What authentication method is referenced in the 802.11-2016 and 802.11-2020 specifications and is recommended for robust WI-AN client security?
What is required when operating 802.11ax APS in the 6 GHz band using passphrase-based authentication?
What 802.11 PHY uses available space in very low frequency ranges that is not in use at the time by broadcast video signals?
XYZ Company has decided to install an 802.11 WLAN system that will support 1083 wireless users, but they are concerned about network security. XYZ is interested in deploying standardized security features. In addition to WPA2-Enterprise with PEAP and role-based access control, XYZ would like to support management frame protection as well as a fast secure roaming protocol for future mobile handsets.
As XYZ Company selects a product to deploy, what two IEEE amendments, which are included in 802.11-2016, and 802.11-2020 should be supported to provide the management frame protection and fast secure roaming security features?
What 802.11 network configuration would result in multiple stations broadcasting Beacon frames with the same BSSID but with different source addresses?
When a client station sends a broadcast probe request frame with a wildcard SSID, how do APs respond?
You are troubleshooting a client issue on a Windows laptop. The laptop can see and connect to 2.4 GHz APs, but is does not even see 5 GHz APs. While evaluating the issue, you determine that this problem is happening for all of the laptops of this model in the organization. Several other tablets connect on channel 48 and channel 52 in the same work areas. What is the likely problem?
You are tasked with performing a throughput test on the WLAN. The manager asks that you use open source tools to reduce costs. What open source tool is designed to perform a throughput test?