Big Halloween Sale Discount Flat 70% Offer - Ends in 0d 00h 00m 00s - Coupon code: 70diswrap

CWNP CWNA-109 Dumps

Page: 1 / 13
Total 125 questions

Certified Wireless Network Administrator Questions and Answers

Question 1

What statement describes the authorization component of a AAA implementation?

Options:

A.

Verifying that a user is who he says he is.

B.

Implementing a WIPS as a full-time monitoring solution to enforce policies.

C.

Granting access to specific network services or resources according to a user profile.

D.

Validating client device credentials against a database.

Question 2

What statement about the IEEE 802.11-2016 QoS facility is true?

Options:

A.

802.11 control frames are assigned to the 802.11 EF priority queue.

B.

When the Voice queue has frames awaiting transmission, no data will be transmitted from the Best Effort queue.

C.

802.11 QoS is achieved by giving high priority queues a statistical advantage at winning contention.

D.

Four 802.1p user priorities are mapped to eight 802.11 transmit queues.

Question 3

Three access points are used within a facility. One access point is on channel 11 and the other two are on channel 1. The two access points using channel 1 are on either side of the access point using channel 11 and sufficiently apart so that they do not interfere with each other when they transmit frames. Assuming no other APs are in the vicinity, is CCI still a possibility in this network and why?

Options:

A.

Yes, because the client devices connected to one of the channel 1 APs will transmit frames that reach the other channel 1 AP as well as clients connected to the other channel 1 AP.

B.

No, because the APs are far enough apart that no CCI will occur.

C.

No, because CCI only occurs in the 5 GHz frequency band.

D.

Yes, because channel 11 loops around and causes CCI with channel 1.

Question 4

In addition to coverage analysis results, what should be included in a post-deployment site survey report to ensure WLAN users experience acceptable performance?

Options:

A.

WAN interface analysis results

B.

Capacity analysis results

C.

Application Layer protocol availability analysis results

D.

Layer 4 protocol availability analysis results

Question 5

You are managing a wireless access point in autonomous mode using the Web based interface. You capture traffic during this management task and notice that you can see the HTML code of the Web pages used for access point management. What error in administration could be the cause of this security concern?

Options:

A.

IPsec is not in use of the management connection as recommended

B.

A VPN with the AP is not established

C.

WPA2 is disabled on the WLAN

D.

HTTP is in use instead of HTTPS

Question 6

When compared with legacy Power Save mode, how does VHT TXOP power save improve battery life for devices on a WLAN?

Options:

A.

Legacy Power Save mode was removed in the 802.11ac amendment.

B.

VHT TXOP power save allows the WLAN transceiver to disable more components when in a low power state.

C.

VHT TXOP power save uses the partial AID in the preamble to allow clients to identify frames targeted for them.

D.

VHT TXOP power save allows stations to enter sleep mode and legacy Power Save does not.

Question 7

You are tasked with performing a throughput test on the WLAN. The manager asks that you use open source tools to reduce costs. What open source tool is designed to perform a throughput test?

Options:

A.

iPerf

B.

PuTTy

C.

IxChariot

D.

Python

Question 8

What factors will have the most significant impact on the amount of wireless bandwidth available to each station within a BSS? (Choose 2)

Options:

A.

The number of clientstations associated to the BSS

B.

The power management settings in the access point’s beacons

C.

The presence of co-located (10m away) access points on non-overlapping channels

D.

The layer 3 protocol used by each station to transmit data over the wireless link

Question 9

During a post-implementation survey, you have detected a non-802.11 wireless device transmitting in the area used by handheld 802.11g scanners. What is the most important factor in determining the impact of this non-802.11 device?

Options:

A.

Receive sensitivity

B.

Channel occupied

C.

Airtime utilization

D.

Protocols utilized

Question 10

What can cause excessive VSWR in RF cables used to connect a radio to an antenna?

Options:

A.

High gain yagi antenna

B.

Radio output power above 100 mW but below 400 mw

C.

High gain parabolic dish antenna

D.

Impedance mismatch

Question 11

When antenna gain is reported in dBi, the gain of the antenna is compared to what theoretical radiator?

Options:

A.

End-fire radiator

B.

Dipole radiator

C.

Isotropic radiator

D.

Anthropomorphic radiator

Question 12

In an 802.11 2.4 GHz system, what 22 MHz channels are considered non-overlapping?

Options:

A.

7 and 11

B.

2 and 8

C.

1 and 5

D.

4 and 6

Question 13

Your manager asked you to locate a solution that allows for centralized monitoring of WLAN performance over time. He wants a single pane of glass for administration and monitoring of the solution. What do you recommend?

Options:

A.

Laptop-based spectrum analyzers

B.

AP-based spectrum analysis

C.

Overlay WLAN monitoring solution

D.

Laptop-based protocol analyzers

Question 14

In which plane of the three networking planes is an access point configured by a WLAN controller?

Options:

A.

Control

B.

Management

C.

Security

D.

Data

Question 15

What ID is typically mapped to an AP’s MAC address if a single BSS is implemented?

Options:

A.

SSID

B.

Device ID

C.

VLAN ID

D.

BSSID

Question 16

A WLAN is implemented using wireless controllers. The APs must locate the controllers when powered on and connected to the network. Which one of the following methods is commonly used to locate the controllers by the APs?

Options:

A.

NTP

B.

DHCP

C.

SNMP

D.

GRE

Question 17

What security option for 802.11 networks supports SAE and requires protected management frames?

    WPA

Options:

A.

WPA2

B.

WPA3

C.

OWE

Question 18

ABC Company is planning to install a new 802.11ac WLAN, but wants to upgrade its wired infrastructure first to provide the best user experience possible. ABC Company has hired you to perform the RF site survey. During the interview with the network manager, you are told that the new Ethernet edge switches will support VoIP phones and 802.11 access points, both using 802.3 PoE.

After hearing this information, what immediate concerns do you note?

Options:

A.

The power budget in the edge switches must be carefully planned and monitored based on the number of supported PoE devices.

B.

The edge Ethernet switches should support Ether-channel to get the best results out of the network.

C.

VoIP phones and 802.11 access points should not be powered by the same edge switch due to distortion.

D.

If the switches are in optimal locations for VoIP phones, they are likely to be suboptimal locations for 802.11 APs

Question 19

What statement about 802.11 WLAN performance is true?

Options:

A.

In modem networks, both centralized and distributed data forwarding work well for most standard office deployments

B.

In most WLANs, no special skill or tuning is required to get peak performance

C.

WLANs perform better as more wireless clients connect with each AP

D.

To get the best performance out of an AP, you should disable data rates of 72 Mbps and lower

Question 20

Return Loss is the decrease of forward energy in a system when some of the power is being reflected back toward the transmitter. What will cause high return loss in an RF transmission system, including the radio, cables, connectors and antenna?

Options:

A.

The use of 50 ohm cables longer than one meter in the RF system

B.

High output power at the transmitter and use of a low-gain antenna

C.

A significant impedance mismatch between components in the RF system

D.

A Voltage Standing Wave Ratio (VSWR) of 1:1

Question 21

What is the most effective method for testing roaming in relation to 802.11 VoIP handsets?

Options:

A.

Use a spectrum analyzer to monitor RF activity during a VoIP call.

B.

Use a protocol analyzer to capture the traffic generated when a laptop roams.

C.

Place a call with the handset and move around the facility to test quality during roaming.

D.

Use the built-in roaming monitor built into all VoIP handsets.

Question 22

You are troubleshooting a problem with interference from a non-802.11 device. Given that the device is not a WLAN device, you cannot use a protocol analyzer and have chosen to use a spectrum analyzer. You want to view the signal from the interfering device over time to see the activity that is generating.

What common spectrum analyzer view should you use for this analysis?

Options:

A.

APs

B.

Waterfall/Spectrogram

C.

Real-time FFT

D.

Clients

Question 23

What 802.11 PHY uses available space in very low frequency ranges that is not in use at the time by broadcast video signals?

Options:

A.

DMG

B.

SIG

C.

DSSS

D.

TVHT

Question 24

A WLAN transmitter that emits a 50 mW signal is connected to a cable with 3 dB loss. If the cable is connected to an antenna with 9dBi gain, what is the EIRP at the antenna element?

Options:

A.

26 dBm

B.

13 dBm

C.

23 dBm

D.

10 dBm

Question 25

When using a spectrum to look for non Wi-Fi interference sources, you notice significant interference across the entire 2.4 GHz band (not on a few select frequencies) within the desktop area of a users workspace, but the interference disappears quickly after just 2 meters. What is the most likely cause of this interference?

Options:

A.

USB 3 devices in the user’s work area

B.

Bluetooth devices in the user’s work area

C.

Excess RF energy from a nearby AP

D.

Unintentional radiation from the PC power supply

Question 26

What is an advantage of using WPA3-Personal instead of WPA2-Personal as a security solution for 802.11 networks?

Options:

A.

WPA3-Personal, also called WPA3-SAE, uses an authentication exchange and WPA2-Personal does not

B.

WPA3-Personal, also called WPA3-SAE, uses a stronger authentication exchange to better secure the network

C.

WPA3-Personal, also called WPA3-SAE, uses AES for encryption and WPA2-Personal does not

D.

WPA3-Personal, also called WPA3-SAE, uses a better encryption algorithm than WPA2-Personal

Question 27

An 802.11-based network uses an AP and has several connecting clients. The clients include iPhones, iPads, laptops and one desktop. What WLAN use case is represented?

Options:

A.

Ad-hoc

B.

WPAN

C.

BSS

D.

IBSS

Question 28

802. 11ax (HE) introduces Resource Units that can be used to allow communications with multiple devices at the same time, on the same channel, in the same BSS. What feature of 802.1 lax provides this functionality?

Options:

A.

6 GHz support

B.

TWT

C.

Wi-Fi-LTE

D.

OFDMA

Question 29

What wireless networking term describes the increase of RF energy in an intentional direction with the use of an antenna?

Options:

A.

Directed Radiation

B.

Beam Digression

C.

Passive Gain

D.

Active Amplification

Question 30

You are using a tool that allows you to see signal strength for all Aps in the area with a visual representation. It shows you SSIDs available and the security settings for each SSID. It allows you to filter by frequency band to see only 2.4 GHz networks or only 5 GHz networks. No additional features are available.

What kind of application is described?

Options:

A.

Protocol analyzer

B.

Site survey utility

C.

Spectrum analyzer

D.

WLAN scanner tool

Question 31

You are a small business wireless network consultant and provide WLAN services for various companies. You receive a call from one of your customers stating that their laptop computers suddenly started experiencing much slower data transfers while connected to the WLAN. This company is located in a multi-tenant office building and the WLAN was

designed to support laptops, tablets and mobile phones. What could cause a sudden change in performance for the laptop computers?

Options:

A.

The sky was not as cloudy that day as it typically is and the sun also radiates electromagnetic waves.

B.

A new tenant in the building has set their AP to the same RF channel that your customer is using.

C.

The antennas in the laptops have been repositioned.

D.

A few of your customer's users have Bluetooth enabled wireless headsets.

Question 32

What security solution is deprecated in the 802.11 standard and should never be used in any modern WLAN deployment?

Options:

A.

Shared Key Authentication

B.

Open System Authentication

C.

CCMP

D.

AES

Question 33

When a STA has authenticated to an AP (AP-1), but still maintains a connection with another AP (AP-2), what is the state of the STA on AP-1?

Options:

A.

Transitional

B.

Unauthenticated and Unassociated

C.

Authenticated and Unassociated

D.

Authenticated and Associated

Question 34

When an ACK frame is not received by the transmitting STA, what is assumed?

Options:

A.

The receiver processed the frame, but did not respond with an ACK frame because 802.11w is enabled

B.

The frame was correctly delivered

C.

The frame was not delivered and must be retransmitted

D.

The receiver is offline

Question 35

As an RF wave propagates through space, the wave front experiences natural expansion that reduces its signal strength in an area. What describes the rate at which this expansion happens?

Options:

A.

Fresnel zone thinning

B.

Ohm's law

C.

Inverse square law

D.

MU-MIMO

Question 36

You administer a WLAN that offers a guest SSID of GUESTNWORK. Users connect to the GUESTNWORK SSID, but report that they cannot browse the Internet. The devices simply report no Internet connection. What common problem causes this scenario?

Options:

A.

NTP issues

B.

Hardware issues

C.

IP routing issues

D.

Captive portal issues

Question 37

You are performing a post-implementation validation survey. What basic tool can be used to easily locate areas of high co-channel interference?

Options:

A.

Throughput tester

B.

Laptop-based spectrum analyzer

C.

Access point spectrum analyzer

D.

Wi-Fi scanner

Page: 1 / 13
Total 125 questions