(WLAN) that use an IEEE 802.1x protocol control network access on what basis - ANS-Port
Based
A customer reports a problem of no dial tone(NDT) Upon Inspection, the tech notices that new
carpenting has been installed. What should the tech do next - ANS-Look for a cable that runs
under the carpet; it is likely that the cable has a short from the carpeting tack strip
After a digital TV(DTV) service problem has been analyzed and possible causes considered,
what is accomplished by isolating the various network elements - ANS-It narrows the scope of
likely problem sources
After resolving the problem with the premises wiring issue, which of the following is the next step
in the six-step process that the tech should take - ANS-Verify that the problem has been
resolved and that phone service is running perfectly on all phones
All 802.11 standards use one of two frequency bands. What are these frequency bands -
ANS-2.4 GHz and 5 GHz bands
Although there are many different implementations of spread spectrum tech, what are the only
types specified by the FCC in the Codes of Federal Regulation (CFR), volume 47, part 15 -
ANS-Direct Sequencing Spread Spectrum (DSSS) and Frequency Hopping Spread Spectrum
(FHSS)
An antenna cable connects the transmitter to an amplifier, and the power into the amplifier's
input measures 50 mW. The amplifier increases the signal to the original transmitter's power
level and sends the signal to the antenna. The antenna recieves the signal from the amplifer at
75 mW, and then transmits at 150 mW. What is the intentional IR power level in this radio
frequency (RF) circuit - ANS-75 mWWhen
An Independent Basic Service Set (IBSS) is also commonly referred to as which of the following
- ANS-Ad Hoc Network
Ap must support what encryption techniques in order to comply with IEEE 802.11i security
standards - ANS-TKIP, AES, and AES-CCMP(Counter-Mode/CBC-MAC Protocol)
As a general rule, how does an increase in effective isotropic radiated power (EIRP) relate to
the link budget range - ANS-Each 6 dB increase in EIRP equates to a doubling of range
As a subscriber enters a hotspot area, which signals their mobile wireless device of an available
Wi-Fi network - ANS-The Access Point (AP) queries all wifeless devices that come within range
of their availability for connection
Because the spectral density of a quadrature amplitude modulation(QAM) channel is much
higher than that of an analog TV channel, what is done to ensure equal power in all channels in
a network with analog and digital modulation channels - ANS-Operate the analog TV channels
at higher amplitude level than the QAM channels
Bluetooth is a short range wireless personal area network (WPAN) tech that is covered under
which Institute of Electrical and Electronics Engineers (IEEE) standard - ANS-IEEE 802.15
Bluetooth uses which spread spectrum tech - ANS-Frequency Hopping Spread Spectrum
(FHSS)
, By taking control of the expectations you have you are - ANS-more likely to improve your
motivation and be a better problem solver
During which step of the six-step troubleshooting process for a digital TV(DTV) service problem
are QAM(Quadrature amplitude modulation) channel measurements typically taken -
ANS-Diagnosing symptoms
For maximum security, you should base your wireless local area network (WLAN) user
authentication on which one of the following? - ANS-Device-independent schemes, such as
user names and passwords
Given an access point (AP) with 100 milliwatts (mW) of output power connected through a cable
with 3 dB of loss to the antenna with a 10 decibels isotropic dBi gain, what is the approximate
Equivalent Isotropically Radiated Power (EIRP) level from the antenna in Milliwatts - ANS-500
mW
Heat Shrink tubing is installed over the fusion-splice to strengthen and protect it. When should
the heat shrink be installed on the fiber - ANS-Before stripping the plastic coating from the fiber
How are interframe spaces used in an IEEE 802.11 wireless local area network (WLAN) -
ANS-They are used to defer a station's access to the medium and provide various levels of
priority
How are optical splitters used in the forward path - ANS-In the forward path, optical splitters are
used as passive branching devices that divide an optical signal across multiple output fibers
How can filtering augment some of the security limitations of (WEP) in a (WLAN) - ANS-By
defining parameters to which client stations must adhere in order to gain access to the network
How do you troubleshooting a hidden node - ANS-Test for degraded data throughput at all client
locations
How does a client locate a wireless local area network (WLAN) when performing passive
scanning - ANS-The client listens for beacons until it hears a beacon listing the service set
identifier (SSID) of the network it expects to join
How does Internet Protocol (IP) multicast differ from IP broadcast - ANS-IP multicast traffic is
only sent to specific modem addresses on the network; IP broadcast traffic is sent to all
modems on the network
How does radio frequency line-of-sight (RF LOS) differ from visual LOS - ANS-LOS is
accompanied by a Fresnel Zone, a series of concentric ellipsoid-shaped areas around the visual
LOS path
How does spread spectrum tech reduce the probability of signal jamming - ANS-By transmitting
over a wide frequency spectrum
How is silver satin cable used to connect telephone equipment to wall outlets typically pinned -
ANS-Reversed at opposite ends, or cross-pinned
How many channels are available with IEEE 802.11g - ANS-11
How might a wireless local area network (LAN) administrator ensure compliance with security
audits? - ANS-Document audit procedures in the security policy
How might you confirm the presence of a hidden node on the network - ANS-Turn on the
request to send/clear to send (RTS/CTS) protocol and watch for increased network data
throughput