// All source files and native code may not be transmitted, reproduced, distributed, 
// or commercially exploited in any way without the express written consent of Sybex Inc.

//MOST THINGS THAT CHANGE

//CHAPTER TITLE
var TestChapter:String = "Assessment Test";

var user_Correct:Array = new Array("C","D","C","E","A","B","A","D","D","E","B","A","B","A","D","D","B","C","A","ADG","A","B","A","C","B","E","B","AD","B","C");

total = user_Correct.length;
_root.countdown = false;
// set to false to make the timer count up //
_root.hour = 0;
// number of hours at start//
_root.minute = 0;
// number of minutes at start//
//DON'T FORGET THE QUESTIONS AT THE END
//END OF MOST THINGS THAT CHANGE
//
//
//The following is used in the timer mc for adjusting the clock.
_root.delay = false;
_root.wait = 60;
//wait in seconds
_root.lastTime = Math.floor(getTimer()/1000);
i = 1;
totalCorrect = 0;
totalWrong = 0;
QCounter.QTotal.text = total;
Test_Title.text = TestChapter;
var finalCorrect:Number;
var userResponse:Array = new Array(total);
var markResponse:Array = new Array(total);
user_responseA = "";
user_responseB = "";
user_responseC = "";
user_responseD = "";
user_responseE = "";
user_responseF = "";
user_responseG = "";
user_responseH = "";
user_responseI = "";
user_responseJ = "";
user_responseK = "";
user_responseL = "";
user_responseM = "";
user_responseN = "";
_root.review = false;

function initialize() {
	_root.review = false;
	for (j=0; j<total; j++) {
		userResponse[j] = "";
		markResponse[j] = "";
	}
	
}

function showMatch() {
	set("user_response"+i, user_responseA+user_responseB+user_responseC+user_responseD+user_responseE+user_responseF+user_responseG+user_responseH+user_responseI+user_responseJ+user_responseK+user_responseL+user_responseM+user_responseN);
	userResponse[i-1] = user_responseA+user_responseB+user_responseC+user_responseD+user_responseE+user_responseF+user_responseG+user_responseH+user_responseI+user_responseJ+user_responseK+user_responseL+user_responseM+user_responseN;
}

// display multiple choice user_response answer function
function display() {
	set("user_response"+i, user_responseA+user_responseB+user_responseC+user_responseD+user_responseE+user_responseF+user_responseG+user_responseH+user_responseI+user_responseJ+user_responseK+user_responseL+user_responseM+user_responseN);
	userResponse[i-1] = user_responseA+user_responseB+user_responseC+user_responseD+user_responseE+user_responseF+user_responseG+user_responseH+user_responseI+user_responseJ+user_responseK+user_responseL+user_responseM+user_responseN;

	//**NEW
	response.text = userResponse[i-1];
	
}

//radio button function
function answer(choice) {
	set("user_response"+i, choice);
	userResponse[i-1] = choice;
	
	//**NEW
	response.text = userResponse[i-1];	
}

// marker button fuction
function mark(choice) {
	_root["mark"+i] = choice;
	markResponse[i-1] = choice;
}

// display fill in the blank by user.
function submit(userInput) {
	_root["user_response"+i] = userInput;
}

function reset() {
	_root["user_response"+i] = "";
}

function UnloadReview() {
	//ReviewLinks.unloadMovie();
}


function LayoutQuestion() {

	qname = "q"+(_root._currentframe-1);
	
	markname = "m"+(_root._currentframe-1);
	
	_root.loadQuestion(_root._currentframe-1);	
	
	_root.createEmptyMovieClip("container", 1);

	_root.attachMovie("Marker_mc", markname, 2, {_x:65.4, _y:55.4});
	
	if (_root.question_type == "2R") { this.attachMovie("2R", qname, 1, {_x:24, _y:165}); }
	if (_root.question_type == "3R") { this.attachMovie("3R", qname, 1, {_x:24, _y:165}); }
	if (_root.question_type == "3MC") { this.attachMovie("3MC", qname, 1, {_x:24, _y:165}); }
	if (_root.question_type == "4R") { this.attachMovie("4R", qname, 1, {_x:24, _y:165}); }
	if (_root.question_type == "4MC") { this.attachMovie("4MC", qname, 1, {_x:24, _y:165}); }
	if (_root.question_type == "5R") { this.attachMovie("5R", qname, 1, {_x:24, _y:165}); }
	if (_root.question_type == "5MC") { this.attachMovie("5MC", qname, 1, {_x:24, _y:165}); }	
	if (_root.question_type == "6R") { this.attachMovie("6R", qname, 1, {_x:24, _y:165}); }
	if (_root.question_type == "6MC") { this.attachMovie("6MC", qname, 1, {_x:24, _y:165}); }
	if (_root.question_type == "7R") { this.attachMovie("7R", qname, 1, {_x:24, _y:165}); }
	if (_root.question_type == "7MC") { this.attachMovie("7MC", qname, 1, {_x:24, _y:165}); }
	if (_root.question_type == "8R") { this.attachMovie("8R", qname, 1, {_x:24, _y:165}); }
	if (_root.question_type == "8MC") { this.attachMovie("8MC", qname, 1, {_x:24, _y:165}); }
	if (_root.question_type == "9R") { this.attachMovie("9R", qname, 1, {_x:24, _y:165}); }
	if (_root.question_type == "9MC") { this.attachMovie("9MC", qname, 1, {_x:24, _y:165}); }
	if (_root.question_type == "10R") { this.attachMovie("10R", qname, 1, {_x:24, _y:165}); }
	if (_root.question_type == "10MC") { this.attachMovie("10MC", qname, 1, {_x:24, _y:165}); }


	if (_root.review == false) { _root.attachMovie("show_answer", "show_answer1", 3, {_x:72, _y:418}); }
	if (_root.review == true)  { _root.attachMovie("show_review", "show_review1", 3, {_x:72, _y:418}); }
        if (_root.figure_flag == "True") { _root.attachMovie("show_figure", "show_figure1", 6, {_x:72, _y:418}); }
        if (_root.figure_flag == "False") { _root.createEmptyMovieClip("container", 6); }        

	question_scroll._visible = (question_text.maxscroll > 1);
	question_scroll.setSize(85,16); 
	
	//**NEW
	response.text = userResponse[i-1];
}

function loadQuestion(inNum:Number) {
	var cur:Number = inNum;
	//This corrects for the first frame holding all functions
	//QUESTIONS AND ANSWERS CAN ACCEPT HTML FORMATTING!!!
	//EACH QUESTION SHOULD BE FORMATTED SIMILAR TO THE FOLLOWING.

	switch (cur) {
case 1 :
_root.question = "Which amendment to the standard operates in the 2.4 GHz ISM band and supports data rates up to 54 Mbps?";
_root.answerA = "802.11a";
_root.answerB = "802.11b";
_root.answerC = "802.11g";
_root.answerD = "802.11n";
_root.correct = "C";
_root.explanation = "The IEEE 802.11g amendment to the standard and the 802.11a amendment both support up to 54 Mbps maximum data rates. However, of the two only 802.11g operates in the 2.4 GHz ISM band. 802.11b also operates in the 2.4 GHz ISM band but only supports a maximum data rate of 11 Mbps. The IEEE 802.11n amendment currently in draft supports up to 300 Mbps but eventually 600 Mbps. For more information, see Chapter 1.";
_root.figure_flag = "False";
_root.question_type = "4R";
break;

case 2 :
_root.question = "The access method that an IEEE 802.11a wireless network would use to get control of the wireless medium in order to transmit data is called what?";
_root.answerA = "CSMA/CD";
_root.answerB = "FHSS";
_root.answerC = "HR/DSSS";
_root.answerD = "CSMA/CA";
_root.answerE = "CSMA/DSSS";
_root.correct = "D";
_root.explanation = "CSMA/CA stands for Carrier Sense Multiple Access/Collision Avoidance and is used as an access method for wireless LANs to share the communication medium, which is the air. CSMA/CD is Carrier Sense Multiple Access Collision/Detection Avoidance and is used with Ethernet networks. FHSS and HR/DSSS are spread spectrum technologies used with some standards or amendments. CSMA/DSSS does not exist. For more information, see Chapter 5.";
_root.figure_flag = "False";
_root.question_type = "5R";
break;

case 3 :
_root.question = "What will a protocol analyzer do during a manual site survey?";
_root.answerA = "Perform a RF analysis of the proposed area";
_root.answerB = "Help locate sources of RF interference";
_root.answerC = "Identify existing wireless networks";
_root.answerD = "Describe security requirements of the wireless LAN";
_root.correct = "C";
_root.explanation = "A protocol analyzer will help identify existing wireless networks in an area and provide other information about these networks that can be used in the site survey/design process. An RF analysis is performed by a spectrum analyzer, which will also help locate sources of RF interference. A protocol analyzer can help identify security-related issues from existing wireless networks but will not describe security requirements of a new wireless LAN. For more information, see Chapter 9.";
_root.figure_flag = "False";
_root.question_type = "4R";
break;

case 4 :
_root.question = "IEEE 802.11g wireless networks can operate in which unlicensed RF band?";
_root.answerA = "902 &#8212; 928 MHz ISM";
_root.answerB = "2.400 &#8212; 2.500 GHz UNII";
_root.answerC = "5.725 &#8212; 5.825 GHZ UNII";
_root.answerD = "5.250 &#8212; 5.350 GHz UNII";
_root.answerE = "2.400 &#8212; 2.500 GHz ISM";
_root.correct = "E";
_root.explanation = "IEEE 802.11g networks operate in the 2.4 GHz ISM band. 802.11a networks operate in the 5 GHz UNII band. IEEE standards-based wireless networks do not use the 900 MHz ISM band or the 2.4 GHz UNII band. For more information, see Chapter 4.";
_root.figure_flag = "False";
_root.question_type = "5R";
break;

case 5 :
_root.question = "What could be the cause of intermittent connectivity for a wireless client device in an IEEE 802.11g wireless network?";
_root.answerA = "A weak received signal strength on the client";
_root.answerB = "A signal-to-noise ratio of 35 dB";
_root.answerC = "The access point power is set too high and overpowering the client device";
_root.answerD = "The radio in the client device is disabled";
_root.correct = "A";
_root.explanation = "The received signal strength represents how much of a transmitted signal is being received. If this signal is weak, the difference between the signal and noise may not be high enough to recover the data. If the power on an access point is high, it would provide more received signal. A signal-to-noise ratio of 35 dB is more than adequate. If the radio on the client was disabled, it would not be able to connect at all. For more information, see Chapter 11.";
_root.figure_flag = "False";
_root.question_type = "4R";
break;

case 6 :
_root.question = "Which statement is accurate regarding mesh access points and mesh technology?";
_root.answerA = "Mesh is a legacy technology and the priority should be to select an appropriate upgrade path.";
_root.answerB = "In a full mesh network, all nodes connect together with at least two paths for every node.";
_root.answerC = "Mesh access points are unreliable communications and represent a single point of failure.";
_root.answerD = "Mesh access points require a separate radio for communications and therefore can be costly to implement.";
_root.correct = "B";
_root.explanation = "In a full mesh network, all nodes connect together with at least two paths for every node. This technology is on the increase in outdoor installations and starting to appear in indoor installations as well. It is common in metropolitan area networks and campus area networks. Many access points and wireless LAN switches/controllers have the capability built in. For more information, see Chapter 2.";
_root.figure_flag = "False";
_root.question_type = "4R";
break;

case 7 :
_root.question = "PIN-based wireless LAN security is ___________.";
_root.answerA = "Addressed in the Wi-Fi Protected Setup certification";
_root.answerB = "Required by the 802.11i amendment";
_root.answerC = "Best used in enterprise wireless networks";
_root.answerD = "A multifactor authentication mechanism for WLANs";
_root.correct = "A";
_root.explanation = "PIN-based security is designed for home networks or small office installations to help ease the burden of setting up wireless LAN security. The IEEE 802.11i amendment to the standard requires CCMP/AES and is used in enterprise installations. Enterprise installations use more sophisticated solutions such as user-based and 802.1X/EAP. Multifactor authentication requires at least two parts to be authenticated, such as something you have and something you know. A bank automated teller machine (ATM) card is an example of multifactor authentication. For more information, see Chapter 10.";
_root.figure_flag = "False";
_root.question_type = "4R";
break;

case 8 :
_root.question = "Open system authentication is _____________ in an IEEE 802.11 wireless network.";
_root.answerA = "Flawed";
_root.answerB = "Optional";
_root.answerC = "Secure";
_root.answerD = "Required";
_root.correct = "D";
_root.explanation = "Open system authentication is addressed in the original IEEE 802.11 standard and requires a wireless client device to authenticate to an access point in order to associate. Shared key authentication is legacy and flawed and either cannot or should not be used. Open system authentication is a \"null\" authentication, is automatic and not secure. For more information, see Chapter 7.";
_root.figure_flag = "False";
_root.question_type = "4R";
break;

case 9 :
_root.question = "The amount of output power and useable frequency ranges for wireless devices is determined by which organization?";
_root.answerA = "Wireless Ethernet Compatibility Alliance";
_root.answerB = "Wi-Fi Alliance";
_root.answerC = "Institute of Electrical and Electronics Engineers";
_root.answerD = "Regulatory domain governing bodies";
_root.correct = "D";
_root.explanation = "Regulatory domain governing bodies manage the RF spectrum used in both unlicensed and licensed applications. The IEEE creates standards and the Wi-Fi Alliance certifies devices for interoperability. Wireless Ethernet Compatibility Alliance is the former name of the Wi-Fi Alliance. For more information, see Chapter 1.";
_root.figure_flag = "False";
_root.question_type = "4R";
break;

case 10 :
_root.question = "Which IEEE 802.11 standard or amendment can use three radio chains per band and multiple input/multiple output (MIMO) to transmit data?";
_root.answerA = "802.11";
_root.answerB = "802.11a";
_root.answerC = "802.11g";
_root.answerD = "802.11h";
_root.answerE = "802.11n";
_root.correct = "E";
_root.explanation = "802.11n and MIMO will use up to three radios in either the 2.4 GHz ISM or the 5 GHz UNII band. 802.11a/g uses one radio per band but can use two antennas for diversity. 802.11h is for spectrum management. For more information, see Chapter 5.";
_root.figure_flag = "False";
_root.question_type = "5R";
break;

case 11 :
_root.question = "What can contribute to voltage standing wave ratio (VSWR) in an IEEE 802.11g wireless LAN circuit?";
_root.answerA = "Output power of the access point";
_root.answerB = "Impedance mismatch";
_root.answerC = "Gain of an antenna";
_root.answerD = "Attenuation value of cable";
_root.correct = "B";
_root.explanation = "An impedance mismatch between connections in a WLAN system will cause VSWR. The gain of an antenna is a relative value that has to do with the size or shape of the RF pattern emitted. Attenuation of cable adds to the overall loss of the system. For more information, see Chapter 6.";
_root.figure_flag = "False";
_root.question_type = "4R";
break;

case 12 :
_root.question = "Wireless repeaters are devices in wireless networking that are ________________.";
_root.answerA = "Used to extend the radio frequency cell";
_root.answerB = "Used to repeat and strengthen the RF signal for better performance";
_root.answerC = "Used as a backup solution in the event of an access point failure";
_root.answerD = "Used to increase the bandwidth of the WLAN";
_root.correct = "A";
_root.explanation = "A wireless repeater&#8212;which in most cases is a function of an access point&#8212;will extend the RF cell to allow users at a greater distance to connect. This will have an impact on throughput for users connected to the repeater and this solution is recommended only when necessary. For more information, see Chapter 2.";
_root.figure_flag = "False";
_root.question_type = "4R";
break;

case 13 :
_root.question = "What does the term <i>authenticator&nbsp;</i> identify in an IEEE 802.1X secure network?";
_root.answerA = "The RADIUS server";
_root.answerB = "The access point";
_root.answerC = "The client device";
_root.answerD = "The RAS server";
_root.correct = "B";
_root.explanation = "802.1X is for port-based access control and the terminology for the access point is <i>authenticator&nbsp;</i>. The RADIUS server is the authentication server and the client device is a supplicant. The RAS server is the predecessor to RADIUS. For more information, see Chapter 10.";
_root.figure_flag = "False";
_root.question_type = "4R";
break;

case 14 :
_root.question = "An independent basic service set requires a minimum of how many access points?";
_root.answerA = "0";
_root.answerB = "1";
_root.answerC = "2";
_root.answerD = "3";
_root.correct = "A";
_root.explanation = "An independent basic service set (IBSS) is an ad hoc network that is used for peer-to-peer communications. No access points are used in an IBSS implementation. For more information, see Chapter 7.";
_root.figure_flag = "False";
_root.question_type = "4R";
break;

case 15 :
_root.question = "An HR/DSSS channel used to transmit data an IEEE 802.11g wireless LAN is __________ wide.";
_root.answerA = "2.412 GHz";
_root.answerB = "5.160 GHz";
_root.answerC = "11 MHz";
_root.answerD = "22 MHz";
_root.correct = "D";
_root.explanation = "Both DSSS and HR/DSSS channels are 22 MHz wide. 2.412 GHz and 5.160 GHz is the center frequency of some channels used. For more information, see Chapter 5.";
_root.figure_flag = "False";
_root.question_type = "4R";
break;

case 16 :
_root.question = "What is the horizontal angle of measurement in degrees of an omnidirectional antenna with a gain of 2.2 dBi?";
_root.answerA = "90";
_root.answerB = "180";
_root.answerC = "270";
_root.answerD = "360";
_root.answerE = "0";
_root.correct = "D";
_root.explanation = "An omnidirectional antenna has a horizontal radiation pattern of 360 degrees. For more information, see Chapter 6.";
_root.figure_flag = "False";
_root.question_type = "5R";
break;

case 17 :
_root.question = "You are a wireless LAN engineer hired to perform a predictive analysis site survey for a 150,000-square-foot office building. This space includes walled offices as well as cubicles. What is an advantage of a predictive modeling site survey over a manual survey in this specific application?";
_root.answerA = "A predictive site survey is the most accurate available.";
_root.answerB = "The amount of time required for accurate results is much less than a complete manual walkthrough.";
_root.answerC = "Because of an extensive attenuation database, a predictive modeling site survey will be able to determine the interference values of any obstacles.";
_root.answerD = "A predictive modeling site survey will allow you to experiment with different access point criteria, including power settings, channels, and locations, without the need for a physical visit.";
_root.correct = "B";
_root.explanation = "A predictive analysis site survey will minimize the time required on-site for testing and analysis. This site survey will be accurate if the information about the location input is accurate. A manual site survey requires a walkthrough on the area and can be time consuming. For more information, see Chapter 9.";
_root.figure_flag = "False";
_root.question_type = "4R";
break;

case 18 :
_root.question = "Which RF channels are considered non-overlapping for an IEEE 802.11g network?";
_root.answerA = "1 and 4";
_root.answerB = "6 and 9";
_root.answerC = "1 and 6";
_root.answerD = "3 and 7";
_root.answerE = "11 and 13";
_root.correct = "C";
_root.explanation = "To be considered non-overlapping, channels in the 2.4 GHz ISM band need to be separated by 5 or 25 MHz. For more information, see Chapter 4.";
_root.figure_flag = "False";
_root.question_type = "5R";
break;

case 19 :
_root.question = "The Service Set Identifier (SSID) in an IEEE 802.11 wireless LAN is also known as what?";
_root.answerA = "The name of the wireless network";
_root.answerB = "The media access control address of the radio";
_root.answerC = "The name of the access point";
_root.answerD = "The wireless medium identifier";
_root.correct = "A";
_root.explanation = "The SSID is the name that identifies a wireless network. The MAC address of the access point radio is the BSSID. For more information, see Chapter 7.";
_root.figure_flag = "False";
_root.question_type = "4R";
break;

case 20 :
_root.question = "What Layer 2 security mechanisms are weak and should not be used with IEEE 802.11 wireless LANs? (Choose three.)";
_root.answerA = "SSID hiding";
_root.answerB = "WPA";
_root.answerC = "VPN";
_root.answerD = "WEP";
_root.answerE = "WPA 2.0";
_root.answerF = "RBAC";
_root.answerG = "MAC filter";
_root.correct = "ADG";
_root.explanation = "SSID hiding, WEP, and MAC filtering are legacy security mechanisms for IEEE 802.11 wireless networks and should not be used. WPA and WPA 2.0 are Wi-Fi certifications and are more advanced. Virtual private network (VPN) is a Layer 3 security solution typically used for remote access. RBAC is role-based access control. For more information, see Chapter 10.";
_root.figure_flag = "False";
_root.question_type = "7MC";
break;

case 21 :
_root.question = "If an autonomous access point is set to what is commonly referred to as <i>root mode,&nbsp;</i> it will be able to perform which function?";
_root.answerA = "Connect to a distribution system and allow client devices to send information to other devices";
_root.answerB = "Connect to a distribution system as a root bridge and allow two or more LANs to connect wirelessly";
_root.answerC = "Connect to a distribution system but is seldom used as this mode requires extensive configuration";
_root.answerD = "Connect to a distribution system as a repeater which allows the RF cell to be extended";
_root.correct = "A";
_root.explanation = "Most enterprise-level autonomous access points have the capability to operate in root, repeater, or bridge modes. Root mode is the most common. Root mode allows devices to authenticate, associate, and access network resources and services. For more information, see Chapter 2.";
_root.figure_flag = "False";
_root.question_type = "4R";
break;

case 22 :
_root.question = "What could cause low throughput in an 802.11g wireless network?";
_root.answerA = "Access point output power is too high";
_root.answerB = "Too many associated client devices";
_root.answerC = "Load-balancing features are moving clients";
_root.answerD = "The clients are too close to the access points and are overpowered";
_root.correct = "B";
_root.explanation = "Low throughput may occur when too many client devices are associated to an access point and cause overloading. Load balancing would help to solve this problem. Because of DRS, the closer the client device is to an access point, the better the throughput. For more information, see Chapter 11.";
_root.figure_flag = "False";
_root.question_type = "4R";
break;

case 23 :
_root.question = "Some common wireless personal network (WPAN) devices such as Bluetooth use a communication technology that has the potential to interfere with IEEE 802.11g wireless LANs. What is the name for this technology?";
_root.answerA = "FHSS";
_root.answerB = "DSSS";
_root.answerC = "HR/DSSS";
_root.answerD = "HR/FHSS";
_root.answerE = "ERP-OFDM";
_root.correct = "A";
_root.explanation = "Some wireless personal networks (WPANs), such as Bluetooth, use FHSS for communications. This will potentially interfere with IEEE 802.11 wireless networks. DSSS, HR/DSSS, ERP-OFDM are all used in wireless LANs. HR/FHSS does not exist. For more information, see Chapter 5.";
_root.figure_flag = "False";
_root.question_type = "5R";
break;

case 24 :
_root.question = "A virtual private network (VPN) operates at what layer of the OSI model?";
_root.answerA = "Physical, Layer 1";
_root.answerB = "Data Link, Layer 2";
_root.answerC = "Network, Layer 3";
_root.answerD = "Transport, Layer 4";
_root.answerE = "Application, Layer 7";
_root.correct = "C";
_root.explanation = "A virtual private network (VPN) is a Layer 3 (Network) security solution and is commonly used for remote access connectivity from unsecured networks such as hotspots. For more information, see Chapter 10.";
_root.figure_flag = "False";
_root.question_type = "5R";
break;

case 25 :
_root.question = "An antenna will propagate RF energy in specific radiation patterns, both horizontal and vertical. How do antenna manufacturers identify the horizontal radiation patterns?";
_root.answerA = "Elevation";
_root.answerB = "Azimuth";
_root.answerC = "Dipole";
_root.answerD = "Longitude";
_root.correct = "B";
_root.explanation = "The technical term for the horizontal radiation pattern is <i>azimuth&nbsp;</i>. The elevation is the vertical radiation pattern. For more information, see Chapter 6.";
_root.figure_flag = "False";
_root.question_type = "4R";
break;

case 26 :
_root.question = "Wi-Fi Protected Access 2 (WPA 2.0) requires __________for the cipher suite and __________ for the encryption mechanism.";
_root.answerA = "TKIP, RC4";
_root.answerB = "TKIP, RC5";
_root.answerC = "WEP, RC4";
_root.answerD = "CCMP, RC4";
_root.answerE = "CCMP, AES";
_root.correct = "E";
_root.explanation = "Wi-Fi Protected Access 2 (WPA 2.0) requires CCMP/AES. TKIP/RC4 is optional. WEP/RC4 is legacy and should not be used. It cannot be used with a robust secure network. RC5 is a stream cipher and not used with IEEE 802.11 wireless LANs. CCMP uses AES, not RC4. For more information, see Chapter 1.";
_root.figure_flag = "False";
_root.question_type = "5R";
break;

case 27 :
_root.question = "Antenna diversity will _____________.";
_root.answerA = "Provide an RF signal additional range";
_root.answerB = "Reduce the effects of multipath";
_root.answerC = "Increase the effects of VSWR";
_root.answerD = "Provide active gain";
_root.correct = "B";
_root.explanation = "Antenna diversity will reduce the effects of multipath caused by reflections. An antenna will provide additional coverage and range based on the gain. VSWR is caused by an impedance mismatch, and active gain is provided by amplifiers and other powered devices. For more information, see Chapter 6.";
_root.figure_flag = "False";
_root.question_type = "4R";
break;

case 28 :
_root.question = "The manual site survey process allows the site surveyor to perform the survey in one of two modes. What are these two modes? (Choose two.)";
_root.answerA = "Passive";
_root.answerB = "Visual";
_root.answerC = "Predictive";
_root.answerD = "Active";
_root.answerE = "Placement";
_root.correct = "AD";
_root.explanation = "Passive and active are the two modes in which a manual site survey can be performed. Passive mode monitors all RF, and active mode requires a client association. For more information, see Chapter 9.";
_root.figure_flag = "False";
_root.question_type = "5MC";
break;

case 29 :
_root.question = "A beacon is an example of what type of frame used in an IEEE 802.11 wireless LAN?";
_root.answerA = "Control";
_root.answerB = "Management";
_root.answerC = "Data";
_root.answerD = "Null function";
_root.correct = "B";
_root.explanation = "A beacon frame is a management frame and is used to advertise information about the wireless LAN. For more information, see Chapter 7.";
_root.figure_flag = "False";
_root.question_type = "4R";
break;

case 30 :
_root.question = "What can have a negative effect on the capacity of an IEEE 802.11g wireless LAN access point?";
_root.answerA = "Reflections caused by furnishings";
_root.answerB = "Frequency range in use";
_root.answerC = "Number of associated users";
_root.answerD = "Output power of access point";
_root.correct = "C";
_root.explanation = "The number of associated users will affect the capacity of an access point. The frequency range will affect the propagation as well as the output power. Reflections will cause multipath. For more information, see Chapter 4.";
_root.figure_flag = "False";
_root.question_type = "4R";
break;

	}
		
	QCounter.QCurrent.text = cur;
}

initialize();


//Change the following question numbers to the indicated question type!
//1. 4R
//2. 5R
//3. 4R
//4. 5R
//5. 4R
//6. 4R
//7. 4R
//8. 4R
//9. 4R
//10. 5R
//11. 4R
//12. 4R
//13. 4R
//14. 4R
//15. 4R
//16. 5R
//17. 4R
//18. 5R
//19. 4R
//20. 7MC
//21. 4R
//22. 4R
//23. 5R
//24. 5R
//25. 4R
//26. 5R
//27. 4R
//28. 5MC
//29. 4R
//30. 4R





//