Winter Special Flat 65% Limited Time Discount offer - Ends in 0d 00h 00m 00s - Coupon code: suredis

CWNP CWNA-109 Certified Wireless Network Administrator Exam Practice Test

Demo: 36 questions
Total 122 questions

Certified Wireless Network Administrator Questions and Answers

Question 1

You are attempting to explain RF shadow and how it can cause lack of coverage. What common building item frequently causes RF shadow and must be accounted for in coverage plans?

Options:

A.

Wooden doors

B.

Carpeted floors

C.

Elevators

D.

Cubicle partitions

Question 2

What common feature of MDM solutions can be used to protect enterprise data on mobile devices?

Options:

A.

Over-the-air registration

B.

Onboarding

C.

Containerization

D.

Self-registration

Question 3

You are evaluating a connection that states the data rate is 150 Mbps. What is the expected throughput of this connection?

Options:

A.

Less than 150 Mbps because of 802.11 overhead and contention

B.

54 Mbps because that is the actual maximum throughput of an 802.11 connection

C.

More than 150 Mbps because of compression

D.

150 Mbps because the data rate is equal to the throughput

Question 4

What is the most effective method for testing roaming in relation to 802.11 VoIP handsets?

Options:

A.

Use a spectrum analyzer to monitor RF activity during a VoIP call.

B.

Use a protocol analyzer to capture the traffic generated when a laptop roams.

C.

Place a call with the handset and move around the facility to test quality during roaming.

D.

Use the built-in roaming monitor built into all VoIP handsets.

Question 5

You are troubleshooting a problem with interference from a non-802.11 device. Given that the device is not a WLAN device, you cannot use a protocol analyzer and have chosen to use a spectrum analyzer. You want to view the signal from the interfering device over time to see the activity that is generating.

What common spectrum analyzer view should you use for this analysis?

Options:

A.

APs

B.

Waterfall/Spectrogram

C.

Real-time FFT

D.

Clients

Question 6

What can cause excessive VSWR in RF cables used to connect a radio to an antenna?

Options:

A.

High gain yagi antenna

B.

Radio output power above 100 mW but below 400 mw

C.

High gain parabolic dish antenna

D.

Impedance mismatch

Question 7

Which directional antenna types are commonly used by indoor Wi-Fi devices in a MIMO multiple spatial stream implementation?

Options:

A.

Dipole and yagi

B.

Grid and sector

C.

Patch and panel

D.

Dish and grid

Question 8

A non-802.11 device is suspected of causing interference on the WLAN. You are not certain of the location or type of device. What is the best solution for locating this non-802.11 device?

Options:

A.

Access point spectrum analyzer

B.

Laptop-based spectrum analyzer with an omni-directional antenna

C.

Laptop-based spectrum analyzer with an omni-directional antenna

D.

Laptop-based spectrum analyzer with a directional antenna

Question 9

You have implemented an 802.11ax WLAN for a customer. All APs are four stream HE APs. The customer states that it is essential that most of the clients can use the OFDMA modulation scheme. What do you tell the customer?

Options:

A.

The clients that must support OFDMA must also be upgraded to 802.11ax

B.

OFDMA is an optional feature of 802.11ax and most APs don't even support it

C.

All 5 GHz PHYs use OFDM modulation, so you will achieve OFDMA everywhere in 5 GHz

D.

If the devices support 802.11ac, they can be updated to support OFDMA through driver upgrades

Question 10

What security solution is deprecated in the 802.11 standard and should never be used in any modern WLAN deployment?

Options:

A.

Shared Key Authentication

B.

Open System Authentication

C.

CCMP

D.

AES

Question 11

What factors will have the most significant impact on the amount of wireless bandwidth available to each station within a BSS? (Choose 2)

Options:

A.

The number of clientstations associated to the BSS

B.

The power management settings in the access point’s beacons

C.

The presence of co-located (10m away) access points on non-overlapping channels

D.

The layer 3 protocol used by each station to transmit data over the wireless link

Question 12

In which plane of the three networking planes is an access point configured by a WLAN controller?

Options:

A.

Control

B.

Management

C.

Security

D.

Data

Question 13

What is an advantage of using WPA3-Personal instead of WPA2-Personal as a security solution for 802.11 networks?

Options:

A.

WPA3-Personal, also called WPA3-SAE, uses an authentication exchange and WPA2-Personal does not

B.

WPA3-Personal, also called WPA3-SAE, uses a stronger authentication exchange to better secure the network

C.

WPA3-Personal, also called WPA3-SAE, uses AES for encryption and WPA2-Personal does not

D.

WPA3-Personal, also called WPA3-SAE, uses a better encryption algorithm than WPA2-Personal

Question 14

What best describes WPA2 in relation to 802.11 wireless networks?

Options:

A.

WPA2 is the standard that defines security for WLANs.

B.

WPA2 is a certification created by the Wi-Fi Alliance that validates devices correctly implement CCMP/ AES.

C.

WPA2 is the second version of WPA and it enhances security through the use of TKIP instead of WEP.

D.

WPA2 is specified in the 802.11 standard as implementing CCMP/AES.

Question 15

Which one of the following channels can be used for VHT transmissions according to the 802.11 specification?

Options:

A.

6

B.

144

C.

1

D.

11

Question 16

You recently purchased four laptops containing dual-band 802.11ac adapters. The laptops can connect to your 2.4 GHz network, but they cannot connect to the 5 GHz network. The laptops do not show the 5 GHz SSIds, which are different than the 2.4 GHz SSIDs. Existing devices can connect to the 5 GHz SSIDs with no difficulty. What is the likely problem?

Options:

A.

Interference from non-Wi-Fi sources

B.

Faulty drivers

C.

DoS attack

D.

Interference from other WLANs

Question 17

You are troubleshooting a controller-based AP that is unable to locate the controller. DHCP is not use and the controller is located at 10.10.10.81/24 while the AP is on the 10.10.16.0/24 network. What should be inspected to verify proper configuration?

Options:

A.

NTP

B.

BOOTH

C.

DNS

D.

AP hosts file

Question 18

What statement is true concerning the use of Orthogonal Frequency Division Multiplexing (OFDM) modulation method in IEEE 802.11 WLANs?

Options:

A.

OFDM implements BPSK modulation to allow for data rates up to 7 Gbps.

B.

OFDM was first introduced in 802.11a and is used by the ERP, HT and VHT PHYs as well.

C.

OFDM modulation is used only in 5 GHz 802.11 transmissions.

D.

OFDM was used by Frequency Hopping Spread Spectrum (FHSS) PHY devices.

Question 19

What statement describes the authorization component of a AAA implementation?

Options:

A.

Verifying that a user is who he says he is.

B.

Implementing a WIPS as a full-time monitoring solution to enforce policies.

C.

Granting access to specific network services or resources according to a user profile.

D.

Validating client device credentials against a database.

Question 20

You manage a WLAN with 100 802.11ac access points. All access points are configured to use 80 MHz channels. In a particular BSS, only 40 MHz communications are seen. What is the likely cause of this behavior?

Options:

A.

All clients implement single spatial stream radios

B.

The clients are all 802.11n STAs or lower

C.

The AP is improperly configured to use only 40 MHz of the 80 MHz allocated bandwidth

D.

The short guard interval is also enabled

Question 21

You are implementing a multi-AP WLAN and fast secure roaming is essential. Which one of the following methods is an IEEE 802.11 standard method for fast roaming?

Options:

A.

FT

B.

OKC

C.

Load balancing

D.

Band steering

Question 22

Which one of the following is not a factor considered when calculating the Link Budget for an outdoor point-to- point WLAN bridge link?

Options:

A.

Operating frequency

B.

MU-MIMO capabilities of the bridges

C.

Receive antenna gain

D.

Transmit power

Question 23

A natural disaster has occurred in a remote area that is approximately 57 miles from the response team headquarters. The response team must implement a local wireless network using 802.11 WLAN access points. What is the best method, of those listed, for implementation of a network back-haul for communications across the Internet in this

scenario?

Options:

A.

802.11 bridging to the response team headquarters

B.

Cellular/LTE/5G

C.

Turn up the output power of the WLAN at the response team headquarters

D.

Temporary wired DSL

Question 24

In an 802.11 2.4 GHz system, what 22 MHz channels are considered non-overlapping?

Options:

A.

7 and 11

B.

2 and 8

C.

1 and 5

D.

4 and 6

Question 25

What 802.11 network configuration would result in multiple stations broadcasting Beacon frames with the same BSSID but with different source addresses?

Options:

A.

Multiple APs have been loaded with the same configuration from an image file.

B.

A single AP supports multiple BSSs with different SSIDs.

C.

An IBSS is used instead of a BSS.

D.

An SCA network is in use.

Question 26

What wireless networking term describes the increase of RF energy in an intentional direction with the use of an antenna?

Options:

A.

Directed Radiation

B.

Beam Digression

C.

Passive Gain

D.

Active Amplification

Question 27

XYZ Company has decided to install an 802.11 WLAN system that will support 1083 wireless users, but they are concerned about network security. XYZ is interested in deploying standardized security features. In addition to WPA2-Enterprise with PEAP and role-based access control, XYZ would like to support management frame protection as well as a fast secure roaming protocol for future mobile handsets.

As XYZ Company selects a product to deploy, what two IEEE amendments, which are included in 802.11-2016, and 802.11-2020 should be supported to provide the management frame protection and fast secure roaming security features?

Options:

A.

802.11j and 802.11z

B.

802.11r and 802.11w

C.

802.11j and 802.11k

D.

802.11k and 802.11v

Question 28

When a STA has authenticated to an AP (AP-1), but still maintains a connection with another AP (AP-2), what is the state of the STA on AP-1?

Options:

A.

Transitional

B.

Unauthenticated and Unassociated

C.

Authenticated and Unassociated

D.

Authenticated and Associated

Question 29

Which one of the following 802.11 PHYs is more likely to be used in an industrial deployment but not likely to be used in standard office deployments?

Options:

A.

S1G

B.

VHT

C.

OFDM

D.

HT

Question 30

What feature of 802.1 lax (HE) may impact design decisions related to AP placement and the spacing between same-channel BSS cells (3SAs) because it is designed to reduce overlapping BSS contention?

Options:

A.

TWT

B.

BSS Color

C.

uplink MU-MIMO

D.

6 GHz band support

Question 31

What statement about the beamwidth of an RF antenna is true?

Options:

A.

Horizontal and vertical beamwidth are calculated at the points where the main lobe decreases power by 3 dB.

B.

The beamwidth patterns on an antenna polar chart indicate the point at which the RF signal stops propagating.

C.

When antenna gain is lower, the beamwidth is also lower in both the horizontal and vertical dimensions.

D.

Vertical beamwidth is displayed (in degrees) on the antenna’s Azimuth chart.

Question 32

In an 802.11n (H T) 2.4 GHz BSS, what prevents each station from using all the airtime when other client stations are actively communicating in the same BSS?

Options:

A.

802.11 DOS prevention

B.

OFDMA

C.

CSMA/CD

D.

CSMA/CA

Question 33

What statement about 802.11 WLAN bridges is true?

Options:

A.

WLAN bridges only work in the 2.4 GHz frequency band and they support only SISO communications

B.

WLAN bridges must use a channel with acceptable SNR at both transceivers to maintain the desired data rate bi-directionally

C.

WLAN bridges may support MIMO communications, but only if used in the 5 GHz frequency band

D.

WLAN bridges must be implemented such that no interference occurs on the channel anywhere between the two endpoints used to establish the bridge

Question 34

What is required when operating 802.11ax APS in the 6 GHz band using passphrase-based authentication?

  • VHT PHY

Options:

A.

HT PHY

B.

SAE

C.

CCMP

Question 35

You are using a tool that allows you to see signal strength for all Aps in the area with a visual representation. It shows you SSIDs available and the security settings for each SSID. It allows you to filter by frequency band to see only 2.4 GHz networks or only 5 GHz networks. No additional features are available.

What kind of application is described?

Options:

A.

Protocol analyzer

B.

Site survey utility

C.

Spectrum analyzer

D.

WLAN scanner tool

Question 36

A WLAN transmitter that emits a 50 mW signal is connected to a cable with 3 dB loss. If the cable is connected to an antenna with 9dBi gain, what is the EIRP at the antenna element?

Options:

A.

26 dBm

B.

13 dBm

C.

23 dBm

D.

10 dBm

Demo: 36 questions
Total 122 questions