Labour Day Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

CWNP CWNA-108 Dumps

Page: 1 / 9
Total 121 questions

Certified Wireless Network Administrator Questions and Answers

Question 1

What statement about 802.3, Clause 33 Power over Ethernet is true?

Options:

A.

When using CAT5 cabling, you increase the maximum draw available to the PD over that available with CAT6.

B.

Only endpoint PSEs are supported.

C.

Only midspan PSEs are supported.

D.

The lowest voltage drop is achieved when using CAT6 cable instead of Cat5 or CAT5e.

Question 2

An AP is advertised as a tri-band, 4x4:4, Wi-Fi 6, 802. 11ax AP. Based on this information and assuming it is correctly advertised, what can be determined as certainly true about this AP?

Options:

A.

It supports four channels in 2.4 GHz and 4 channels in 5 GHz

B.

It supports UL-MU-MIMO

C.

It uses a modified OpenWRT firmware

D.

It has 4 radio chains

Question 3

You are using a site survey tool for post-implementation validation. You have installed the appropriate adapter driver and imported a floor plan. Now, you want to take the next step in proper tool use. What must you do before gathering survey data after the floor plan is imported?

Options:

A.

Calibrate the floor plan

B.

Install WinPCAP

C.

Nothing, you can simply start capturing signal readings

D.

Install iPerf

Question 4

You are evaluating access points for use in the 5 GHz frequency band. What PHY supports this band and supports 80 MHz channels?

Options:

A.

HT

B.

VHT

C.

ERP

D.

OFDM

Question 5

You are performing a post-implementation validation survey. What basic tool can be used to easily locate areas of high co-channel interference?

Options:

A.

Throughput tester

B.

Laptop-based spectrum analyzer

C.

Access point spectrum analyzer

D.

Wi-Fi scanner

Question 6

In an 802.11 2.4 GHz system, what 22 MHz channels are considered non-overlapping?

Options:

A.

7 and 11

B.

2 and 8

C.

1 and 5

D.

4 and 6

Question 7

What primary metric of scanning can stations use to select the best AP for connectivity to the desired BSS?

Options:

A.

Signal strength of AP beacons received.

B.

PING latency when testing against an Internet server.

C.

Throughput speed in Mbps.

D.

FCS errors in frames transmitted to and from the AP.

Question 8

You are installing an AP to be used by 27 laptops. All laptops will connect on the 5 GHz frequency band. A neighbor network uses channels 1 and 6. What channel should be used for this AP and why?

Options:

A.

Channel 6, because it is always best to use this channel

B.

A 5 GHz channel, because channels 1 and 6 are 2.4 GHz channels they have no impact on the decision

C.

Channel 1, because it is best to use the channel with the lowest frequency

D.

Channel 11, because channels 1 and 6 are in use nearby

Question 9

What statement about 802.11 WLAN bridges is true?

Options:

A.

WLAN bridges only work in the 2.4 GHz frequency band and they support only SISO communications

B.

WLAN bridges must use a channel with acceptable SNR at both transceivers to maintain the desired data rate bi-directionally

C.

WLAN bridges may support MIMO communications, but only if used in the 5 GHz frequency band

D.

WLAN bridges must be implemented such that no interference occurs on the channel anywhere between the two endpoints used to establish the bridge

Question 10

An IEEE 802.11 amendment is in the daft state. What impact does this draft amendment have on the 802.11 standard?

Options:

A.

Devices will be released based on the draft amendment and the draft amendment features are part of the standard.

B.

No impact: Until an amendment is ratified, it does not become part of the standard.

C.

No impact: Draft amendments do not become part of the standard until a working group is formed.

D.

The standard is changed to reflect the new capabilities as soon as an amendment enters the draft stage.

Question 11

You are managing a wireless access point in autonomous mode using the Web based interface. You capture traffic during this management task and notice that you can see the HTML code of the Web pages used for access point management. What error in administration could be the cause of this security concern?

Options:

A.

IPsec is not in use of the management connection as recommended

B.

A VPN with the AP is not established

C.

WPA2 is disabled on the WLAN

D.

HTTP is in use instead of HTTPS

Question 12

When considering data rates available in HT and VHT PHY devices, in addition to the modulation, coding, channel width, and spatial streams, what impacts the data rate according to the MCS tables?

Options:

A.

Frequency band in use

B.

client drivers

C.

guard interval

D.

Antenna Height

Question 13

During a post-implementation survey, you have detected a non-802.11 wireless device transmitting in the area used by handheld 802.11g scanners. What is the most important factor in determining the impact of this non-802.11 device?

Options:

A.

Receive sensitivity

B.

Channel occupied

C.

Airtime utilization

D.

Protocols utilized

Question 14

What facts are true regarding controllers and APs in a Split MAC architecture?

Options:

A.

An IP tunnel is established between the AP and controller for AP management and control functions.

B.

Using centralized data forwarding, APs never tag Ethernet frames with VLAN identifiers or 802.1p CoS.

C.

With 802.1X/EAP security, the AP acts as the supplicant and the controller acts as the authenticator.

D.

Management and data frame types must be processed locally by the AP, while control frame types must be sent to the controller.

Question 15

You must plan for POE in an office environment. Which one of these devices is least likely to be a POE PSE?

Options:

A.

Midspan multi-port injector

B.

Switch

C.

VolP Phone

D.

Midspan injector

Question 16

A natural disaster has occurred in a remote area that is approximately 57 miles from the response team headquarters. The response team must implement a local wireless network using 802.11 WLAN access points. What is the best method, of those listed, for implementation of a network back-haul for communications across the Internet in this

scenario?

Options:

A.

802.11 bridging to the response team headquarters

B.

Cellular/LTE/5G

C.

Turn up the output power of the WLAN at the response team headquarters

D.

Temporary wired DSL

Question 17

Which directional antenna types are commonly used by indoor Wi-Fi devices in a MIMO multiple spatial stream implementation?

Options:

A.

Dipole and yagi

B.

Grid and sector

C.

Patch and panel

D.

Dish and grid

Question 18

What statement about the IEEE 802.11-2016 QoS facility is true?

Options:

A.

802.11 control frames are assigned to the 802.11 EF priority queue.

B.

When the Voice queue has frames awaiting transmission, no data will be transmitted from the Best Effort queue.

C.

802.11 QoS is achieved by giving high priority queues a statistical advantage at winning contention.

D.

Four 802.1p user priorities are mapped to eight 802.11 transmit queues.

Question 19

ABC Company is planning a point-to-multipoint outdoor bridge deployment with standalone (autonomous)

802.11 bridge units. 802.1X/EAP will be used for bridge authentication. A Linux-based RADIUS server will be used for authentication. What device in the bridge implementation acts as the 802.1X Authenticator?

Options:

A.

The Ethernet switch

B.

The RADIUS server

C.

All non-root bridges

D.

The root bridge

Question 20

A WLAN transmitter that emits a 50 mW signal is connected to a cable with 3 dB loss. If the cable is connected to an antenna with 9dBi gain, what is the EIRP at the antenna element?

Options:

A.

26 dBm

B.

13 dBm

C.

23 dBm

D.

10 dBm

Question 21

An 802.11 WLAN transmitter that emits a 50 mW signal is connected to a cable with 3 dB of loss. The cable is connected to an antenna with 16 dBi of gain. What is the power level at the Intentional Radiator?

Options:

A.

25 mW

B.

250 mW

C.

500 mW

D.

1000 mW

Question 22

You are the network administrator for ABC Company. Your manager has recently attended a wireless security seminar. The seminar speaker taught that a wireless network could be hidden from potential intruders if you disabled the broadcasting of the SSID in Beacons and configured the access points not to respond to Probe Request frames that have a null SSID field.

Your manager suggests implementing these security practices. What response should you give to this suggestion?

Options:

A.

Any 802.11 protocol analyzer can see the SSID in clear text in frames other than Beacons frames. This negates any security benefit of trying to hide the SSID in Beacons and Probe Response frames.

B.

To improve security by hiding the SSID, the AP and client stations must both be configured to remove the SSID from association request and response frames. Most WLAN products support this.

C.

Any tenants in the same building using advanced penetration testing tools will be able to obtain the SSID by exploiting WPA EAPOL-Key exchanges. This poses an additional risk of exposing the WPA key.

D.

This security practice prevents manufacturers’ client utilities from detecting the SSID. As a result, the SSID cannot be obtained by attackers, except through social engineering, guessing, or use of a WIPS.

Question 23

You are evaluating a connection that states the data rate is 150 Mbps. What is the expected throughput of this connection?

Options:

A.

Less than 150 Mbps because of 802.11 overhead and contention

B.

54 Mbps because that is the actual maximum throughput of an 802.11 connection

C.

More than 150 Mbps because of compression

D.

150 Mbps because the data rate is equal to the throughput

Question 24

An RF signal sometimes bends as it passes through some material other than free space. What is the term that describes this behavior?

Options:

A.

Refraction

B.

Warping

C.

Scattering

D.

Reflection

Question 25

What statement is true concerning the use of Orthogonal Frequency Division Multiplexing (OFDM) modulation method in IEEE 802.11 WLANs?

Options:

A.

OFDM implements BPSK modulation to allow for data rates up to 7 Gbps.

B.

OFDM was first introduced in 802.11a and is used by the ERP, HT and VHT PHYs as well.

C.

OFDM modulation is used only in 5 GHz 802.11 transmissions.

D.

OFDM was used by Frequency Hopping Spread Spectrum (FHSS) PHY devices.

Question 26

You are implementing a multi-AP WLAN and fast secure roaming is essential. Which one of the following methods is an IEEE 802.11 standard method for fast roaming?

Options:

A.

FT

B.

OKC

C.

Load balancing

D.

Band steering

Question 27

You were previously onsite at XYZ’s facility to conduct a pre-deployment RF site survey. The WLAN has been deployed according to your recommendations and you are onsite again to perform a post-deployment validation survey.

When performing this type of post-deployment RF site survey voice over Wi-Fi, what is an action that must be performed?

Options:

A.

Spectrum analysis to locate and identify RF interference sources.

B.

Frequency-band hopping analysis to detect improper RF channel implementations.

C.

Application analysis with an active phone call on an VoWiFi handset.

D.

Protocol analysis to discover channel use on neighboring APs.

Question 28

Return Loss is the decrease of forward energy in a system when some of the power is being reflected back toward the transmitter. What will cause high return loss in an RF transmission system, including the radio, cables, connectors and antenna?

Options:

A.

The use of 50 ohm cables longer than one meter in the RF system

B.

High output power at the transmitter and use of a low-gain antenna

C.

A significant impedance mismatch between components in the RF system

D.

A Voltage Standing Wave Ratio (VSWR) of 1:1

Question 29

What feature of 802.1 lax (HE) may impact design decisions related to AP placement and the spacing between same-channel BSS cells (3SAs) because it is designed to reduce overlapping BSS contention?

Options:

A.

TWT

B.

BSS Color

C.

uplink MU-MIMO

D.

6 GHz band support

Question 30

You administer a WLAN that offers a guest SSID of GUESTNWORK. Users connect to the GUESTNWORK SSID, but report that they cannot browse the Internet. The devices simply report no Internet connection. What common problem causes this scenario?

Options:

A.

NTP issues

B.

Hardware issues

C.

IP routing issues

D.

Captive portal issues

Question 31

You recently purchased four laptops containing dual-band 802.11ac adapters. The laptops can connect to your 2.4 GHz network, but they cannot connect to the 5 GHz network. The laptops do not show the 5 GHz SSIds, which are different than the 2.4 GHz SSIDs. Existing devices can connect to the 5 GHz SSIDs with no difficulty. What is the likely problem?

Options:

A.

Interference from non-Wi-Fi sources

B.

Faulty drivers

C.

DoS attack

D.

Interference from other WLANs

Question 32

A WLAN is implemented using wireless controllers. The APs must locate the controllers when powered on and connected to the network. Which one of the following methods is commonly used to locate the controllers by the APs?

Options:

A.

NTP

B.

DHCP

C.

SNMP

D.

GRE

Question 33

You have been tasked with creating a wireless link between two buildings on a single campus. The link must support at least 150 Mbps data rates. What kind of WLAN technology role should you deploy?

Options:

A.

WPAN

B.

IBSS

C.

Wireless bridging

D.

Access BSS

Question 34

What security solution is required to be used in place of Open System Authentication for all open network 802.11 implementations in the 6 GHz band?

Options:

A.

OWE

B.

Kerberos

C.

WPA3-Enterprise

D.

WPA3-SAE

Question 35

What 802.11 PHY uses available space in very low frequency ranges that is not in use at the time by broadcast video signals?

Options:

A.

DMG

B.

SIG

C.

DSSS

D.

TVHT

Question 36

You are troubleshooting a problem with interference from a non-802.11 device. Given that the device is not a WLAN device, you cannot use a protocol analyzer and have chosen to use a spectrum analyzer. You want to view the signal from the interfering device over time to see the activity that is generating.

What common spectrum analyzer view should you use for this analysis?

Options:

A.

APs

B.

Waterfall/Spectrogram

C.

Real-time FFT

D.

Clients

Page: 1 / 9
Total 121 questions