Professional Documents
Culture Documents
WLANQuestions 2
WLANQuestions 2
1. Wireless Personal Area Networks (WPANs) provide wireless connections in personal areas,
which are generally point-to-point connections and small-scale network connections. True
2. WPAN technologies include Bluetooth, ZigBee, and Near Field Communication (NFC). True
3. ZigBee applies to high-speed and high-power wireless networks, such as sensor networks and
wireless meter reading networks. False
5. Wireless Local Area Networks (WLANs) use 3.4 GHz and 5.8 GHz frequency bands. False
9. Wireless Metropolitan Area Networks (WMANs) provide wireless backbone coverage over a
metropolitan area. True
10. WMANs use licensed frequency bands that are not prone to interference. False
12. Wi-Fi is just another term for the IEEE 802.11 standards. True
13. The Wi-Fi Alliance uses the term "Wi-Fi CERTIFIED" to refer to certified 802.11 products that
have passed interoperability testing. True
14. Wireless network technologies were invented after the wired Ethernet standards. False
15. ALOHAnet created in 1971 was one of the earliest wireless networks, based on the University
of Hawaii. True
16. The 802.11 standard was formally approved in 1990 to define WLAN technologies. True
17. 802.11n uses only the 2.4 GHz frequency band while 802.11ac uses only the 5 GHz band. False
19. Orthogonal Frequency Division Multiplexing (OFDM) divides a channel into multiple
narrowband subcarriers. True
20. With OFDM, multiple signals can be transmitted concurrently on different subcarriers. True
21. Baseband signals have a high frequency range suitable for long distance transmission. False
22. Modulation converts baseband signals into RF signals for efficient transmission. True
23. An intermediate frequency (IF) is used in traditional modulation before converting signals into
RF. True
24. Zero-IF (ZIF) modulation converts directly between baseband and RF signals. True
25. Guided electromagnetic waves propagate in a specified path like transmission lines. True
26. Unguided waves can propagate freely in space in any direction. True
27. Radio waves are a type of electromagnetic waves that can propagate in vacuum and air. True
28. Radio waves have frequencies in the range of 3 kHz to 300 MHz. False
29. A higher frequency radio wave has a longer wavelength compared to a lower frequency wave.
False
30. The phase difference between two radio waves impacts their propagation pattern. True
31. Information signals cannot be transmitted by modulating properties of a radio wave. False
32. WLANs use the license-free ISM bands approved for Industrial, Scientific and Medical usage.
True
33. The 2.4 GHz ISM band has less interference than the 5 GHz ISM bands for WLAN usage. False
34. The channels used for WLANs in specific ISM bands are globally harmonized. False
35. WLAN channels in the 5 GHz band have shorter range but higher throughput than 2.4 GHz
channels. True
36. BPSK, QPSK, 16-QAM, 64-QAM are examples of digital modulation techniques used in WLANs.
True
37. 256-QAM carries 8 bits per symbol, 1024-QAM carries 10 bits per symbol. True
38. OFDM divides a wideband channel into many narrowband subcarriers to transmit multiple
signals. True
39. Forward error correction adds redundant bits to facilitate detection and correction of errors.
True
40. Convolutional coding is a technique used for error correction in WLANs. True
41. A higher coding rate leads to higher data rates in WLAN transmissions. True
42. 802.11n supports up to 4 spatial streams using MIMO antennas. True
43. Spatial multiplexing in MIMO allows independent data streams to be transmitted over
multiple antennas. True
44. Channel bonding aggregates multiple 20 MHz channels to increase bandwidth in 802.11n. True
45. 802.11n can achieve a PHY rate of up to 600 Mbps using four spatial streams. True
46. Short guard interval reduces overhead and increases data bits transmitted. True
47. 802.11ac provides higher throughput than 802.11n using newer techniques. True
48. 802.11ac introduces downlink multiuser MIMO for transmitting to multiple clients
simultaneously. True
49. 802.11ax defines uplink multiuser transmissions for higher efficiency. True
50. 1024-QAM enables a higher modulation order for increased throughput in 802.11ax. True
51. 802.11ax uses OFDMA to divide channels into resource units for multiple access. True
52. BSS coloring in 802.11ax differentiates between overlapping BSSs to reduce interference. True
53. An AP transmits regular beacon frames to announce presence of a wireless network. True
54. A STA uses active scanning to discover nearby APs and networks. True
55. In passive scanning, the STA listens for beacon frames to find networks. True
56. A STA must be authenticated before associating with an AP and SSID on the WLAN. True
57. Open system authentication involves a challenge-response protocol for access. False
58. The shared key authentication protocol uses WEP for authentication. True
59. To associate with an AP, the STA sends an Association Request frame. True
60. After association, the STA can exchange data frames with the AP. True
61. Roaming between APs involves scanning, authentication and reassociation. True
62. Intra-AC roaming means movement between APs on the same AC/controller. True
64. An inter-AC tunnel syncs data between controllers for seamless L3 roaming. True
65. Layer 2 roaming keeps the same IP address but L3 roaming changes the IP subnet. True
66. The home agent anchor IP is needed to forward traffic during L3 roaming events. True
67. CSMA/CA avoids collisions by using RTS/CTS and random backoff mechanisms. True
69. The Distributed Coordination Function (DCF) uses CSMA/CA for channel access. True
70. CSMA/CA draws a random backoff count to wait before transmitting data. True
71. The Point Coordination Function (PCF) uses polling for scheduled channel access. True
72. PCF polling enables prioritized access for voice and video traffic. True
73. MAC layer frames include management frames used for control signaling. True
74. Association and authentication are handled through management frame exchanges. True
75. Management frames help APs coordinate and synchronize transmissions. True
76. AMPDU aggregates multiple MPDUs to amortize overhead of PHY transmissions. True
77. Block ACK further improves efficiency by acknowledging multiple frames together. True
78. STBC helps improve reception reliability using redundancy in space and time. True
79. LDPC enables efficient error correction by sending redundant parity information. True
81. Spatial streams correspond to independent data streams between transmitter and receiver.
True
82. 802.11ax uses OFDMA for dividing channel into resource units for multiple access. True
83. DFS helps avoid interference with radar systems by frequency hopping. False
84. TWT enables scheduled wake up times for improved battery life of client devices. True
85. BSS color allows grouping of BSSs to reduce interference in 802.11ax. True
86. Dynamic frequency selection (DFS) detects radar signals and avoids interference. True
87. Short guard interval reduces overhead and increases data transmission time. True
88. STBC transmits redundant streams across space and time to improve reception. True
89. LDPC improves reception through forward error correction coding. True
91. Spatial streams allow independent data streams between transmitter and receiver. True
92. 1024-QAM modulation carries more data bits than 256-QAM modulation. True
94. The AC discovery process using DHCP and DNS is defined in CAPWAP. True
95. CAPWAP uses DTLS encryption to secure control and data connections. True
97. The AC can restrict AP access using whitelisting of serial numbers or MAC addresses. True
98. After discovery, the AP establishes CAPWAP tunnels for control and data traffic. True
99. The AC provisions the AP with software image, configurations, licenses for normal operation.
True
100. Direct data forwarding avoids tunneling overhead by switching traffic locally. True
102. HSB sync sessions ensure stateful failover between active and standby ACs. True
103. The AP CAPWAP layer joins a new AC seamlessly if the primary AC fails. True
104. Airtime scheduling can allocate channel access time to minimize collisions. True
105. Band steering helps direct dual-band clients to preferred 5GHz networks. True
106. Load balancing moves clients to optimal APs based on WLAN conditions. True
107. When roaming, the client STA scans and reassociates before disassociating the old AP. True
108. Intra-AC roaming means movement between APs managed by same controller. True
110. The authentication server matches credentials and determines access rights for a user. True
111. Open system authentication allows any device to connect without authentication. True
112. WPA2-Personal uses a pre-shared key for authentication and encryption. True
113. The robust security network (RSN) defines the IEEE 802.11i security standard. True
114. CCMP provides stronger encryption than TKIP for WPA2 connections. True
115. Fast BSS transition (FT) enables secure roaming between different APs. True
116. A supplicant is the client device that needs network access and authentication. True
117. The authenticator enforces authentication and controls network access. True
118. The authentication server matches credentials and determines access rights. True
119. Mutual authentication verifies identities of both client and authentication server. True
120. Key caching on APs avoids full EAP authentication each roam. True
121. PMK caching speeds up roaming by retaining shared keys on APs. True
122. Opportunistic key caching retains PMK after clients roam from an AP. True
123. The RADIUS server matches credentials and makes access control decisions. True
125. EAP-TLS uses client-side certificates instead of passwords for strong authentication. True
127. 802.1X configures port-based access control using EAP authentication. True
128. Portal authentication redirects web traffic to a login page for credentials. True
129. Open SSIDs allow clients to connect without any authentication. True
130. MAC address filtering controls access based on client MAC addresses. True
131. Users must accept terms and conditions when connecting to a guest SSID. True
132. PSK authentication uses a pre-shared key between AP and client for access. True
133. WPA3 introduces new authentication protocols like SAE and Suite B. True
134. OWE authentication encrypts open networks to provide data privacy. True
135. SAE handshake replaces PSK with a password authenticated key exchange. True
136. Suite B cryptography uses elliptic curves for key exchange strength. True
137. WIDS monitors the WLAN for rogue APs and other security threats. True
139. WIPS can disable or contain rogue APs and other wireless threats. True
140. Client isolation blocks L2 traffic between associated wireless clients. True
141. HTTPS inspection decrypts SSL traffic for visibility and control. True
142. Wang posters and Honeypots attract attackers to divert them from real networks. True
143. Evil twin APs mimic real networks to trick users into connecting to them. True
144. DoS attacks flood the network to disrupt connectivity and availability. True
145. Transmission power directly impacts the coverage range of an AP. True
146. Higher gain directional antennas focus signals in a specific area. True
147. AP placement, antennas and transmit power all affect cell sizing. True
148. Overlapping AP cells with lower power reduce co-channel interference. True
149. APs should use varying channels to minimize interference on the WLAN. True
152. In a centralized WLAN, the controller handles RRM across APs. True
153. The country code configures channels and power as per local regulations. True
154. Clients connect to the AP with the strongest received signal strength (RSSI). True
155. PHY data rates dynamically adapt to channel conditions using MCS. True
157. OKC opportunistically retains PMK after clients roam from an AP. True
158. PKC proactively caches PMK on APs where client may roam. True
159. H-controller designates a backup controller for mobility resiliency. True
161. The R0 key is derived upon FT authentication and used for data encryption. True
162. The mobility domain stores context like keys to support fast roaming. True
163. IAPP distributes client, security and other context between APs. True
164. Wireless intrusion detection identifies security threats on the WLAN. True
167. Client isolation blocks wireless clients from communicating directly. True
168. IPv4 uses 32 bit addresses allowing about 4 billion IP addresses. True
169. IPv6 uses 128 bit addresses for vastly increased address space. True
170. NAT conserves IPv4 addresses by masking internal RFC1918 addresses. True
171. DHCP automatically assigns IP addresses, subnet masks, default gateways to clients. True
173. APs tunnel traffic from wireless clients back to a central controller. True
174. GRE tunnels encapsulate one protocol packet over another protocol. True
175. ORAM optimizes routing across access points based on client locations. True
176. LISP separates device identity from location identity using namespaces. True
177. SDN centralizes network control logic from underlying infrastructure. True
178. Northbound APIs allow applications to programmatically interface with SDN controller. True
180. Campus networks connect endpoints like buildings, departments within a large area. True
181. A CAN provides connectivity between buildings on a corporate or university campus. True
185. Mesh topologies have interconnected nodes that can all route data. True
186. Ring topologies connect each node to exactly two adjacent nodes to form a loop. True
187. STP prevents loops by blocking redundant paths in switched networks. True
188. RSTP provides faster convergence than STP by reducing forward delay. True
189. MSTP maps VLANs to spanning trees for load balancing. True
190. TRILL replaces STP using shortest path forwarding across Ethernet fabric. True
191. Fabric Connnect creates Layer 2 multipath networks without STP. True
192. EVPNs connect remote sites to form a unified LAN over the WAN. True
193. VXLAN encapsulates L2 packets inside L3 packets for transport over fabrics. True
194. NVGRE also tunnels L2 packets over L3 networks just like VXLAN. True
195. CAPWAP tunnels securely transport WLAN traffic between APs and controllers. True
196. MPLS labels packets for fast forwarding across the core. True
197. Traffic engineering optimizes network paths based on bandwidth, latency etc. True
198. Headend replication sends multicast traffic from source to each destination. True
199. Tailend replication has routers replicate at fanout points to reach receivers. True
200. Bidirectional PIM signals between sources and receivers to build distribution trees. True
Here are 200 single-answer multiple choice questions generated from the WLAN PDF files:
1. Which wireless technology is used for short distance communication between devices like
laptops and smartphones?
A. WPAN
B. WLAN
C. WMAN
D. WWAN
A. Bluetooth
B. ZigBee
C. WiMAX
D. NFC
3. Which IEEE standard defines the specifications for Wireless Local Area Networks (WLANs)?
A. 802.15
B. 802.16
C. 802.11
D. 802.20
5. Which amendment added specifications for the 5 GHz frequency band to the original 2.4 GHz
802.11 standard?
A. 802.11a
B. 802.11b
C. 802.11g
D. 802.11n
6. Which WLAN standard introduced Multiple Input Multiple Output (MIMO) technology?
A. 802.11ac
B. 802.11n
C. 802.11g
D. 802.11a
7. Which term refers to certified interoperable WLAN products based on the 802.11 standards?
A. Wi-Fi
B. WaveLAN
C. LMDS
D. WinLAN
8. Which early wireless network technology first demonstrated the feasibility of wireless LANs?
A. WaveLAN
B. ALOHAnet
C. WINLAN
D. Wi-Fi
9. Which 802.11 amendment aims to deliver high speed and low latency Wi-Fi connectivity?
A. 802.11ac
B. 802.11ax
C. 802.11n
D. 802.11ad
10. Which modulation technique is used in 802.11n/ac/ax standards for high throughput?
A. FHSS
B. DSSS
C. OFDM
D. PAM
C. Amplitude modulation
D. Frequency modulation
12. Which 802.11 amendment allows the use of 80 MHz and 160 MHz channel bandwidths?
A. 802.11n
B. 802.11ac
C. 802.11ax
D. 802.11ad
13. Which modulation scheme supports the highest data rate in 802.11ax?
A. 16-QAM
B. 64-QAM
C. 256-QAM
D. 1024-QAM
14. Which technique involves the transmission of multiple data streams over multiple antennas?
A. MU-MIMO
B. OFDMA
C. MIMO
D. DFS
A. 802.11n
B. 802.11ac
C. 802.11ax
D. 802.11ad
16. Which mechanism differentiates BSSs in dense deployments to reduce interference in
802.11ax?
A. TWT
B. MU-MIMO
C. BSS coloring
D. Spatial streams
17. During active scanning, which frames does a client station send to discover nearby APs?
A. Probe Request
B. Authentication Request
C. Association Request
D. Beacon
18. Which frame type helps in network discovery during passive scanning?
A. Probe Response
B. Association Response
C. Beacon
D. Authentication Request
A. Open system
B. WPA2
C. Shared key
D. EAP
A. True
B. False
21. The association process establishes the data connection between the client and AP.
(True/False)
A. True
B. False
22. Fast BSS transition in 802.11r enables faster roaming between APs by reducing handoff delays.
(True/False)
A. True
B. False
23. PMK caching helps speed up roaming by retaining shared keys on the AP. (True/False)
A. True
B. False
24. Which roaming scenario involves movement between APs controlled by the same wireless
controller?
A. Intra-controller
B. Inter-subnet
C. Inter-VLAN
D. Inter-controller
25. Which roaming scenario involves movement between APs controlled by different wireless
controllers?
A. Intra-controller
B. Intra-subnet
C. Inter-VLAN
D. Inter-controller
26. Which mechanism synchronizes client data between controllers to support seamless roaming?
A. IAPP
B. HREAP
C. OKC
D. PKC
27. Which 802.11 layer uses CSMA/CA for channel access to avoid collisions?
A. Physical layer
C. Network layer
D. Transport layer
28. Short InterFrame Space (SIFS) provides priority access for time-sensitive ACK frames.
(True/False)
A. True
B. False
29. Point Coordinate Function (PCF) enables contention-free polling access on the wireless
medium. (True/False)
A. True
B. False
30. Which 802.11 frame type is used by the AP and client during association and authentication?
A. Management
B. Control
C. Data
D. Action
31. Which technique aggregates small frames to improve MAC efficiency over the air?
A. Frame bursting
B. A-MSDU
C. A-MPDU
D. PPDU
32. Which method aggregates ACKs to provide cumulative acknowledgement of multiple MPDUs?
A. Block ACK
B. Batched ACK
C. Fast ACK
D. Cumulative ACK
33. Which diversity technique sends redundant streams across space and time to improve
reception?
A. MIMO
B. OFDM
C. STBC
D. LDPC
34. Which 802.11 technology allows downlink transmission to multiple clients simultaneously?
A. OFDMA
B. MU-MIMO
C. SU-MIMO
D. STBC
35. Spatial streams represent independent data streams between the transmitter and receiver.
(True/False)
A. True
B. False
36. Dynamic frequency selection (DFS) helps avoid radar interference by switching channels when
needed. (True/False)
A. True
B. False
37. Which power saving feature in 802.11ax schedules specific wakeup times for clients?
A. PSMP
B. SMPS
C. TWT
D. DTIM
38. The basic service set (BSS) refers to the AP and its associated clients. (True/False)
A. True
B. False
39. The service set identifier (SSID) is the name of the wireless network. (True/False)
A. True
B. False
40. The basic service area (BSA) connects multiple BSSs in a wireless network. (True/False)
A. True
B. False
41. The extended service set (ESS) connects multiple APs and BSSs into one logical network.
(True/False)
A. True
B. False
A. WPA
B. WEP
C. WPA2
D. WPA3
A. TKIP
B. CCMP
44. WPA3 introduces new authentication mechanisms like SAE to replace the PSK protocol.
(True/False)
A. True
B. False
45. Which authentication protocol uses a pre-shared key (PSK) for network access?
A. EAP
B. PSK
C. PEAP
D. LEAP
46. 802.1X port-based access control uses EAP for authentication and key management.
(True/False)
A. True
B. False
47. Which authentication server matches user credentials and decides access rights?
A. NAS
B. AS
C. CA
D. AC
A. True
B. False
49. Which entity initiates authentication and wants to access network resources?
A. Supplicant
B. Authenticator
C. Authentication server
D. Accounting server
50. Which entity enforces authentication policies and allows network access?
A. Supplicant
B. Authenticator
C. Authentication server
D. Accounting server
51. Mutual authentication verifies the identity of both client and authentication server.
(True/False)
A. True
B. False
52. Fast roaming uses PMK caching, key hierarchy and other methods to reduce handoff delays.
(True/False)
A. True
B. False
53. Opportunistic key caching (OKC) retains PMK after clients roam away from an AP. (True/False)
A. True
B. False
54. Key scope indicates when a PMK or key is no longer valid as client roams. (True/False)
A. True
B. False
55. The R1 key is derived after the initial 802.1X authentication between client and AS.
(True/False)
A. True
B. False
56. IAPP distributes client context like security keys between APs. (True/False)
A. True
B. False
57. A wireless intrusion detection system (WIDS) identifies security threats on the WLAN.
(True/False)
A. True
B. False
58. A wireless intrusion prevention system (WIPS) can block wireless attacks and threats.
(True/False)
A. True
B. False
59. Client isolation blocks wireless clients on the same SSID from communicating directly.
(True/False)
A. True
B. False
60. Evil twin APs spoof legitimate networks to trick users into connecting. (True/False)
A. True
B. False
61. Wireless networks use unguided electromagnetic waves propagating freely through space.
(True/False)
A. True
B. False
62. Omnidirectional antennas provide equal coverage in all horizontal directions. (True/False)
A. True
B. False
A. True
B. False
64. Parabolic dish antennas are an example of directional antenna. (True/False)
A. True
B. False
A. True
B. False
66. Beamwidth defines the angular width for directional antenna's mainlobe. (True/False)
A. True
B. False
67. Higher frequencies like 5 GHz have better penetration compared to lower frequencies.
(True/False)
A. True
B. False
68. Transmit power impacts the coverage range while antenna gain impacts directionality.
(True/False)
A. True
B. False
69. AP placement, transmit power and antennas affect the overall WLAN cell design. (True/False)
A. True
B. False
70. Physical barriers like walls and reflective materials impact wireless propagation. (True/False)
A. True
B. False
71. Radio resource management (RRM) dynamically assigns channels and power to APs.
(True/False)
A. True
B. False
72. Setting appropriate country code ensures legal operation as per local regulations. (True/False)
A. True
B. False
73. Minimum overlap between APs reduces co-channel interference on the WLAN. (True/False)
A. True
B. False
74. STAs connect to the AP with the strongest signal strength (RSSI). (True/False)
A. True
B. False
75. Modulation coding scheme (MCS) adapts PHY data rates to link conditions. (True/False)
A. True
B. False
76. Mobile IP allows retaining the same IP address as clients roam across subnets. (True/False)
A. True
B. False
77. Hierarchical design divides the network into core, distribution and access layers. (True/False)
A. True
B. False
78. The access layer connects wireless and wired endpoints to the network. (True/False)
A. True
B. False
B. False
A. True
B. False
A. True
B. False
82. Campus networks provide connectivity within a limited geographical area. (True/False)
A. True
B. False
A. True
B. False
84. Small networks usually use a star topology with a central controller. (True/False)
A. True
B. False
85. Mesh networks provide redundant connections between peer nodes. (True/False)
A. True
B. False
86. STP blocks redundant links to prevent loops in switched networks. (True/False)
A. True
B. False
87. RSTP provides faster convergence than STP in case of topology changes. (True/False)
A. True
B. False
88. TRILL replaces STP and forwards traffic along the shortest path. (True/False)
A. True
B. False
A. True
B. False
A. True
B. False
91. EVPNs connect remote sites to form a unified bridge domain. (True/False)
A. True
B. False
92. CAPWAP securely tunnels traffic between wireless APs and controllers. (True/False)
A. True
B. False
93. Traffic engineering optimizes network paths based on bandwidth, latency etc. (True/False)
A. True
B. False
94. Multicast replication techniques efficiently send data to multiple receivers. (True/False)
A. True
B. False
95. PIM dynamically prunes multicast delivery tree as receivers join/leave. (True/False)
A. True
B. False
A. SNMP
B. DHCP
C. DNS
D. CAPWAP
97. Which protocol can encrypt control and data connections between APs and controller?
A. IPsec
B. MACsec
C. DTLS
D. SSL
98. How does an AP discover the wireless controller when booting up?
A. Broadcast
B. Multicast
C. DNS query
D. Option 43
99. After CAPWAP tunnels are setup, what information does the AP get from the controller?
A. IP address
C. License key
100. Which forwarding mode avoids tunneling overhead by switching data traffic locally?
A. Central forwarding
B. Distributed forwarding
C. Remote forwarding
D. Direct forwarding
101. HSB helps synchronize dynamic state information between active and standby wireless
controllers. (True/False)
A. True
B. False
102. If primary controller fails, AP CAPWAP tunnel is redirected to the secondary controller.
(True/False)
A. True
B. False
103. Client load balancing helps distribute wireless clients evenly across APs. (True/False)
A. True
B. False
104. Band steering steers dual-band clients to 5 GHz networks when possible. (True/False)
A. True
B. False
105. Airtime scheduling allocates channel access time fairly between wireless clients. (True/False)
A. True
B. False
106. When roaming between APs, the client first reassociates before disassociation. (True/False)
A. True
B. False
107. PMK caching retains shared keys to avoid full authentication upon roaming. (True/False)
A. True
B. False
108. Opportunistic
109. Opportunistic key caching (OKC) retains PMK after clients roam away from an AP.
(True/False)
A. True
B. False
110. The R0 key is derived upon fast transition between APs and used for data encryption.
(True/False)
A. True
B. False
111. The mobility domain stores security context like keys to enable fast roaming. (True/False)
A. True
B. False
112. Which technique helps discover and contain rogue APs on the network?
A. WIDS
B. WIPS
C. MDKS
D. MPSK
113. Wireless IPS can disconnect or isolate clients of detected rogue APs. (True/False)
A. True
B. False
114. Honeypots decoy and distract attackers away from production networks. (True/False)
A. True
B. False
115. DoS flood attacks can disrupt wireless connectivity and availability. (True/False)
A. True
B. False
A. True
B. False
117. Dynamic channel selection avoids interference and fractured coverage. (True/False)
A. True
B. False
118. The country code forces APs to comply with local regulations. (True/False)
A. True
B. False
A. True
B. False
120. PHY data rates adapt down based on low RSSI and errors. (True/False)
A. True
B. False
121. Opportunistic key caching (OKC) retains PMK after clients roam away from an AP.
(True/False)
A. True
B. False
122. The R0 key is derived upon fast transition between APs and used for data encryption.
(True/False)
A. True
B. False
123. The mobility domain stores security context like keys to enable fast roaming. (True/False)
A. True
B. False
124. Which technique helps discover and contain rogue APs on the network?
A. WIDS
B. WIPS
C. MDKS
D. MPSK
125. Wireless IPS can disconnect or isolate clients of detected rogue APs. (True/False)
A. True
B. False
126. Honeypots decoy and distract attackers away from production networks. (True/False)
A. True
B. False
127. DoS flood attacks can disrupt wireless connectivity and availability. (True/False)
A. True
B. False
A. True
B. False
129. Dynamic channel selection avoids interference and fractured coverage. (True/False)
A. True
B. False
130. The country code forces APs to comply with local regulations. (True/False)
A. True
B. False
A. True
B. False
132. PHY data rates adapt down based on low RSSI and errors. (True/False)
A. True
B. False
133. VLANs logically segment traffic over common physical infrastructure. (True/False)
A. True
B. False
134. APs tunnel traffic from wireless clients back to a central controller. (True/False)
A. True
B. False
135. GRE tunnels encapsulate layer 3 packets over layer 3 networks. (True/False)
A. True
B. False
136. SDN centralizes network control logic from underlying infrastructure. (True/False)
A. True
B. False
137. Northbound APIs interface between apps and SDN controllers. (True/False)
A. True
B. False
138. Which popular protocol implements communication between SDN layers?
A. SNMP
B. OpenFlow
C. NETCONF
D. RESTCONF
139. Campus networks provide connectivity across a limited geographic area. (True/False)
A. True
B. False
140. A CAN interconnects buildings like labs, offices, dorms on a campus. (True/False)
A. True
B. False
A. True
B. False
142. Small networks usually use a star topology centered around a controller. (True/False)
A. True
B. False
143. Mesh networks have redundant connections between peer nodes. (True/False)
A. True
B. False
A. TRILL
B. SPB
C. Fabric Connect
D. EVPN
A. True
B. False
146. Which WLAN tunneling protocol is used between APs and wireless controller?
A. PPTP
B. L2TP
C. CAPWAP
D. IPsec
147. Traffic engineering tweaks network paths based on bandwidth, latency etc. (True/False)
A. True
B. False
A. True
B. False
149. PIM builds optimal multicast delivery trees based on active receivers. (True/False)
A. True
B. False
150. Wireless networks allow easy mobility using distributed APs connected wirelessly.
(True/False)
A. True
B. False
151. Multiple APs can share the same SSID to form one extended logical network. (True/False)
A. True
B. False
152. AP discovery involves steps like DHCP, DNS, broadcasting and unicast discovery. (True/False)
A. True
B. False
153. The controller provisions software image, license and configuration to an AP. (True/False)
A. True
B. False
154. Centralized data forwarding tunnels all traffic through the wireless controller. (True/False)
A. True
B. False
155. Local MAC caching reduces overhead compared to centralized data tunneling. (True/False)
A. True
B. False
156. HSB enables state synchronization between active and standby wireless controllers.
(True/False)
A. True
B. False
157. When primary controller fails, AP CAPWAP tunnels transfer to backup controller. (True/False)
A. True
B. False
158. Wireless clients constantly scan and reassociate to stay on optimal AP. (True/False)
A. True
B. False
159. Opportunistic PMK caching retains PMK after clients roam from an AP. (True/False)
A. True
B. False
160. The R1 key is derived after initial 802.1X authentication between client and AS. (True/False)
A. True
B. False
161. Key hierarchy, IAPP, MDID help enable fast secure roaming. (True/False)
A. True
B. False
162. WPA3 introduces more robust authentication protocols like SAE. (True/False)
A. True
B. False
163. OWE provides encryption for open networks with no authentication. (True/False)
A. True
B. False
A. True
B. False
165. Wireless IDS identifies intrusions, rogue APs, DoS attacks on WLAN. (True/False)
A. True
B. False
166. Wireless IPS can block or isolate clients and APs in response to threats. (True/False)
A. True
B. False
167. Evil twin APs impersonate legitimate networks to steal user data. (True/False)
A. True
B. False
168. FHSS avoids interference by hopping across available frequency band. (True/False)
A. True
B. False
169. In a centralized WLAN, RRM adjusts channels, power for optimal coverage. (True/False)
A. True
B. False
170. Minimum cell overlap ensures seamless roaming between APs. (True/False)
A. True
B. False
171. MCS index determines PHY rate based on modulation, coding and streams. (True/False)
A. True
B. False
172. PMK caching retains master session key to avoid full reauthentication. (True/False)
A. True
B. False
173. OKC opportunistically retains PMK after clients move away from an AP. (True/False)
A. True
B. False
174. IAPP propagates encryption keys between APs during L2/L3 roaming. (True/False)
A. True
B. False
175. The MDID identifies a mobility domain for seamless fast roaming. (True/False)
A. True
B. False
A. True
B. False
177. PMKID caching stores PMKID from initial authentication for rekeying. (True/False)
A. True
B. False
178. The R0 key encrypts data after FT authentication with target AP. (True/False)
A. True
B. False
179. Passive scanning listens for beacon frames without probing. (True/False)
A. True
B. False
A. True
B. False
A. True
B. False
182. All management frames use link layer encryption after association. (True/False)
A. True
B. False
A. True
B. False
184. Fast roaming uses caching, preauthentication and key hierarchy. (True/False)
A. True
B. False
185. The supplicant wants network access and initiates authentication. (True/False)
A. True
B. False
186. The authenticator enforces access policy for the wireless network. (True/False)
A. True
B. False
187. The RADIUS server matches credentials to authorize network access. (True/False)
A. True
B. False
A. True
B. False
189. TACACS+ separates AAA services of authentication, authorization and audit. (True/False)
A. True
B. False
A. True
B. False
191. Hotspot 2.0 allows cellular-like roaming between WiFi networks. (True/False)
A. True
B. False
A. True
B. False
193. 802.11k allows APs to share information about network topology and conditions.
(True/False)
A. True
B. False
194. 802.11v enables direct client-to-client transfers for better throughput. (True/False)
A. True
B. False
195. 802.11r uses fast BSS transition to enable faster roaming handoffs. (True/False)
A. True
B. False
A. True
B. False
197. TPC reports transmit power and link margins between AP and client. (True/False)
A. True
B. False
198. BSS Transition Management frames help with securing roaming. (True/False)
A. True
B. False
199. PMK caching retains master session key to avoid full reauthentication. (True/False)
A. True
B. False
200. OKC opportunistically retains PMK after clients move away from an AP. (True/False)
A. True
B. False
Here are the correct answers for the 200 multiple choice questions:
1. A
2. C
3. C
4. B
5. A
6. B
7. A
8. B
9. B
10. C
11. B
12. B
13. D
14. C
15. C
16. C
17. A
18. C
19. C
20. A
21. A
22. A
23. A
24. A
25. D
26. A
27. B
28. A
29. A
30. A
31. C
32. A
33. C
34. B
35. A
36. A
37. A
38. A
39. A
40. B
41. A
42. C
43. B
44. A
45. B
46. A
47. B
48. A
49. A
50. B
51. A
52. A
53. A
54. A
55. A
56. A
57. A
58. A
59. A
60. A
61. A
62. A
63. A
64. A
65. B
66. A
67. B
68. A
69. A
70. A
71. A
72. A
73. A
74. A
75. A
76. B
77. A
78. A
79. A
80. A
81. A
82. A
83. A
84. B
85. A
86. A
87. A
88. A
89. A
90. A
91. A
92. A
93. A
94. A
95. A
96. D
97. C
98. D
99. D
100. D
101. A
102. A
103. A
104. A
105. A
106. B
107. A
108. A
109. A
110. A
111. A
112. B
113. A
114. A
115. A
116. A
117. A
118. A
119. B
120. A
121. A
122. A
123. A
124. B
125. A
126. A
127. A
128. A
129. A
130. A
131. B
132. A
133. A
134. A
135. A
136. A
137. A
138. B
139. A
140. A
141. A
142. B
143. A
144. C
145. A
146. C
147. A
148. A
149. A
150. A
151. A
152. A
153. A
154. B
155. A
156. A
157. A
158. B
159. A
160. A
161. A
162. A
163. A
164. A
165. A
166. A
167. A
168. B
169. A
170. A
171. A
172. A
173. A
174. A
175. A
176. A
177. A
178. B
179. A
180. A
181. A
182. B
183. A
184. A
185. A
186. A
187. A
188. A
189. A
190. A
191. A
192. A
193. A
194. A
195. A
196. A
197. A
198. B
199. A
200. A
Here are 200 single-answer multiple choice questions with 4 choices and answers generated from
the WLAN PDF files:
1. Which wireless technology provides short range connectivity between devices like laptops and
smartphones?
A. WWAN
B. WMAN
C. WLAN
D. WPAN
Answer: D
A. ZigBee
B. Bluetooth
C. WiMAX
D. NFC
Answer: C
3. Which IEEE standard defines the specifications for Wireless Local Area Networks (WLANs)?
A. 802.15
B. 802.11
C. 802.16
D. 802.20
Answer: B
Answer: C
5. Which amendment added specifications for the 5 GHz frequency band to the original 2.4 GHz
802.11 standard?
A. 802.11g
B. 802.11n
C. 802.11a
D. 802.11b
Answer: C
6. Which WLAN standard introduced Multiple Input Multiple Output (MIMO) technology?
A. 802.11a
B. 802.11ac
C. 802.11g
D. 802.11n
Answer: D
7. Which term refers to certified interoperable WLAN products based on the 802.11 standards?
A. WaveLAN
B. Wi-Fi
C. WinLAN
D. LMDS
Answer: B
8. Which early wireless network technology first demonstrated the feasibility of wireless LANs?
A. ALOHAnet
B. Wi-Fi
C. WaveLAN
D. WINLAN
Answer: A
9. Which 802.11 amendment aims to deliver high speed and low latency Wi-Fi connectivity?
A. 802.11ad
B. 802.11ac
C. 802.11n
D. 802.11ax
Answer: D
10. Which modulation technique is used in 802.11n/ac/ax standards for high throughput?
A. PAM
B. OFDM
C. FHSS
D. DSSS
Answer: B
A. Amplitude modulation
B. Frequency modulation
C. Multiple narrowband subcarriers
D. High frequency carrier
Answer: C
12. Which 802.11 amendment allows the use of 80 MHz and 160 MHz channel bandwidths?
A. 802.11ac
B. 802.11n
C. 802.11ax
D. 802.11ad
Answer: A
13. Which modulation scheme supports the highest data rate in 802.11ax?
A. 256-QAM
B. 16-QAM
C. 64-QAM
D. 1024-QAM
Answer: D
14. Which technique involves the transmission of multiple data streams over multiple antennas?
A. DFS
B. MIMO
C. OFDMA
D. MU-MIMO
Answer: B
A. 802.11ac
B. 802.11n
C. 802.11ax
D. 802.11ad
Answer: C
A. Spatial streams
B. MU-MIMO
C. BSS coloring
D. TWT
Answer: C
17. During active scanning, which frames does a client station send to discover nearby APs?
A. Authentication Request
B. Probe Request
C. Beacon
D. Association Request
Answer: B
18. Which frame type helps in network discovery during passive scanning?
A. Authentication Request
B. Probe Response
C. Association Response
D. Beacon
Answer: D
Answer: B
A. False
B. True
Answer: B
21. The association process establishes the data connection between the client and AP.
(True/False)
A. False
B. True
Answer: B
22. Fast BSS transition in 802.11r enables faster roaming between APs by reducing handoff delays.
(True/False)
A. False
B. True
Answer: B
23. PMK caching helps speed up roaming by retaining shared keys on the AP. (True/False)
A. False
B. True
Answer: B
24. Which roaming scenario involves movement between APs controlled by the same wireless
controller?
A. Inter-controller
B. Intra-controller
C. Inter-subnet
D. Inter-VLAN
Answer: B
25. Which roaming scenario involves movement between APs controlled by different wireless
controllers?
A. Intra-controller
B. Inter-VLAN
C. Inter-controller
D. Intra-subnet
Answer: C
26. Which mechanism synchronizes client data between controllers to support seamless roaming?
A. HREAP
B. PKC
C. IAPP
D. OKC
Answer: C
27. Which 802.11 layer uses CSMA/CA for channel access to avoid collisions?
Answer: A
28. Short InterFrame Space (SIFS) provides priority access for time-sensitive ACK frames.
(True/False)
A. False
B. True
Answer: B
29. Point Coordinate Function (PCF) enables contention-free polling access on the wireless
medium. (True/False)
A. False
B. True
Answer: B
30. Which 802.11 frame type is used by the AP and client during association and authentication?
A. Control
B. Management
C. Data
D. Action
Answer: B
31. Which technique aggregates small frames to improve MAC efficiency over the air?
A. A-MSDU
B. PPDU
C. Frame bursting
D. A-MPDU
Answer: D
32. Which method aggregates ACKs to provide cumulative acknowledgement of multiple MPDUs?
A. Fast ACK
B. Batched ACK
C. Cumulative ACK
D. Block ACK
Answer: D
33. Which diversity technique sends redundant streams across space and time to improve
reception?
A. MIMO
B. STBC
C. OFDM
D. LDPC
Answer: B
34. Which 802.11 technology allows downlink transmission to multiple clients simultaneously?
A. MU-MIMO
B. SU-MIMO
C. OFDMA
D. STBC
Answer: A
35. Spatial streams represent independent data streams between the transmitter and receiver.
(True/False)
A. False
B. True
Answer: B
36. Dynamic frequency selection (DFS) helps avoid radar interference by switching channels when
needed. (True/False)
A. False
B. True
Answer: B
37. Which power saving feature in 802.11ax schedules specific wakeup times for clients?
A. DTIM
B. TWT
C. SMPS
D. PSMP
Answer: B
38. The basic service set (BSS) refers to the AP and its associated clients. (True/False)
A. False
B. True
Answer: B
39. The service set identifier (SSID) is the name of the wireless network. (True/False)
A. False
B. True
Answer: B
40. The basic service area (BSA) connects multiple BSSs in a wireless network. (True/False)
A. True
B. False
Answer: B
41. The extended service set (ESS) connects multiple APs and BSSs into one logical network.
(True/False)
A. False
B. True
Answer: B
42. Which security protocol is part of the IEEE 802.11i standard?
A. WPA
B. WPA3
C. WPA2
D. WEP
Answer: C
A. TKIP
B. CCMP
Answer: B
44. WPA3 introduces new authentication mechanisms like SAE to replace the PSK protocol.
(True/False)
A. False
B. True
Answer: B
45. Which authentication protocol uses a pre-shared key (PSK) for network access?
A. LEAP
B. EAP
C. PEAP
D. PSK
Answer: D
46. 802.1X port-based access control uses EAP for authentication and key management.
(True/False)
A. False
B. True
Answer: B
47. Which authentication server matches user credentials and decides access rights?
A. AC
B. NAS
C. CA
D. AS
Answer: D
A. False
B. True
Answer: B
49. Which entity initiates authentication and wants to access network resources?
A. Authentication server
B. Supplicant
C. Accounting server
D. Authenticator
Answer: B
50. Which entity enforces authentication policies and allows network access?
A. Supplicant
B. Accounting server
C. Authenticator
D. Authentication server
Answer: C
51. Mutual authentication verifies the identity of both client and authentication server.
(True/False)
A. False
B. True
Answer: B
52. Fast roaming uses PMK caching, key hierarchy and other methods to reduce handoff delays.
(True/False)
A. False
B. True
Answer: B
53. Opportunistic key caching (OKC) retains PMK after clients roam away from an AP. (True/False)
A. False
B. True
Answer: B
54. Key scope indicates when a PMK or key is no longer valid as client roams. (True/False)
A. True
B. False
Answer: A
55. The R1 key is derived after the initial 802.1X authentication between client and AS.
(True/False)
A. False
B. True
Answer: B
56. IAPP distributes client context like security keys between APs. (True/False)
A. False
B. True
Answer: B
57. A wireless intrusion detection system (WIDS) identifies security threats on the WLAN.
(True/False)
A. False
B. True
Answer: B
58. A wireless intrusion prevention system (WIPS) can block wireless attacks and threats.
(True/False)
A. False
B. True
Answer: B
59. Client isolation blocks wireless clients on the same SSID from communicating directly.
(True/False)
A. False
B. True
Answer: B
60. Evil twin APs impersonate legitimate networks to steal user data. (True/False)
A. False
B. True
Answer: B
61. Wireless networks use unguided electromagnetic waves propagating freely through space.
(True/False)
A. False
B. True
Answer: B
62. Omnidirectional antennas provide equal coverage in all horizontal directions. (True/False)
A. False
B. True
Answer: B
A. False
B. True
Answer: B
A. False
B. True
Answer: B
A. True
B. False
Answer: B
66. Beamwidth defines the angular width for directional antenna's mainlobe. (True/False)
A. False
B. True
Answer: B
67. Higher frequencies like 5 GHz have better penetration compared to lower frequencies.
(True/False)
A. True
B. False
Answer: B
68. Transmit power impacts the coverage range while antenna gain impacts directionality.
(True/False)
A. False
B. True
Answer: B
69. AP placement, transmit power and antennas affect the overall WLAN cell design. (True/False)
A. False
B. True
Answer: B
70. Physical barriers like walls and reflective materials impact wireless propagation. (True/False)
A. False
B. True
Answer: B
71. Radio resource management (RRM) dynamically assigns channels and power to APs.
(True/False)
A. False
B. True
Answer: B
72. Setting appropriate country code ensures legal operation as per local regulations. (True/False)
A. False
B. True
Answer: B
73. Minimum overlap between APs reduces co-channel interference on the WLAN. (True/False)
A. False
B. True
Answer: B
74. STAs connect to the AP with the strongest signal strength (RSSI). (True/False)
A. False
B. True
Answer: B
75. Modulation coding scheme (MCS) adapts PHY data rates to link conditions. (True/False)
A. False
B. True
Answer: B
76. Mobile IP allows retaining the same IP address as clients roam across subnets. (True/False)
A. True
B. False
Answer: B
77. Hierarchical design divides the network into core, distribution and access layers. (True/False)
A. False
B. True
Answer: B
78. The access layer connects wireless and wired endpoints to the network. (True/False)
A. False
B. True
Answer: B
A. False
B. True
Answer: B
80. GRE encapsulates layer 3 packets over layer 3 networks. (True/False)
A. False
B. True
Answer: B
A. False
B. True
Answer: B
82. Campus networks provide connectivity within a limited geographical area. (True/False)
A. False
B. True
Answer: B
A. False
B. True
Answer: B
84. Small networks usually use a star topology with a central controller. (True/False)
A. True
B. False
Answer: B
85. Mesh networks provide redundant connections between peer nodes. (True/False)
A. False
B. True
Answer: B
86. STP blocks redundant links to prevent loops in switched networks. (True/False)
A. False
B. True
Answer: B
87. RSTP provides faster convergence than STP in case of topology changes. (True/False)
A. False
B. True
Answer: B
88. TRILL replaces STP and forwards traffic along the shortest path. (True/False)
A. True
B. False
Answer: B
A. False
B. True
Answer: B
A. False
B. True
Answer: B
91. EVPNs connect remote sites to form a unified bridge domain. (True/False)
A. False
B. True
Answer: B
92. CAPWAP securely tunnels traffic between wireless APs and controllers. (True/False)
A. False
B. True
Answer: B
93. Traffic engineering optimizes network paths based on bandwidth, latency etc. (True/False)
A. False
B. True
Answer: B
94. Multicast replication techniques efficiently send data to multiple receivers. (True/False)
A. False
B. True
Answer: B
95. PIM dynamically prunes multicast delivery tree as receivers join/leave. (True/False)
A. False
B. True
Answer: B
A. SNMP
B. CAPWAP
C. DNS
D. DHCP
Answer: B
97. Which protocol can encrypt control and data connections between APs and controller?
A. SSL
B. IPsec
C. MAC
Here are the remaining multiple choice questions:
97. Which protocol can encrypt control and data connections between APs and controller?
A. SSL
B. IPsec
C. MACsec
D. DTLS
Answer: D
98. How does an AP discover the wireless controller when booting up?
A. Multicast
B. DNS query
C. Broadcast
D. Option 43
Answer: D
99. After CAPWAP tunnels are setup, what information does the AP get from the controller?
Answer: D
100. Which forwarding mode avoids tunneling overhead by switching data traffic locally?
A. Central forwarding
B. Remote forwarding
C. Distributed forwarding
D. Direct forwarding
Answer: D
101. HSB helps synchronize dynamic state information between active and standby wireless
controllers. (True/False)
A. False
B. True
Answer: B
102. If primary controller fails, AP CAPWAP tunnel is redirected to the secondary controller.
(True/False)
A. False
B. True
Answer: B
103. Client load balancing helps distribute wireless clients evenly across APs. (True/False)
A. False
B. True
Answer: B
104. Band steering steers dual-band clients to 5 GHz networks when possible. (True/False)
A. False
B. True
Answer: B
105. Airtime scheduling allocates channel access time fairly between wireless clients. (True/False)
A. True
B. False
Answer: B
106. When roaming between APs, the client first reassociates before disassociation. (True/False)
A. False
B. True
Answer: B
107. PMK caching retains shared keys to avoid full authentication upon roaming. (True/False)
A. False
B. True
Answer: B
108. Opportunistic key caching (OKC) retains PMK after clients roam away from an AP.
(True/False)
A. False
B. True
Answer: B
109. The R0 key is derived upon fast transition between APs and used for data encryption.
(True/False)
A. False
B. True
Answer: B
110. The mobility domain stores security context like keys to enable fast roaming. (True/False)
A. False
B. True
Answer: B
111. Which technique helps discover and contain rogue APs on the network?
A. MPSK
B. MDKS
C. WIPS
D. WIDS
Answer: D
112. Wireless IPS can disconnect or isolate clients of detected rogue APs. (True/False)
A. False
B. True
Answer: B
113. Honeypots decoy and distract attackers away from production networks. (True/False)
A. False
B. True
Answer: B
114. DoS flood attacks can disrupt wireless connectivity and availability. (True/False)
A. False
B. True
Answer: B
A. True
B. False
Answer: B
116. Dynamic channel selection avoids interference and fractured coverage. (True/False)
A. False
B. True
Answer: B
117. The country code forces APs to comply with local regulations. (True/False)
A. True
B. False
Answer: B
118. Higher AP density leads to greater co-channel interference. (True/False)
A. False
B. True
Answer: B
119. PHY data rates adapt down based on low RSSI and errors. (True/False)
A. False
B. True
Answer: B
120. Opportunistic key caching (OKC) retains PMK after clients roam away from an AP.
(True/False)
A. False
B. True
Answer: B
121. The R0 key is derived upon fast transition between APs and used for data encryption.
(True/False)
A. True
B. False
Answer: B
122. The mobility domain stores security context like keys to enable fast roaming. (True/False)
A. False
B. True
Answer: B
123. Which technique helps discover and contain rogue APs on the network?
A. MPSK
B. WIPS
C. WIDS
D. MDKS
Answer: C
124. Wireless IPS can disconnect or isolate clients of detected rogue APs. (True/False)
A. False
B. True
Answer: B
125. Honeypots decoy and distract attackers away from production networks. (True/False)
A. True
B. False
Answer: B
126. DoS flood attacks can disrupt wireless connectivity and availability. (True/False)
A. False
B. True
Answer: B
A. False
B. True
Answer: B
128. Dynamic channel selection avoids interference and fractured coverage. (True/False)
A. True
B. False
Answer: B
129. The country code forces APs to comply with local regulations. (True/False)
A. False
B. True
Answer: B
A. False
B. True
Answer: B
131. PHY data rates adapt down based on low RSSI and errors. (True/False)
A. True
B. False
Answer: B
132. VLANs logically segment traffic over common physical infrastructure. (True/False)
A. False
B. True
Answer: B
133. APs tunnel traffic from wireless clients back to a central controller. (True/False)
A. False
B. True
Answer: B
134. GRE tunnels encapsulate layer 3 packets over layer 3 networks. (True/False)
A. False
B. True
Answer: B
135. SDN centralizes network control logic from underlying infrastructure. (True/False)
A. False
B. True
Answer: B
136. Northbound APIs interface between apps and SDN controllers. (True/False)
A. False
B. True
Answer: B
A. SNMP
B. RESTCONF
C. NETCONF
D. OpenFlow
Answer: D
138. Campus networks provide connectivity across a limited geographical area. (True/False)
A. False
B. True
Answer: B
139. A CAN interconnects buildings like labs, offices, dorms on a campus. (True/False)
A. False
B. True
Answer: B
A. True
B. False
Answer: B
141. Small networks usually use a star topology centered around a controller. (True/False)
A. False
B. True
Answer: B
142. Mesh networks have redundant connections between peer nodes. (True/False)
A. True
B. False
Answer: B
A. EVPN
B. TRILL
C. SPB
D. Fabric Connect
Answer: D
Answer: B
145. Which WLAN tunneling protocol is used between APs and wireless controller?
A. PPTP
B. CAPWAP
C. L2TP
D. IPsec
Answer: B
146. Traffic engineering tweaks network paths based on bandwidth, latency etc. (True/False)
A. False
B. True
Answer: B
A. False
B. True
Answer: B
148. PIM builds optimal multicast delivery trees based on active receivers. (True/False)
A. False
B. True
Answer: B
149. Wireless networks allow easy mobility using distributed APs connected wirelessly.
(True/False)
A. True
B. False
Answer: B
150. Multiple APs can share the same SSID to form one extended logical network. (True/False)
A. False
B. True
Answer: B
151. AP discovery involves steps like DHCP, DNS, broadcasting and unicast discovery. (True/False)
A. False
B. True
Answer: B
152. The controller provisions software image, license and configuration to an AP. (True/False)
A. False
B. True
Answer: B
153. Centralized data forwarding tunnels all traffic through the wireless controller. (True/False)
A. True
B. False
Answer: B
154. Local MAC caching reduces overhead compared to centralized data tunneling. (True/False)
A. False
B. True
Answer: B
155. HSB enables state synchronization between active and standby wireless controllers.
(True/False)
A. False
B. True
Answer: B
156. When primary controller fails, AP CAPWAP tunnels transfer to backup controller. (True/False)
A. True
B. False
Answer: B
157. Wireless clients constantly scan and reassociate to stay on optimal AP. (True/False)
A. True
B. False
Answer: B
158. Opportunistic PMK caching retains PMK after clients roam from an AP. (True/False)
A. False
B. True
Answer: B
159. The R1 key is derived after initial 802.1X authentication between client and AS. (True/False)
A. False
B. True
Answer: B
160. Key hierarchy, IAPP, MDID help enable fast secure roaming. (True/False)
A. False
B. True
Answer: B
161. WPA3 introduces more robust authentication protocols like SAE. (True/False)
A. False
B. True
Answer: B
162. OWE provides encryption for open networks with no authentication. (True/False)
A. False
B. True
Answer: B
A. False
B. True
Answer: B
164. Wireless IDS identifies intrusions, rogue APs, DoS attacks on WLAN. (True/False)
A. False
B. True
Answer: B
165. Wireless IPS can block or isolate clients and APs in response to threats. (True/False)
A. True
B. False
Answer: B
166. Evil twin APs impersonate legitimate networks to steal user data. (True/False)
A. False
B. True
Answer: B
167. FHSS avoids interference by hopping across available frequency band. (True/False)
A. True
B. False
Answer: B
168. In a centralized WLAN, RRM adjusts channels, power for optimal coverage. (True/False)
A. False
B. True
Answer: B
169. Minimum cell overlap ensures seamless roaming between APs. (True/False)
A. False
B. True
Answer: B
170. MCS index determines PHY rate based on modulation, coding and streams. (True/False)
A. False
B. True
Answer: B
171. PMK caching retains master session key to avoid full reauthentication. (True/False)
A. True
B. False
Answer: B
172. OKC opportunistically retains PMK after clients move away from an AP. (True/False)
A. False
B. True
Answer: B
173. IAPP propagates encryption keys between APs during L2/L3 roaming. (True/False)
A. False
B. True
Answer: B
174. The MDID identifies a mobility domain for seamless fast roaming. (True/False)
A. False
B. True
Answer: B
A. False
B. True
Answer: B
176. PMKID caching stores PMKID from initial authentication for rekeying. (True/False)
A. True
B. False
Answer: B
177. The R0 key encrypts data after FT authentication with target AP. (True/False)
A. False
B. True
Answer: B
178. Passive scanning listens for beacon frames without probing. (True/False)
A. True
B. False
Answer: B
A. False
B. True
Answer: B
A. False
B. True
Answer: B
181. All management frames use link layer encryption after association. (True/False)
A. True
B. False
Answer: B
A. False
B. True
Answer: B
183. Fast roaming uses caching, preauthentication and key hierarchy. (True/False)
A. False
B. True
Answer: B
184. The supplicant wants network access and initiates authentication. (True/False)
A. False
B. True
Answer: B
185. The authenticator enforces access policy for the wireless network. (True/False)
A. False
B. True
Answer: B
186. The RADIUS server matches credentials to authorize network access. (True/False)
A. False
B. True
Answer: B
A. True
B. False
Answer: B
188. TACACS+ separates AAA services of authentication, authorization and audit. (True/False)
A. False
B. True
Answer: B
A. True
B. False
Answer: B
190. Hotspot 2.0 allows cellular-like roaming between WiFi networks. (True/False)
A. False
B. True
Answer: B
A. False
B. True
Answer: B
192. 802.11k allows APs to share information about network topology and conditions.
(True/False)
A. True
B. False
Answer: B
193. 802.11v enables direct client-to-client transfers for better throughput. (True/False)
A. False
B. True
Answer: B
194. 802.11r uses fast BSS transition to enable faster roaming handoffs. (True/False)
A. True
B. False
Answer: B
A. False
B. True
Answer: B
196. TPC reports transmit power and link margins between AP and client. (True/False)
A. False
B. True
Answer: B
197. BSS Transition Management frames help with securing roaming. (True/False)
A. True
B. False
Answer: B
198. PMK caching retains master session key to avoid full reauthentication. (True/False)
A. False
B. True
Answer: B
199. OKC opportunistically retains PMK after clients move away from an AP. (True/False)
A. True
B. False
Answer: B
200. The R0 key encrypts data after FT authentication with target AP. (True/False)
A. False
B. True
Answer: B