generated after initial 802.1X authentication. True

161. The R0 key is derived upon FT authentication and used for data encryption. True

162. The mobility domain stores context like keys to support fast roaming. True

163. IAPP distributes client, security and other context between APs. True

164. Wireless intrusion detection identifies security threats on the WLAN. True

165. Wireless intrusion prevention blocks or isolates wireless threats. True

166. Rogue AP containment disconnects clients of rogue APs. True

167. Client isolation blocks wireless clients from communicating directly. True

168. IPv4 uses 32 bit addresses allowing about 4 billion IP addresses. True

169. IPv6 uses 128 bit addresses for vastly increased address space. True

170. NAT conserves IPv4 addresses by masking internal RFC1918 addresses. True

171. DHCP automatically assigns IP addresses, subnet masks, default gateways to clients. True

172. VLANs logically separate traffic on shared network infrastructure. True

173. APs tunnel traffic from wireless clients back to a central controller. True

174. GRE tunnels encapsulate one protocol packet over another protocol. True

175. ORAM optimizes routing across access points based on client locations. True

176. LISP separates device identity from location identity using namespaces. True

177. SDN centralizes network control logic from underlying infrastructure. True

178. Northbound APIs allow applications to programmatically interface with SDN controller. True

179. OpenFlow is a popular protocol implemented between SDN layers. True

180. Campus networks connect endpoints like buildings, departments within a large area. True

181. A CAN provides connectivity between buildings on a corporate or university campus. True

182. A WAN interconnects networks across a wide geographic area. True


183. P2MP topologies connect a central hub to multiple endpoints. True

184. P2P connections link two endpoints together directly. True

185. Mesh topologies have interconnected nodes that can all route data. True

186. Ring topologies connect each node to exactly two adjacent nodes to form a loop. True

187. STP prevents loops by blocking redundant paths in switched networks. True

188. RSTP provides faster convergence than STP by reducing forward delay. True

189. MSTP maps VLANs to spanning trees for load balancing. True

190. TRILL replaces STP using shortest path forwarding across Ethernet fabric. True

191. Fabric Connnect creates Layer 2 multipath networks without STP. True

192. EVPNs connect remote sites to form a unified LAN over the WAN. True

193. VXLAN encapsulates L2 packets inside L3 packets for transport over fabrics. True

194. NVGRE also tunnels L2 packets over L3 networks just like VXLAN. True

195. CAPWAP tunnels securely transport WLAN traffic between APs and controllers. True

196. MPLS labels packets for fast forwarding across the core. True

197. Traffic engineering optimizes network paths based on bandwidth, latency etc. True

198. Headend replication sends multicast traffic from source to each destination. True

199. Tailend replication has routers replicate at fanout points to reach receivers. True

200. Bidirectional PIM signals between sources and receivers to build distribution trees. True

Here are 200 single-answer multiple choice questions generated from the WLAN PDF files:

1. Which wireless technology is used for short distance communication between devices like
laptops and smartphones?

A. WPAN

B. WLAN

C. WMAN
D. WWAN

2. Which of the following is NOT a common WPAN technology?

A. Bluetooth

B. ZigBee

C. WiMAX

D. NFC

3. Which IEEE standard defines the specifications for Wireless Local Area Networks (WLANs)?

A. 802.15

B. 802.16

C. 802.11

D. 802.20

4. Which frequency bands are used by WLAN technologies?

A. 2.4 GHz and 3.6 GHz

B. 2.4 GHz and 5 GHz

C. 5 GHz and 60 GHz

D. 900 MHz and 2.4 GHz

5. Which amendment added specifications for the 5 GHz frequency band to the original 2.4 GHz
802.11 standard?

A. 802.11a

B. 802.11b

C. 802.11g

D. 802.11n

6. Which WLAN standard introduced Multiple Input Multiple Output (MIMO) technology?

A. 802.11ac
B. 802.11n

C. 802.11g

D. 802.11a

7. Which term refers to certified interoperable WLAN products based on the 802.11 standards?

A. Wi-Fi

B. WaveLAN

C. LMDS

D. WinLAN

8. Which early wireless network technology first demonstrated the feasibility of wireless LANs?

A. WaveLAN

B. ALOHAnet

C. WINLAN

D. Wi-Fi

9. Which 802.11 amendment aims to deliver high speed and low latency Wi-Fi connectivity?

A. 802.11ac

B. 802.11ax

C. 802.11n

D. 802.11ad

10. Which modulation technique is used in 802.11n/ac/ax standards for high throughput?

A. FHSS

B. DSSS

C. OFDM

D. PAM

11. How does OFDM enable high throughput in WLAN standards?


A. High frequency carrier

B. Multiple narrowband subcarriers

C. Amplitude modulation

D. Frequency modulation

12. Which 802.11 amendment allows the use of 80 MHz and 160 MHz channel bandwidths?

A. 802.11n

B. 802.11ac

C. 802.11ax

D. 802.11ad

13. Which modulation scheme supports the highest data rate in 802.11ax?

A. 16-QAM

B. 64-QAM

C. 256-QAM

D. 1024-QAM

14. Which technique involves the transmission of multiple data streams over multiple antennas?

A. MU-MIMO

B. OFDMA

C. MIMO

D. DFS

15. Which 802.11 amendment introduced uplink multiuser transmissions?

A. 802.11n

B. 802.11ac

C. 802.11ax

D. 802.11ad
16. Which mechanism differentiates BSSs in dense deployments to reduce interference in
802.11ax?

A. TWT

B. MU-MIMO

C. BSS coloring

D. Spatial streams

17. During active scanning, which frames does a client station send to discover nearby APs?

A. Probe Request

B. Authentication Request

C. Association Request

D. Beacon

18. Which frame type helps in network discovery during passive scanning?

A. Probe Response

B. Association Response

C. Beacon

D. Authentication Request

19. Which authentication protocol involves a challenge-response handshake?

A. Open system

B. WPA2

C. Shared key

D. EAP

20. Before association, a client has to be authenticated by the AP. (True/False)

A. True

B. False
21. The association process establishes the data connection between the client and AP.
(True/False)

A. True

B. False

22. Fast BSS transition in 802.11r enables faster roaming between APs by reducing handoff delays.
(True/False)

A. True

B. False

23. PMK caching helps speed up roaming by retaining shared keys on the AP. (True/False)

A. True

B. False

24. Which roaming scenario involves movement between APs controlled by the same wireless
controller?

A. Intra-controller

B. Inter-subnet

C. Inter-VLAN

D. Inter-controller

25. Which roaming scenario involves movement between APs controlled by different wireless
controllers?

A. Intra-controller

B. Intra-subnet

C. Inter-VLAN

D. Inter-controller

26. Which mechanism synchronizes client data between controllers to support seamless roaming?

A. IAPP

B. HREAP
C. OKC

D. PKC

27. Which 802.11 layer uses CSMA/CA for channel access to avoid collisions?

A. Physical layer

B. Data link layer

C. Network layer

D. Transport layer

28. Short InterFrame Space (SIFS) provides priority access for time-sensitive ACK frames.
(True/False)

A. True

B. False

29. Point Coordinate Function (PCF) enables contention-free polling access on the wireless
medium. (True/False)

A. True

B. False

30. Which 802.11 frame type is used by the AP and client during association and authentication?

A. Management

B. Control

C. Data

D. Action

31. Which technique aggregates small frames to improve MAC efficiency over the air?

A. Frame bursting

B. A-MSDU

C. A-MPDU

D. PPDU
32. Which method aggregates ACKs to provide cumulative acknowledgement of multiple MPDUs?

A. Block ACK

B. Batched ACK

C. Fast ACK

D. Cumulative ACK

33. Which diversity technique sends redundant streams across space and time to improve
reception?

A. MIMO

B. OFDM

C. STBC

D. LDPC

34. Which 802.11 technology allows downlink transmission to multiple clients simultaneously?

A. OFDMA

B. MU-MIMO

C. SU-MIMO

D. STBC

35. Spatial streams represent independent data streams between the transmitter and receiver.
(True/False)

A. True

B. False

36. Dynamic frequency selection (DFS) helps avoid radar interference by switching channels when
needed. (True/False)

A. True

B. False

37. Which power saving feature in 802.11ax schedules specific wakeup times for clients?

A. PSMP
B. SMPS

C. TWT

D. DTIM

38. The basic service set (BSS) refers to the AP and its associated clients. (True/False)

A. True

B. False

39. The service set identifier (SSID) is the name of the wireless network. (True/False)

A. True

B. False

40. The basic service area (BSA) connects multiple BSSs in a wireless network. (True/False)

A. True

B. False

41. The extended service set (ESS) connects multiple APs and BSSs into one logical network.
(True/False)

A. True

B. False

42. Which security protocol is part of the IEEE 802.11i standard?

A. WPA

B. WEP

C. WPA2

D. WPA3

43. Which encryption protocol is stronger - TKIP or CCMP?

A. TKIP

B. CCMP
44. WPA3 introduces new authentication mechanisms like SAE to replace the PSK protocol.
(True/False)

A. True

B. False

45. Which authentication protocol uses a pre-shared key (PSK) for network access?

A. EAP

B. PSK

C. PEAP

D. LEAP

46. 802.1X port-based access control uses EAP for authentication and key management.
(True/False)

A. True

B. False

47. Which authentication server matches user credentials and decides access rights?

A. NAS

B. AS

C. CA

D. AC

48. RADIUS combines authentication, authorization and accounting functions. (True/False)

A. True

B. False

49. Which entity initiates authentication and wants to access network resources?

A. Supplicant

B. Authenticator

C. Authentication server
D. Accounting server

50. Which entity enforces authentication policies and allows network access?

A. Supplicant

B. Authenticator

C. Authentication server

D. Accounting server

51. Mutual authentication verifies the identity of both client and authentication server.
(True/False)

A. True

B. False

52. Fast roaming uses PMK caching, key hierarchy and other methods to reduce handoff delays.
(True/False)

A. True

B. False

53. Opportunistic key caching (OKC) retains PMK after clients roam away from an AP. (True/False)

A. True

B. False

54. Key scope indicates when a PMK or key is no longer valid as client roams. (True/False)

A. True

B. False

55. The R1 key is derived after the initial 802.1X authentication between client and AS.
(True/False)

A. True

B. False

56. IAPP distributes client context like security keys between APs. (True/False)

A. True
B. False

57. A wireless intrusion detection system (WIDS) identifies security threats on the WLAN.
(True/False)

A. True

B. False

58. A wireless intrusion prevention system (WIPS) can block wireless attacks and threats.
(True/False)

A. True

B. False

59. Client isolation blocks wireless clients on the same SSID from communicating directly.
(True/False)

A. True

B. False

60. Evil twin APs spoof legitimate networks to trick users into connecting. (True/False)

A. True

B. False

61. Wireless networks use unguided electromagnetic waves propagating freely through space.
(True/False)

A. True

B. False

62. Omnidirectional antennas provide equal coverage in all horizontal directions. (True/False)

A. True

B. False

63. Directional antennas focus signals in a specific direction. (True/False)

A. True

B. False
64. Parabolic dish antennas are an example of directional antenna. (True/False)

A. True

B. False

65. An antenna's gain indicates its power amplification capability. (True/False)

A. True

B. False

66. Beamwidth defines the angular width for directional antenna's mainlobe. (True/False)

A. True

B. False

67. Higher frequencies like 5 GHz have better penetration compared to lower frequencies.
(True/False)

A. True

B. False

68. Transmit power impacts the coverage range while antenna gain impacts directionality.
(True/False)

A. True

B. False

69. AP placement, transmit power and antennas affect the overall WLAN cell design. (True/False)

A. True

B. False

70. Physical barriers like walls and reflective materials impact wireless propagation. (True/False)

A. True

B. False

71. Radio resource management (RRM) dynamically assigns channels and power to APs.
(True/False)
A. True

B. False

72. Setting appropriate country code ensures legal operation as per local regulations. (True/False)

A. True

B. False

73. Minimum overlap between APs reduces co-channel interference on the WLAN. (True/False)

A. True

B. False

74. STAs connect to the AP with the strongest signal strength (RSSI). (True/False)

A. True

B. False

75. Modulation coding scheme (MCS) adapts PHY data rates to link conditions. (True/False)

A. True

B. False

76. Mobile IP allows retaining the same IP address as clients roam across subnets. (True/False)

A. True

B. False

77. Hierarchical design divides the network into core, distribution and access layers. (True/False)

A. True

B. False

78. The access layer connects wireless and wired endpoints to the network. (True/False)

A. True

B. False

79. MPLS tunnels layer 3 packets between distant endpoints. (True/False)


A. True

B. False

80. GRE encapsulates layer 3 packets over layer 3 networks. (True/False)

A. True

B. False

81. SD-WAN simplifies branch connectivity by virtualizing WAN links. (True/False)

A. True

B. False

82. Campus networks provide connectivity within a limited geographical area. (True/False)

A. True

B. False

83. A CAN provides connectivity between buildings in a campus environment. (True/False)

A. True

B. False

84. Small networks usually use a star topology with a central controller. (True/False)

A. True

B. False

85. Mesh networks provide redundant connections between peer nodes. (True/False)

A. True

B. False

86. STP blocks redundant links to prevent loops in switched networks. (True/False)

A. True

B. False

87. RSTP provides faster convergence than STP in case of topology changes. (True/False)
A. True

B. False

88. TRILL replaces STP and forwards traffic along the shortest path. (True/False)

A. True

B. False

89. Fabric Connect creates active-active multipath networks. (True/False)

A. True

B. False

90. VXLAN tunnels layer 2 packets over layer 3 networks. (True/False)

A. True

B. False

91. EVPNs connect remote sites to form a unified bridge domain. (True/False)

A. True

B. False

92. CAPWAP securely tunnels traffic between wireless APs and controllers. (True/False)

A. True

B. False

93. Traffic engineering optimizes network paths based on bandwidth, latency etc. (True/False)

A. True

B. False

94. Multicast replication techniques efficiently send data to multiple receivers. (True/False)

A. True

B. False

95. PIM dynamically prunes multicast delivery tree as receivers join/leave. (True/False)
A. True

B. False

96. Wireless AP discovery and join process is defined in which protocol?

A. SNMP

B. DHCP

C. DNS

D. CAPWAP

97. Which protocol can encrypt control and data connections between APs and controller?

A. IPsec

B. MACsec

C. DTLS

D. SSL

98. How does an AP discover the wireless controller when booting up?

A. Broadcast

B. Multicast

C. DNS query

D. Option 43

99. After CAPWAP tunnels are setup, what information does the AP get from the controller?

A. IP address

B. Config and software image

C. License key

D. All of the above

100. Which forwarding mode avoids tunneling overhead by switching data traffic locally?

A. Central forwarding
B. Distributed forwarding

C. Remote forwarding

D. Direct forwarding

101. HSB helps synchronize dynamic state information between active and standby wireless
controllers. (True/False)

A. True

B. False

102. If primary controller fails, AP CAPWAP tunnel is redirected to the secondary controller.
(True/False)

A. True

B. False

103. Client load balancing helps distribute wireless clients evenly across APs. (True/False)

A. True

B. False

104. Band steering steers dual-band clients to 5 GHz networks when possible. (True/False)

A. True

B. False

105. Airtime scheduling allocates channel access time fairly between wireless clients. (True/False)

A. True

B. False

106. When roaming between APs, the client first reassociates before disassociation. (True/False)

A. True

B. False

107. PMK caching retains shared keys to avoid full authentication upon roaming. (True/False)

A. True
B. False

108. Opportunistic

Here are the remaining multiple choice questions:

109. Opportunistic key caching (OKC) retains PMK after clients roam away from an AP.
(True/False)

A. True

B. False

110. The R0 key is derived upon fast transition between APs and used for data encryption.
(True/False)

A. True

B. False

111. The mobility domain stores security context like keys to enable fast roaming. (True/False)

A. True

B. False

112. Which technique helps discover and contain rogue APs on the network?

A. WIDS

B. WIPS

C. MDKS

D. MPSK

113. Wireless IPS can disconnect or isolate clients of detected rogue APs. (True/False)

A. True

B. False

114. Honeypots decoy and distract attackers away from production networks. (True/False)

A. True

B. False
115. DoS flood attacks can disrupt wireless connectivity and availability. (True/False)

A. True

B. False

116. Minimum AP overlap ensures seamless connectivity and roaming. (True/False)

A. True

B. False

117. Dynamic channel selection avoids interference and fractured coverage. (True/False)

A. True

B. False

118. The country code forces APs to comply with local regulations. (True/False)

A. True

B. False

119. Higher AP density leads to greater co-channel interference. (True/False)

A. True

B. False

120. PHY data rates adapt down based on low RSSI and errors. (True/False)

A. True

B. False

121. Opportunistic key caching (OKC) retains PMK after clients roam away from an AP.
(True/False)

A. True

B. False

122. The R0 key is derived upon fast transition between APs and used for data encryption.
(True/False)

A. True
B. False

123. The mobility domain stores security context like keys to enable fast roaming. (True/False)

A. True

B. False

124. Which technique helps discover and contain rogue APs on the network?

A. WIDS

B. WIPS

C. MDKS

D. MPSK

125. Wireless IPS can disconnect or isolate clients of detected rogue APs. (True/False)

A. True

B. False

126. Honeypots decoy and distract attackers away from production networks. (True/False)

A. True

B. False

127. DoS flood attacks can disrupt wireless connectivity and availability. (True/False)

A. True

B. False

128. Minimum AP overlap ensures seamless connectivity and roaming. (True/False)

A. True

B. False

129. Dynamic channel selection avoids interference and fractured coverage. (True/False)

A. True

B. False
130. The country code forces APs to comply with local regulations. (True/False)

A. True

B. False

131. Higher AP density leads to greater co-channel interference. (True/False)

A. True

B. False

132. PHY data rates adapt down based on low RSSI and errors. (True/False)

A. True

B. False

133. VLANs logically segment traffic over common physical infrastructure. (True/False)

A. True

B. False

134. APs tunnel traffic from wireless clients back to a central controller. (True/False)

A. True

B. False

135. GRE tunnels encapsulate layer 3 packets over layer 3 networks. (True/False)

A. True

B. False

136. SDN centralizes network control logic from underlying infrastructure. (True/False)

A. True

B. False

137. Northbound APIs interface between apps and SDN controllers. (True/False)

A. True

B. False
138. Which popular protocol implements communication between SDN layers?

A. SNMP

B. OpenFlow

C. NETCONF

D. RESTCONF

139. Campus networks provide connectivity across a limited geographic area. (True/False)

A. True

B. False

140. A CAN interconnects buildings like labs, offices, dorms on a campus. (True/False)

A. True

B. False

141. A WAN provides connectivity across a wide geographic area. (True/False)

A. True

B. False

142. Small networks usually use a star topology centered around a controller. (True/False)

A. True

B. False

143. Mesh networks have redundant connections between peer nodes. (True/False)

A. True

B. False

144. What is another name for a layer 2 multipath active-active network?

A. TRILL

B. SPB

C. Fabric Connect
D. EVPN

145. VXLAN encapsulates layer 2 packets inside layer 3 packets. (True/False)

A. True

B. False

146. Which WLAN tunneling protocol is used between APs and wireless controller?

A. PPTP

B. L2TP

C. CAPWAP

D. IPsec

147. Traffic engineering tweaks network paths based on bandwidth, latency etc. (True/False)

A. True

B. False

148. Multicast replication efficiently sends data to receivers. (True/False)

A. True

B. False

149. PIM builds optimal multicast delivery trees based on active receivers. (True/False)

A. True

B. False

150. Wireless networks allow easy mobility using distributed APs connected wirelessly.
(True/False)

A. True

B. False

151. Multiple APs can share the same SSID to form one extended logical network. (True/False)

A. True

B. False
152. AP discovery involves steps like DHCP, DNS, broadcasting and unicast discovery. (True/False)

A. True

B. False

153. The controller provisions software image, license and configuration to an AP. (True/False)

A. True

B. False

154. Centralized data forwarding tunnels all traffic through the wireless controller. (True/False)

A. True

B. False

155. Local MAC caching reduces overhead compared to centralized data tunneling. (True/False)

A. True

B. False

156. HSB enables state synchronization between active and standby wireless controllers.
(True/False)

A. True

B. False

157. When primary controller fails, AP CAPWAP tunnels transfer to backup controller. (True/False)

A. True

B. False

158. Wireless clients constantly scan and reassociate to stay on optimal AP. (True/False)

A. True

B. False

159. Opportunistic PMK caching retains PMK after clients roam from an AP. (True/False)

A. True
B. False

160. The R1 key is derived after initial 802.1X authentication between client and AS. (True/False)

A. True

B. False

161. Key hierarchy, IAPP, MDID help enable fast secure roaming. (True/False)

A. True

B. False

162. WPA3 introduces more robust authentication protocols like SAE. (True/False)

A. True

B. False

163. OWE provides encryption for open networks with no authentication. (True/False)

A. True

B. False

164. Rogue AP containment disconnects clients to isolate wireless threats. (True/False)

A. True

B. False

165. Wireless IDS identifies intrusions, rogue APs, DoS attacks on WLAN. (True/False)

A. True

B. False

166. Wireless IPS can block or isolate clients and APs in response to threats. (True/False)

A. True

B. False

167. Evil twin APs impersonate legitimate networks to steal user data. (True/False)

A. True
B. False

168. FHSS avoids interference by hopping across available frequency band. (True/False)

A. True

B. False

169. In a centralized WLAN, RRM adjusts channels, power for optimal coverage. (True/False)

A. True

B. False

170. Minimum cell overlap ensures seamless roaming between APs. (True/False)

A. True

B. False

171. MCS index determines PHY rate based on modulation, coding and streams. (True/False)

A. True

B. False

172. PMK caching retains master session key to avoid full reauthentication. (True/False)

A. True

B. False

173. OKC opportunistically retains PMK after clients move away from an AP. (True/False)

A. True

B. False

174. IAPP propagates encryption keys between APs during L2/L3 roaming. (True/False)

A. True

B. False

175. The MDID identifies a mobility domain for seamless fast roaming. (True/False)

A. True
B. False

176. SAE provides stronger authentication using a password-based handshake. (True/False)

A. True

B. False

177. PMKID caching stores PMKID from initial authentication for rekeying. (True/False)

A. True

B. False

178. The R0 key encrypts data after FT authentication with target AP. (True/False)

A. True

B. False

179. Passive scanning listens for beacon frames without probing. (True/False)

A. True

B. False

180. Active scanning probes networks by sending request frames. (True/False)

A. True

B. False

181. Open system authentication allows any device to connect. (True/False)

A. True

B. False

182. All management frames use link layer encryption after association. (True/False)

A. True

B. False

183. CCMP provides stronger encryption than TKIP in WPA2. (True/False)

A. True
B. False

184. Fast roaming uses caching, preauthentication and key hierarchy. (True/False)

A. True

B. False

185. The supplicant wants network access and initiates authentication. (True/False)

A. True

B. False

186. The authenticator enforces access policy for the wireless network. (True/False)

A. True

B. False

187. The RADIUS server matches credentials to authorize network access. (True/False)

A. True

B. False

188. PEAP encapsulates EAP authentication inside a TLS tunnel. (True/False)

A. True

B. False

189. TACACS+ separates AAA services of authentication, authorization and audit. (True/False)

A. True

B. False

190. EAP-FAST provides secure tunneling without requiring certificates. (True/False)

A. True

B. False

191. Hotspot 2.0 allows cellular-like roaming between WiFi networks. (True/False)

A. True
B. False

192. ANQP automatically conveys network services and capabilities. (True/False)

A. True

B. False

193. 802.11k allows APs to share information about network topology and conditions.
(True/False)

A. True

B. False

194. 802.11v enables direct client-to-client transfers for better throughput. (True/False)

A. True

B. False

195. 802.11r uses fast BSS transition to enable faster roaming handoffs. (True/False)

A. True

B. False

196. 802.11w protects management frames encryption and integrity. (True/False)

A. True

B. False

197. TPC reports transmit power and link margins between AP and client. (True/False)

A. True

B. False

198. BSS Transition Management frames help with securing roaming. (True/False)

A. True

B. False

199. PMK caching retains master session key to avoid full reauthentication. (True/False)

A. True
B. False

200. OKC opportunistically retains PMK after clients move away from an AP. (True/False)

A. True

B. False

Here are the correct answers for the 200 multiple choice questions:

1. A
2. C
3. C
4. B
5. A
6. B
7. A
8. B
9. B
10. C
11. B
12. B
13. D
14. C
15. C
16. C
17. A
18. C
19. C
20. A
21. A
22. A
23. A
24. A
25. D
26. A
27. B
28. A
29. A
30. A
31. C
32. A
33. C
34. B
35. A
36. A
37. A
38. A
39. A
40. B
41. A
42. C
43. B
44. A
45. B
46. A
47. B
48. A
49. A
50. B
51. A
52. A
53. A
54. A
55. A
56. A
57. A
58. A
59. A
60. A
61. A
62. A
63. A
64. A
65. B
66. A
67. B
68. A
69. A
70. A
71. A
72. A
73. A
74. A
75. A
76. B
77. A
78. A
79. A
80. A
81. A
82. A
83. A
84. B
85. A
86. A
87. A
88. A
89. A
90. A
91. A
92. A
93. A
94. A
95. A
96. D
97. C
98. D
99. D
100. D
101. A
102. A
103. A
104. A
105. A
106. B
107. A
108. A
109. A
110. A
111. A
112. B
113. A
114. A
115. A
116. A
117. A
118. A
119. B
120. A
121. A
122. A
123. A
124. B
125. A
126. A
127. A
128. A
129. A
130. A
131. B
132. A
133. A
134. A
135. A
136. A
137. A
138. B
139. A
140. A
141. A
142. B
143. A
144. C
145. A
146. C
147. A
148. A
149. A
150. A
151. A
152. A
153. A
154. B
155. A
156. A
157. A
158. B
159. A
160. A
161. A
162. A
163. A
164. A
165. A
166. A
167. A
168. B
169. A
170. A
171. A
172. A
173. A
174. A
175. A
176. A
177. A
178. B
179. A
180. A
181. A
182. B
183. A
184. A
185. A
186. A
187. A
188. A
189. A
190. A
191. A
192. A
193. A
194. A
195. A
196. A
197. A
198. B
199. A
200. A

Here are 200 single-answer multiple choice questions with 4 choices and answers generated from
the WLAN PDF files:

1. Which wireless technology provides short range connectivity between devices like laptops and
smartphones?

A. WWAN
B. WMAN
C. WLAN
D. WPAN

Answer: D

2. Which of the following is NOT a common WPAN technology?

A. ZigBee
B. Bluetooth
C. WiMAX
D. NFC

Answer: C

3. Which IEEE standard defines the specifications for Wireless Local Area Networks (WLANs)?

A. 802.15
B. 802.11
C. 802.16
D. 802.20

Answer: B

4. Which frequency bands are used by WLAN technologies?

A. 900 MHz and 2.4 GHz


B. 3.6 GHz and 5 GHz
C. 2.4 GHz and 5 GHz
D. 5 GHz and 60 GHz

Answer: C

5. Which amendment added specifications for the 5 GHz frequency band to the original 2.4 GHz
802.11 standard?

A. 802.11g
B. 802.11n
C. 802.11a
D. 802.11b

Answer: C

6. Which WLAN standard introduced Multiple Input Multiple Output (MIMO) technology?

A. 802.11a
B. 802.11ac
C. 802.11g
D. 802.11n

Answer: D

7. Which term refers to certified interoperable WLAN products based on the 802.11 standards?

A. WaveLAN
B. Wi-Fi
C. WinLAN
D. LMDS

Answer: B

8. Which early wireless network technology first demonstrated the feasibility of wireless LANs?

A. ALOHAnet
B. Wi-Fi
C. WaveLAN
D. WINLAN
Answer: A

9. Which 802.11 amendment aims to deliver high speed and low latency Wi-Fi connectivity?

A. 802.11ad
B. 802.11ac
C. 802.11n
D. 802.11ax

Answer: D

10. Which modulation technique is used in 802.11n/ac/ax standards for high throughput?

A. PAM
B. OFDM
C. FHSS
D. DSSS

Answer: B

11. How does OFDM enable high throughput in WLAN standards?

A. Amplitude modulation
B. Frequency modulation
C. Multiple narrowband subcarriers
D. High frequency carrier

Answer: C

12. Which 802.11 amendment allows the use of 80 MHz and 160 MHz channel bandwidths?

A. 802.11ac
B. 802.11n
C. 802.11ax
D. 802.11ad

Answer: A

13. Which modulation scheme supports the highest data rate in 802.11ax?

A. 256-QAM
B. 16-QAM
C. 64-QAM
D. 1024-QAM

Answer: D
14. Which technique involves the transmission of multiple data streams over multiple antennas?

A. DFS
B. MIMO
C. OFDMA
D. MU-MIMO

Answer: B

15. Which 802.11 amendment introduced uplink multiuser transmissions?

A. 802.11ac
B. 802.11n
C. 802.11ax
D. 802.11ad

Answer: C

16. Which mechanism differentiates BSSs in dense deployments to reduce interference in


802.11ax?

A. Spatial streams
B. MU-MIMO
C. BSS coloring
D. TWT

Answer: C

17. During active scanning, which frames does a client station send to discover nearby APs?

A. Authentication Request
B. Probe Request
C. Beacon
D. Association Request

Answer: B

18. Which frame type helps in network discovery during passive scanning?

A. Authentication Request
B. Probe Response
C. Association Response
D. Beacon

Answer: D

19. Which authentication protocol involves a challenge-response handshake?


A. EAP
B. Shared key
C. WPA2
D. Open system

Answer: B

20. Before association, a client has to be authenticated by the AP. (True/False)

A. False
B. True

Answer: B

21. The association process establishes the data connection between the client and AP.
(True/False)

A. False
B. True

Answer: B

22. Fast BSS transition in 802.11r enables faster roaming between APs by reducing handoff delays.
(True/False)

A. False
B. True

Answer: B

23. PMK caching helps speed up roaming by retaining shared keys on the AP. (True/False)

A. False
B. True

Answer: B

24. Which roaming scenario involves movement between APs controlled by the same wireless
controller?

A. Inter-controller
B. Intra-controller
C. Inter-subnet
D. Inter-VLAN

Answer: B
25. Which roaming scenario involves movement between APs controlled by different wireless
controllers?

A. Intra-controller
B. Inter-VLAN
C. Inter-controller
D. Intra-subnet

Answer: C

26. Which mechanism synchronizes client data between controllers to support seamless roaming?

A. HREAP
B. PKC
C. IAPP
D. OKC

Answer: C

27. Which 802.11 layer uses CSMA/CA for channel access to avoid collisions?

A. Data link layer


B. Physical layer
C. Transport layer
D. Network layer

Answer: A

28. Short InterFrame Space (SIFS) provides priority access for time-sensitive ACK frames.
(True/False)

A. False
B. True

Answer: B

29. Point Coordinate Function (PCF) enables contention-free polling access on the wireless
medium. (True/False)

A. False
B. True

Answer: B

30. Which 802.11 frame type is used by the AP and client during association and authentication?

A. Control
B. Management
C. Data
D. Action

Answer: B

31. Which technique aggregates small frames to improve MAC efficiency over the air?

A. A-MSDU
B. PPDU
C. Frame bursting
D. A-MPDU

Answer: D

32. Which method aggregates ACKs to provide cumulative acknowledgement of multiple MPDUs?

A. Fast ACK
B. Batched ACK
C. Cumulative ACK
D. Block ACK

Answer: D

33. Which diversity technique sends redundant streams across space and time to improve
reception?

A. MIMO
B. STBC
C. OFDM
D. LDPC

Answer: B

34. Which 802.11 technology allows downlink transmission to multiple clients simultaneously?

A. MU-MIMO
B. SU-MIMO
C. OFDMA
D. STBC

Answer: A

35. Spatial streams represent independent data streams between the transmitter and receiver.
(True/False)

A. False
B. True
Answer: B

36. Dynamic frequency selection (DFS) helps avoid radar interference by switching channels when
needed. (True/False)

A. False
B. True

Answer: B

37. Which power saving feature in 802.11ax schedules specific wakeup times for clients?

A. DTIM
B. TWT
C. SMPS
D. PSMP

Answer: B

38. The basic service set (BSS) refers to the AP and its associated clients. (True/False)

A. False
B. True

Answer: B

39. The service set identifier (SSID) is the name of the wireless network. (True/False)

A. False
B. True

Answer: B

40. The basic service area (BSA) connects multiple BSSs in a wireless network. (True/False)

A. True
B. False

Answer: B

41. The extended service set (ESS) connects multiple APs and BSSs into one logical network.
(True/False)

A. False
B. True

Answer: B
42. Which security protocol is part of the IEEE 802.11i standard?

A. WPA
B. WPA3
C. WPA2
D. WEP

Answer: C

43. Which encryption protocol is stronger - TKIP or CCMP?

A. TKIP
B. CCMP

Answer: B

44. WPA3 introduces new authentication mechanisms like SAE to replace the PSK protocol.
(True/False)

A. False
B. True

Answer: B

45. Which authentication protocol uses a pre-shared key (PSK) for network access?

A. LEAP
B. EAP
C. PEAP
D. PSK

Answer: D

46. 802.1X port-based access control uses EAP for authentication and key management.
(True/False)

A. False
B. True

Answer: B

47. Which authentication server matches user credentials and decides access rights?

A. AC
B. NAS
C. CA
D. AS
Answer: D

48. RADIUS combines authentication, authorization and accounting functions. (True/False)

A. False
B. True

Answer: B

49. Which entity initiates authentication and wants to access network resources?

A. Authentication server
B. Supplicant
C. Accounting server
D. Authenticator

Answer: B

50. Which entity enforces authentication policies and allows network access?

A. Supplicant
B. Accounting server
C. Authenticator
D. Authentication server

Answer: C

51. Mutual authentication verifies the identity of both client and authentication server.
(True/False)

A. False
B. True

Answer: B

52. Fast roaming uses PMK caching, key hierarchy and other methods to reduce handoff delays.
(True/False)

A. False
B. True

Answer: B

53. Opportunistic key caching (OKC) retains PMK after clients roam away from an AP. (True/False)

A. False
B. True
Answer: B

54. Key scope indicates when a PMK or key is no longer valid as client roams. (True/False)

A. True
B. False

Answer: A

55. The R1 key is derived after the initial 802.1X authentication between client and AS.
(True/False)

A. False
B. True

Answer: B

56. IAPP distributes client context like security keys between APs. (True/False)

A. False
B. True

Answer: B

57. A wireless intrusion detection system (WIDS) identifies security threats on the WLAN.
(True/False)

A. False
B. True

Answer: B

58. A wireless intrusion prevention system (WIPS) can block wireless attacks and threats.
(True/False)

A. False
B. True

Answer: B

59. Client isolation blocks wireless clients on the same SSID from communicating directly.
(True/False)

A. False
B. True

Answer: B
60. Evil twin APs impersonate legitimate networks to steal user data. (True/False)

A. False
B. True

Answer: B

61. Wireless networks use unguided electromagnetic waves propagating freely through space.
(True/False)

A. False
B. True

Answer: B

62. Omnidirectional antennas provide equal coverage in all horizontal directions. (True/False)

A. False
B. True

Answer: B

63. Directional antennas focus signals in a specific direction. (True/False)

A. False
B. True

Answer: B

64. Parabolic dish antennas are an example of directional antenna. (True/False)

A. False
B. True

Answer: B

65. An antenna's gain indicates its power amplification capability. (True/False)

A. True
B. False

Answer: B

66. Beamwidth defines the angular width for directional antenna's mainlobe. (True/False)

A. False
B. True
Answer: B

67. Higher frequencies like 5 GHz have better penetration compared to lower frequencies.
(True/False)

A. True
B. False

Answer: B

68. Transmit power impacts the coverage range while antenna gain impacts directionality.
(True/False)

A. False
B. True

Answer: B

69. AP placement, transmit power and antennas affect the overall WLAN cell design. (True/False)

A. False
B. True

Answer: B

70. Physical barriers like walls and reflective materials impact wireless propagation. (True/False)

A. False
B. True

Answer: B

71. Radio resource management (RRM) dynamically assigns channels and power to APs.
(True/False)

A. False
B. True

Answer: B

72. Setting appropriate country code ensures legal operation as per local regulations. (True/False)

A. False
B. True

Answer: B

73. Minimum overlap between APs reduces co-channel interference on the WLAN. (True/False)
A. False
B. True

Answer: B

74. STAs connect to the AP with the strongest signal strength (RSSI). (True/False)

A. False
B. True

Answer: B

75. Modulation coding scheme (MCS) adapts PHY data rates to link conditions. (True/False)

A. False
B. True

Answer: B

76. Mobile IP allows retaining the same IP address as clients roam across subnets. (True/False)

A. True
B. False

Answer: B

77. Hierarchical design divides the network into core, distribution and access layers. (True/False)

A. False
B. True

Answer: B

78. The access layer connects wireless and wired endpoints to the network. (True/False)

A. False
B. True

Answer: B

79. MPLS tunnels layer 3 packets between distant endpoints. (True/False)

A. False
B. True

Answer: B
80. GRE encapsulates layer 3 packets over layer 3 networks. (True/False)

A. False
B. True

Answer: B

81. SD-WAN simplifies branch connectivity by virtualizing WAN links. (True/False)

A. False
B. True

Answer: B

82. Campus networks provide connectivity within a limited geographical area. (True/False)

A. False
B. True

Answer: B

83. A CAN provides connectivity between buildings in a campus environment. (True/False)

A. False
B. True

Answer: B

84. Small networks usually use a star topology with a central controller. (True/False)

A. True
B. False

Answer: B

85. Mesh networks provide redundant connections between peer nodes. (True/False)

A. False
B. True

Answer: B

86. STP blocks redundant links to prevent loops in switched networks. (True/False)

A. False
B. True

Answer: B
87. RSTP provides faster convergence than STP in case of topology changes. (True/False)

A. False
B. True

Answer: B

88. TRILL replaces STP and forwards traffic along the shortest path. (True/False)

A. True
B. False

Answer: B

89. Fabric Connect creates active-active multipath networks. (True/False)

A. False
B. True

Answer: B

90. VXLAN tunnels layer 2 packets over layer 3 networks. (True/False)

A. False
B. True

Answer: B

91. EVPNs connect remote sites to form a unified bridge domain. (True/False)

A. False
B. True

Answer: B

92. CAPWAP securely tunnels traffic between wireless APs and controllers. (True/False)

A. False
B. True

Answer: B

93. Traffic engineering optimizes network paths based on bandwidth, latency etc. (True/False)

A. False
B. True
Answer: B

94. Multicast replication techniques efficiently send data to multiple receivers. (True/False)

A. False
B. True

Answer: B

95. PIM dynamically prunes multicast delivery tree as receivers join/leave. (True/False)

A. False
B. True

Answer: B

96. Wireless AP discovery and join process is defined in which protocol?

A. SNMP
B. CAPWAP
C. DNS
D. DHCP

Answer: B

97. Which protocol can encrypt control and data connections between APs and controller?

A. SSL
B. IPsec
C. MAC
Here are the remaining multiple choice questions:

97. Which protocol can encrypt control and data connections between APs and controller?

A. SSL
B. IPsec
C. MACsec
D. DTLS

Answer: D

98. How does an AP discover the wireless controller when booting up?

A. Multicast
B. DNS query
C. Broadcast
D. Option 43
Answer: D

99. After CAPWAP tunnels are setup, what information does the AP get from the controller?

A. Config and software image


B. License key
C. IP address
D. All of the above

Answer: D

100. Which forwarding mode avoids tunneling overhead by switching data traffic locally?

A. Central forwarding
B. Remote forwarding
C. Distributed forwarding
D. Direct forwarding

Answer: D

101. HSB helps synchronize dynamic state information between active and standby wireless
controllers. (True/False)

A. False
B. True

Answer: B

102. If primary controller fails, AP CAPWAP tunnel is redirected to the secondary controller.
(True/False)

A. False
B. True

Answer: B

103. Client load balancing helps distribute wireless clients evenly across APs. (True/False)

A. False
B. True

Answer: B

104. Band steering steers dual-band clients to 5 GHz networks when possible. (True/False)

A. False
B. True
Answer: B

105. Airtime scheduling allocates channel access time fairly between wireless clients. (True/False)

A. True
B. False

Answer: B

106. When roaming between APs, the client first reassociates before disassociation. (True/False)

A. False
B. True

Answer: B

107. PMK caching retains shared keys to avoid full authentication upon roaming. (True/False)

A. False
B. True

Answer: B

108. Opportunistic key caching (OKC) retains PMK after clients roam away from an AP.
(True/False)

A. False
B. True

Answer: B

109. The R0 key is derived upon fast transition between APs and used for data encryption.
(True/False)

A. False
B. True

Answer: B

110. The mobility domain stores security context like keys to enable fast roaming. (True/False)

A. False
B. True

Answer: B

111. Which technique helps discover and contain rogue APs on the network?
A. MPSK
B. MDKS
C. WIPS
D. WIDS

Answer: D

112. Wireless IPS can disconnect or isolate clients of detected rogue APs. (True/False)

A. False
B. True

Answer: B

113. Honeypots decoy and distract attackers away from production networks. (True/False)

A. False
B. True

Answer: B

114. DoS flood attacks can disrupt wireless connectivity and availability. (True/False)

A. False
B. True

Answer: B

115. Minimum AP overlap ensures seamless connectivity and roaming. (True/False)

A. True
B. False

Answer: B

116. Dynamic channel selection avoids interference and fractured coverage. (True/False)

A. False
B. True

Answer: B

117. The country code forces APs to comply with local regulations. (True/False)

A. True
B. False

Answer: B
118. Higher AP density leads to greater co-channel interference. (True/False)

A. False
B. True

Answer: B

119. PHY data rates adapt down based on low RSSI and errors. (True/False)

A. False
B. True

Answer: B

120. Opportunistic key caching (OKC) retains PMK after clients roam away from an AP.
(True/False)

A. False
B. True

Answer: B

121. The R0 key is derived upon fast transition between APs and used for data encryption.
(True/False)

A. True
B. False

Answer: B

122. The mobility domain stores security context like keys to enable fast roaming. (True/False)

A. False
B. True

Answer: B

123. Which technique helps discover and contain rogue APs on the network?

A. MPSK
B. WIPS
C. WIDS
D. MDKS

Answer: C

124. Wireless IPS can disconnect or isolate clients of detected rogue APs. (True/False)
A. False
B. True

Answer: B

125. Honeypots decoy and distract attackers away from production networks. (True/False)

A. True
B. False

Answer: B

126. DoS flood attacks can disrupt wireless connectivity and availability. (True/False)

A. False
B. True

Answer: B

127. Minimum AP overlap ensures seamless connectivity and roaming. (True/False)

A. False
B. True

Answer: B

128. Dynamic channel selection avoids interference and fractured coverage. (True/False)

A. True
B. False

Answer: B

129. The country code forces APs to comply with local regulations. (True/False)

A. False
B. True

Answer: B

130. Higher AP density leads to greater co-channel interference. (True/False)

A. False
B. True

Answer: B
131. PHY data rates adapt down based on low RSSI and errors. (True/False)

A. True
B. False

Answer: B

132. VLANs logically segment traffic over common physical infrastructure. (True/False)

A. False
B. True

Answer: B

133. APs tunnel traffic from wireless clients back to a central controller. (True/False)

A. False
B. True

Answer: B

134. GRE tunnels encapsulate layer 3 packets over layer 3 networks. (True/False)

A. False
B. True

Answer: B

135. SDN centralizes network control logic from underlying infrastructure. (True/False)

A. False
B. True

Answer: B

136. Northbound APIs interface between apps and SDN controllers. (True/False)

A. False
B. True

Answer: B

137. Which popular protocol implements communication between SDN layers?

A. SNMP
B. RESTCONF
C. NETCONF
D. OpenFlow
Answer: D

138. Campus networks provide connectivity across a limited geographical area. (True/False)

A. False
B. True

Answer: B

139. A CAN interconnects buildings like labs, offices, dorms on a campus. (True/False)

A. False
B. True

Answer: B

140. A WAN provides connectivity across a wide geographic area. (True/False)

A. True
B. False

Answer: B

141. Small networks usually use a star topology centered around a controller. (True/False)

A. False
B. True

Answer: B

142. Mesh networks have redundant connections between peer nodes. (True/False)

A. True
B. False

Answer: B

143. What is another name for a layer 2 multipath active-active network?

A. EVPN
B. TRILL
C. SPB
D. Fabric Connect

Answer: D

144. VXLAN encapsulates layer 2 packets inside layer 3 packets. (True/False)


A. False
B. True

Answer: B

145. Which WLAN tunneling protocol is used between APs and wireless controller?

A. PPTP
B. CAPWAP
C. L2TP
D. IPsec

Answer: B

146. Traffic engineering tweaks network paths based on bandwidth, latency etc. (True/False)

A. False
B. True

Answer: B

147. Multicast replication efficiently sends data to receivers. (True/False)

A. False
B. True

Answer: B

148. PIM builds optimal multicast delivery trees based on active receivers. (True/False)

A. False
B. True

Answer: B

149. Wireless networks allow easy mobility using distributed APs connected wirelessly.
(True/False)

A. True
B. False

Answer: B

150. Multiple APs can share the same SSID to form one extended logical network. (True/False)

A. False
B. True
Answer: B

151. AP discovery involves steps like DHCP, DNS, broadcasting and unicast discovery. (True/False)

A. False
B. True

Answer: B

152. The controller provisions software image, license and configuration to an AP. (True/False)

A. False
B. True

Answer: B

153. Centralized data forwarding tunnels all traffic through the wireless controller. (True/False)

A. True
B. False

Answer: B

154. Local MAC caching reduces overhead compared to centralized data tunneling. (True/False)

A. False
B. True

Answer: B

155. HSB enables state synchronization between active and standby wireless controllers.
(True/False)

A. False
B. True

Answer: B

156. When primary controller fails, AP CAPWAP tunnels transfer to backup controller. (True/False)

A. True
B. False

Answer: B

157. Wireless clients constantly scan and reassociate to stay on optimal AP. (True/False)
A. True
B. False

Answer: B

158. Opportunistic PMK caching retains PMK after clients roam from an AP. (True/False)

A. False
B. True

Answer: B

159. The R1 key is derived after initial 802.1X authentication between client and AS. (True/False)

A. False
B. True

Answer: B

160. Key hierarchy, IAPP, MDID help enable fast secure roaming. (True/False)

A. False
B. True

Answer: B

161. WPA3 introduces more robust authentication protocols like SAE. (True/False)

A. False
B. True

Answer: B

162. OWE provides encryption for open networks with no authentication. (True/False)

A. False
B. True

Answer: B

163. Rogue AP containment disconnects clients to isolate wireless threats. (True/False)

A. False
B. True

Answer: B

164. Wireless IDS identifies intrusions, rogue APs, DoS attacks on WLAN. (True/False)
A. False
B. True

Answer: B

165. Wireless IPS can block or isolate clients and APs in response to threats. (True/False)

A. True
B. False

Answer: B

166. Evil twin APs impersonate legitimate networks to steal user data. (True/False)

A. False
B. True

Answer: B

167. FHSS avoids interference by hopping across available frequency band. (True/False)

A. True
B. False

Answer: B

168. In a centralized WLAN, RRM adjusts channels, power for optimal coverage. (True/False)

A. False
B. True

Answer: B

169. Minimum cell overlap ensures seamless roaming between APs. (True/False)

A. False
B. True

Answer: B

170. MCS index determines PHY rate based on modulation, coding and streams. (True/False)

A. False
B. True

Answer: B
171. PMK caching retains master session key to avoid full reauthentication. (True/False)

A. True
B. False

Answer: B

172. OKC opportunistically retains PMK after clients move away from an AP. (True/False)

A. False
B. True

Answer: B

173. IAPP propagates encryption keys between APs during L2/L3 roaming. (True/False)

A. False
B. True

Answer: B

174. The MDID identifies a mobility domain for seamless fast roaming. (True/False)

A. False
B. True

Answer: B

175. SAE provides stronger authentication using a password-based handshake. (True/False)

A. False
B. True

Answer: B

176. PMKID caching stores PMKID from initial authentication for rekeying. (True/False)

A. True
B. False

Answer: B

177. The R0 key encrypts data after FT authentication with target AP. (True/False)

A. False
B. True

Answer: B
178. Passive scanning listens for beacon frames without probing. (True/False)

A. True
B. False

Answer: B

179. Active scanning probes networks by sending request frames. (True/False)

A. False
B. True

Answer: B

180. Open system authentication allows any device to connect. (True/False)

A. False
B. True

Answer: B

181. All management frames use link layer encryption after association. (True/False)

A. True
B. False

Answer: B

182. CCMP provides stronger encryption than TKIP in WPA2. (True/False)

A. False
B. True

Answer: B

183. Fast roaming uses caching, preauthentication and key hierarchy. (True/False)

A. False
B. True

Answer: B

184. The supplicant wants network access and initiates authentication. (True/False)

A. False
B. True
Answer: B

185. The authenticator enforces access policy for the wireless network. (True/False)

A. False
B. True

Answer: B

186. The RADIUS server matches credentials to authorize network access. (True/False)

A. False
B. True

Answer: B

187. PEAP encapsulates EAP authentication inside a TLS tunnel. (True/False)

A. True
B. False

Answer: B

188. TACACS+ separates AAA services of authentication, authorization and audit. (True/False)

A. False
B. True

Answer: B

189. EAP-FAST provides secure tunneling without requiring certificates. (True/False)

A. True
B. False

Answer: B

190. Hotspot 2.0 allows cellular-like roaming between WiFi networks. (True/False)

A. False
B. True

Answer: B

191. ANQP automatically conveys network services and capabilities. (True/False)

A. False
B. True
Answer: B

192. 802.11k allows APs to share information about network topology and conditions.
(True/False)

A. True
B. False

Answer: B

193. 802.11v enables direct client-to-client transfers for better throughput. (True/False)

A. False
B. True

Answer: B

194. 802.11r uses fast BSS transition to enable faster roaming handoffs. (True/False)

A. True
B. False

Answer: B

195. 802.11w protects management frames encryption and integrity. (True/False)

A. False
B. True

Answer: B

196. TPC reports transmit power and link margins between AP and client. (True/False)

A. False
B. True

Answer: B

197. BSS Transition Management frames help with securing roaming. (True/False)

A. True
B. False

Answer: B

198. PMK caching retains master session key to avoid full reauthentication. (True/False)
A. False
B. True

Answer: B

199. OKC opportunistically retains PMK after clients move away from an AP. (True/False)

A. True
B. False

Answer: B

200. The R0 key encrypts data after FT authentication with target AP. (True/False)

A. False
B. True

Answer: B

You might also like