Labour Day Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

CWNP CWNA-109 Dumps

Page: 1 / 9
Total 122 questions

Certified Wireless Network Administrator Questions and Answers

Question 1

What can cause excessive VSWR in RF cables used to connect a radio to an antenna?

Options:

A.

High gain yagi antenna

B.

Radio output power above 100 mW but below 400 mw

C.

High gain parabolic dish antenna

D.

Impedance mismatch

Question 2

You are troubleshooting a client issue on a Windows laptop. The laptop can see and connect to 2.4 GHz APs, but is does not even see 5 GHz APs. While evaluating the issue, you determine that this problem is happening for all of the laptops of this model in the organization. Several other tablets connect on channel 48 and channel 52 in the same work areas. What is the likely problem?

Options:

A.

The clients are configured to use WPA and 5 GHz channels only support WPA2.

B.

The client drivers are faulty and should be upgraded.

C.

The antennas in the laptop have insufficient gain to detect the 5 GHz signals.

D.

The access points are configured to disallow 5 GHz.

Question 3

In a mesh BSS (MBSS), according to the 802.11 standard, what device connect the mesh to an Ethernet network?

Options:

A.

Mesh Gate

B.

Mesh Switch

C.

Mesh Router

D.

Mesh Portal

Question 4

Your manager asked you to locate a solution that allows for centralized monitoring of WLAN performance over time. He wants a single pane of glass for administration and monitoring of the solution. What do you recommend?

Options:

A.

Laptop-based spectrum analyzers

B.

AP-based spectrum analysis

C.

Overlay WLAN monitoring solution

D.

Laptop-based protocol analyzers

Question 5

A WLAN transmitter that emits a 50 mW signal is connected to a cable with 3 dB loss. If the cable is connected to an antenna with 9dBi gain, what is the EIRP at the antenna element?

Options:

A.

26 dBm

B.

13 dBm

C.

23 dBm

D.

10 dBm

Question 6

What best describes WPA2 in relation to 802.11 wireless networks?

Options:

A.

WPA2 is the standard that defines security for WLANs.

B.

WPA2 is a certification created by the Wi-Fi Alliance that validates devices correctly implement CCMP/ AES.

C.

WPA2 is the second version of WPA and it enhances security through the use of TKIP instead of WEP.

D.

WPA2 is specified in the 802.11 standard as implementing CCMP/AES.

Question 7

Your consulting firm has recently been hired to complete a site survey for a company desiring an indoor coverage WI-AN. Your engineers use predictive design software for the task, but the company insists on a pre-design site visit.

What task should be performed as part of the pre-design visit to prepare for a predictive design?

Options:

A.

Install at least one AP on each side of the exterior walls to test for co-channel interference through these walls

B.

Collect information about the company's security requirements and the current configuration of their RADIUS and user database servers

C.

Test several antenna types connected to the intended APS for use in the eventual deployment

D.

Evaluate the building materials at the facility and confirm that the floor plan documents are consistent with the actual building

Question 8

Option 43 must be configured to allow access points to locate controllers. In what network service should this option be configured?

Options:

A.

DNS

B.

LDAP

C.

DHCP

D.

RADIUS

Question 9

You are using a tool that allows you to see signal strength for all Aps in the area with a visual representation. It shows you SSIDs available and the security settings for each SSID. It allows you to filter by frequency band to see only 2.4 GHz networks or only 5 GHz networks. No additional features are available.

What kind of application is described?

Options:

A.

Protocol analyzer

B.

Site survey utility

C.

Spectrum analyzer

D.

WLAN scanner tool

Question 10

You are performing a post-implementation validation survey. What basic tool can be used to easily locate areas of high co-channel interference?

Options:

A.

Throughput tester

B.

Laptop-based spectrum analyzer

C.

Access point spectrum analyzer

D.

Wi-Fi scanner

Question 11

What statement about 802.3, Clause 33 Power over Ethernet is true?

Options:

A.

When using CAT5 cabling, you increase the maximum draw available to the PD over that available with CAT6.

B.

Only endpoint PSEs are supported.

C.

Only midspan PSEs are supported.

D.

The lowest voltage drop is achieved when using CAT6 cable instead of Cat5 or CAT5e.

Question 12

You are reconfiguring an AP to use the short guard interval. How long will the new guard interval duration be after the change?

Options:

A.

800 ns

B.

400 ns

C.

104 ms

D.

10 ms

Question 13

Which unit of measurement, as formally defined, is an absolute unit that is used to quantify received signal power levels on a logarithmic scale?

Options:

A.

SNI

B.

VSWR

C.

dBm

D.

dBi

Question 14

In which plane of the three networking planes is an access point configured by a WLAN controller?

Options:

A.

Control

B.

Management

C.

Security

D.

Data

Question 15

The requirements for a WLAN you are installing state that it must support unidirectional delays of less than 150 ms and the signal strength at all receivers can be no lower than -67 dBm. What application is likely used that demands these requirements?

Options:

A.

VoIP

B.

E-Mail

C.

FTP

D.

RTLS

Question 16

During a post-implementation survey, you have detected a non-802.11 wireless device transmitting in the area used by handheld 802.11g scanners. What is the most important factor in determining the impact of this non-802.11 device?

Options:

A.

Receive sensitivity

B.

Channel occupied

C.

Airtime utilization

D.

Protocols utilized

Question 17

What feature of 802.1 lax (HE) is managed with beacon and trigger frames and is primarily a power management method, but also provides more efficient access to the channel used within a BSS?

Options:

A.

TWT

B.

BSS Color

C.

UL-MU-MIMO

D.

OFDMA

Question 18

You are installing an AP to be used by 27 laptops. All laptops will connect on the 5 GHz frequency band. A neighbor network uses channels 1 and 6. What channel should be used for this AP and why?

Options:

A.

Channel 6, because it is always best to use this channel

B.

A 5 GHz channel, because channels 1 and 6 are 2.4 GHz channels they have no impact on the decision

C.

Channel 1, because it is best to use the channel with the lowest frequency

D.

Channel 11, because channels 1 and 6 are in use nearby

Question 19

The center frequency of channel 1 in the 2.4 GHz band is 2.412 GHz (2412 MHz). What is the center frequency of channel 4?

Options:

A.

2.427

B.

2.422

C.

2.413

D.

2.417

Question 20

In addition to coverage analysis results, what should be included in a post-deployment site survey report to ensure WLAN users experience acceptable performance?

Options:

A.

WAN interface analysis results

B.

Capacity analysis results

C.

Application Layer protocol availability analysis results

D.

Layer 4 protocol availability analysis results

Question 21

You are the network administrator for ABC Company. Your manager has recently attended a wireless security seminar. The seminar speaker taught that a wireless network could be hidden from potential intruders if you disabled the broadcasting of the SSID in Beacons and configured the access points not to respond to Probe Request frames that have a null SSID field.

Your manager suggests implementing these security practices. What response should you give to this suggestion?

Options:

A.

Any 802.11 protocol analyzer can see the SSID in clear text in frames other than Beacons frames. This negates any security benefit of trying to hide the SSID in Beacons and Probe Response frames.

B.

To improve security by hiding the SSID, the AP and client stations must both be configured to remove the SSID from association request and response frames. Most WLAN products support this.

C.

Any tenants in the same building using advanced penetration testing tools will be able to obtain the SSID by exploiting WPA EAPOL-Key exchanges. This poses an additional risk of exposing the WPA key.

D.

This security practice prevents manufacturers’ client utilities from detecting the SSID. As a result, the SSID cannot be obtained by attackers, except through social engineering, guessing, or use of a WIPS.

Question 22

Which IEEE 802.11 physical layer (PHY) specification includes support for and compatibility with both ERP and HR/DSSS?

Options:

A.

DSSS (802.11-Prime)

B.

OFDM (802.11a)

C.

HT (802.11n)

D.

VHT (802.11ac)

Question 23

A natural disaster has occurred in a remote area that is approximately 57 miles from the response team headquarters. The response team must implement a local wireless network using 802.11 WLAN access points. What is the best method, of those listed, for implementation of a network back-haul for communications across the Internet in this

scenario?

Options:

A.

802.11 bridging to the response team headquarters

B.

Cellular/LTE/5G

C.

Turn up the output power of the WLAN at the response team headquarters

D.

Temporary wired DSL

Question 24

What statement about 802.11 WLAN bridges is true?

Options:

A.

WLAN bridges only work in the 2.4 GHz frequency band and they support only SISO communications

B.

WLAN bridges must use a channel with acceptable SNR at both transceivers to maintain the desired data rate bi-directionally

C.

WLAN bridges may support MIMO communications, but only if used in the 5 GHz frequency band

D.

WLAN bridges must be implemented such that no interference occurs on the channel anywhere between the two endpoints used to establish the bridge

Question 25

You are troubleshooting a problem with interference from a non-802.11 device. Given that the device is not a WLAN device, you cannot use a protocol analyzer and have chosen to use a spectrum analyzer. You want to view the signal from the interfering device over time to see the activity that is generating.

What common spectrum analyzer view should you use for this analysis?

Options:

A.

APs

B.

Waterfall/Spectrogram

C.

Real-time FFT

D.

Clients

Question 26

When compared with legacy Power Save mode, how does VHT TXOP power save improve battery life for devices on a WLAN?

Options:

A.

Legacy Power Save mode was removed in the 802.11ac amendment.

B.

VHT TXOP power save allows the WLAN transceiver to disable more components when in a low power state.

C.

VHT TXOP power save uses the partial AID in the preamble to allow clients to identify frames targeted for them.

D.

VHT TXOP power save allows stations to enter sleep mode and legacy Power Save does not.

Question 27

What factors will have the most significant impact on the amount of wireless bandwidth available to each station within a BSS? (Choose 2)

Options:

A.

The number of clientstations associated to the BSS

B.

The power management settings in the access point’s beacons

C.

The presence of co-located (10m away) access points on non-overlapping channels

D.

The layer 3 protocol used by each station to transmit data over the wireless link

Question 28

A string of characters and digits is entered into an AP and a client STA for WPA2 security. The string is 8 characters long. What is this string called?

Options:

A.

MSK

B.

WEP key

C.

Passphrase

D.

PSK

Question 29

When implementing PoE, what role is played by a switch?

Options:

A.

PSE

B.

Midspan injector

C.

PD

D.

Power splitter

Question 30

A client STA must choose the best AP for connectivity. As part of the evaluation, it must verify compatible data rates. What can the client STA use to verify that an

AP supports the same data rates that it supports?

Options:

A.

Beacon frames transmitted by the AP

B.

Data frames sent between the AP and current clients STAs

C.

Authentication frames transmitted by the other client STAs

D.

Probe request frames transmitted by other client STAs

Question 31

An 802.11 WLAN transmitter that emits a 50 mW signal is connected to a cable with 3 dB of loss. The cable is connected to an antenna with 16 dBi of gain. What is the power level at the Intentional Radiator?

Options:

A.

25 mW

B.

250 mW

C.

500 mW

D.

1000 mW

Question 32

As an RF wave propagates through space, the wave front experiences natural expansion that reduces its signal strength in an area. What describes the rate at which this expansion happens?

Options:

A.

Fresnel zone thinning

B.

Ohm's law

C.

Inverse square law

D.

MU-MIMO

Question 33

What statement is true concerning the use of Orthogonal Frequency Division Multiplexing (OFDM) modulation method in IEEE 802.11 WLANs?

Options:

A.

OFDM implements BPSK modulation to allow for data rates up to 7 Gbps.

B.

OFDM was first introduced in 802.11a and is used by the ERP, HT and VHT PHYs as well.

C.

OFDM modulation is used only in 5 GHz 802.11 transmissions.

D.

OFDM was used by Frequency Hopping Spread Spectrum (FHSS) PHY devices.

Question 34

You are evaluating a connection that states the data rate is 150 Mbps. What is the expected throughput of this connection?

Options:

A.

Less than 150 Mbps because of 802.11 overhead and contention

B.

54 Mbps because that is the actual maximum throughput of an 802.11 connection

C.

More than 150 Mbps because of compression

D.

150 Mbps because the data rate is equal to the throughput

Question 35

802. 11ax (HE) introduces Resource Units that can be used to allow communications with multiple devices at the same time, on the same channel, in the same BSS. What feature of 802.1 lax provides this functionality?

Options:

A.

6 GHz support

B.

TWT

C.

Wi-Fi-LTE

D.

OFDMA

Question 36

What is the most effective method for testing roaming in relation to 802.11 VoIP handsets?

Options:

A.

Use a spectrum analyzer to monitor RF activity during a VoIP call.

B.

Use a protocol analyzer to capture the traffic generated when a laptop roams.

C.

Place a call with the handset and move around the facility to test quality during roaming.

D.

Use the built-in roaming monitor built into all VoIP handsets.

Page: 1 / 9
Total 122 questions