Text Material Preview
CWNA-109 Exam Name: Certified Wireless Network Administrator Full version: 766 Q&As Full version of CWNA-109 Dumps Share some CWNA-109 exam dumps below. 1. Select two types of rogue devices that cannot be detected by a layer 2 wireless intrusion prevention system (WIPS): A. 900 MHz radio B. 802.11h-compliant device C. FHSS radio 1 / 39 https://www.certqueen.com/CWNA-109.html D. 802.11b routers E. 802.11g mixed-mode device Answer: AC 2. Which 802.11 service set is defined specifically for directional multi-gigabit (DMG) radios? A. BSS B. ESS C. IBSS D. PBSS E. MBSS Answer: D 3. As defined by the IEEE-2012 standard, how much separation is needed between center frequencies of channels in the U-NII-2 Extended band? A. 10 MHz B. 20 MHz C. 22 MHz D. 25 MHz E. 30 MHz Answer: B 4. What terms accurately complete the following sentence? The IEEE 802.11-2012 standard specifies mandatory support of the ___________ cipher suite for Robust Security Network Associations, and optional use of the ___________ cipher suite, which is designed for use with pre-RSNA hardware. A. CCMP, TKIP B. 802.1X/EAP, WEP C. TLS, SSL D. CCKM, WEP E. RC5, RC4 Answer: A 5. Which 802.11 amendments provide for throughput of 1 Gbps or higher? (Choose all that apply.) A. 802.11aa B. 802.11ab 2 / 39 C. 802.11ac D. 802.11ad E. 802.11ae F. 802.11af Answer: CD 6. Which of these methods of MIMO receive diversity is useful when receiving incoming transmissions from a SISO radio? A. Space-time block coding (STBC) B. Maximal ratio combining (MRC) C. Transmit beamforming (TxBF) D. Spatial multiplexing (SM) Answer: B 7. ABC Company is planning to install a new 802.11ac WLAN, but wants to upgrade its wired infrastructure first to provide the best user experience possible. ABC Company has hired you to perform the RF site survey. During the interview with the network manager, you are told that the new Ethernet edge switches will support VoIP phones and 802.11 access points, both using 802.3 PoE. After hearing this information, what immediate concerns do you note? A. VoIP phones and 802.11 access points should not be powered by the same edge switch due to distortion. B. The edge Ethernet switches should support Ether-channel to get the best results out of the network. C. If the switches are in optimal locations for VoIP phones, they are likely to be suboptimal locations for 802.11 APs. D. The power budget in the edge switches must be carefully planned and monitored based on the number of supported PoE devices. Answer: D 8. What feature(s) are most likely to be supported by 802.11 enterprise-class WLAN controllers? (Choose 4) A. Link aggregation / port trunking B. 802.1p and DSCP QoS C. BGP and Frame Relay D. Captive web portals 3 / 39 E. IGMP snooping Answer: ABDE 9. Many 802.11ac enterprise access points require 802.3at power to be fully functional. What 802.11ac capabilities might be downgraded when using the lower power provided by 802.3af power sourcing equipment? (Choose all that apply.) A. MIMO radio chains B. 80 MHz channel capability C. 256-QAM modulation D. 40 MHz channel capability Answer: ABC 10. You are evaluating a connection that states the data rate is 150 Mbps. What is the expected throughput of this connection? A. Less than 150 Mbps because of 802.11 overhead and contention B. 54 Mbps because that is the actual maximum throughput of an 802.11 connection C. More than 150 Mbps because of compression D. 150 Mbps because the data rate is equal to the throughput Answer: A Explanation: The data rate of a signal is the speed that the data bits in individual 802.11 data frames are sent, but it does not account for the actual amount of data that can be transmitted over time. The throughput of a connection is the flow of information over time, which is affected by various factors such as data encoding, modulation, encryption, airtime utilization, noise levels, interference, etc. Therefore, the throughput is always lower than the data rate. According to one of the web search results1, the actual throughput is normally 60-70 percent of the supported data rates. So, for a connection with a data rate of 150 Mbps, the expected throughput would be around 90-105 Mbps. 11. What factor is likely to cause the least impact on the application layer throughput of an 802.11n client station in a 2.4 GHz HT BSS? A. Increasing or decreasing the number of spatial streams in use by the client station and AP B. Implementing Fast BSS Transition (FT) for roaming C. Implementation of several other clients in the same BSS using 802.11g radios D. RF interference from more than 10 nearby Bluetooth transmitters Answer: B 4 / 39 Explanation: Implementing Fast BSS Transition (FT) for roaming is likely to cause the least impact on the application layer throughput of an 802.11n client station in a 2.4 GHz HT BSS. FT is a feature that allows a client station to quickly switch from one AP to another within the same ESS (Extended Service Set) without having to re-authenticate and re-associate with each AP. This reduces the latency and packet loss that may occur during roaming, thus improving the user experience and maintaining the application layer throughput. FT is defined in the IEEE 802.11r amendment and is also known as Fast Roaming or Fast Secure Roaming. Reference: Chapter 9, page 367; , Section 6.3 12. What are the three logical planes of operation for network telecommunications? A. Management B. Core C. Control D. Access E. Data Answer: ACE 13. The 802.11e amendment (now part of the 802.11-2012 standard) defines which of the following medium access methods to support QoS requirements? (Choose all that apply.) A. Distributed Coordination Function (DCF) B. Enhanced Distributed Channel Access (EDCA) C. Hybrid Coordination Function (HCF) D. Point Coordination Function (PCF) E. Hybrid Coordination Function Controlled Access (HCCA) Answer: BCE 14. Which IEEE 802.11 amendment specifies the use of up to eight spatial streams of modulated data bits? A. IEEE 802.11n B. IEEE 802.11g C. IEEE 802.11ac D. IEEE 802.11s E. IEEE 802.11w Answer: C 5 / 39 15. Which of the following tools can be used in an indoor site survey? (Choose all that apply.) A. Measuring wheel B. GPS C. Ladder D. Battery pack E. Microwave oven Answer: ACD 16. Which of the following statements is not true regarding the number of subcarriers in the following channels? (Choose all that apply.) A. 40 MHz subcarriers = 2 times 20 MHz subcarriers B. 40 MHz subcarriers > 2 times 20 MHz subcarriers C. 80 MHz subcarriers = 2 times 40 MHz subcarriers D. 80 MHz subcarriers > 2 times 40 MHz subcarriers E. 160 MHz subcarriers = 2 times 80 MHz subcarriers F. 160 MHz subcarriers > 2 times 80 MHz subcarriers Answer: BDE 17. A dual-band 802.11ac AP must be powered by PoE. As a class 4 device, what power level should be received at the AP? A.30W B. 12.95 W C. 25.5 W D. 15.4 W Answer: C Explanation: PoE has different standards that define different power levels for PSEs and PDs. The original standard, IEEE 802.3af, defines two classes of PSEs: Class 3 (15.4 W) and Class 4 (30 W). The newer standard, IEEE 802.3at, also known as PoE+, defines four classes of PSEs: Class 0 (15.4 W), Class 1 (4 W), Class 2 (7 W), and Class 3 (12.95 W). The power level received at the PD is always lower than the power level provided by the PSE, due to cable resistance and power dissipation. The IEEE standards specify the minimum power level that must be received at the PD for each class of PSE. For a Class 4 PSE, the minimum power level received at the PD is 25.5 W910. Reference: CWNA-109 Study Guide, Chapter 7: Power over Ethernet (PoE), page 295; CWNA-109 Study Guide, Chapter 7: Power over Ethernet (PoE), page 289.6 / 39 18. Which of these attacks are considered layer 2 denial-of-service attacks? (Choose all that apply.) A. Deauthentication spoofing B. Jamming C. Virtual carrier attacks D. PS-Poll floods E. Authentication floods Answer: ACDE 19. When compared with legacy Power Save mode, how does VHT TXOP power save improve battery life for devices on a WLAN? A. Legacy Power Save mode was removed in the 802.11ac amendment. B. VHT TXOP power save allows the WLAN transceiver to disable more components when in a low power state. C. VHT TXOP power save uses the partial AID in the preamble to allow clients to identify frames targeted for them. D. VHT TXOP power save allows stations to enter sleep mode and legacy Power Save does not. Answer: B Explanation: VHT TXOP (Very High Throughput Transmit Opportunity) power save is a feature introduced with the 802.11ac amendment, which is designed to improve the power efficiency of devices connected to a WLAN. This feature enhances battery life in several ways, compared to the legacy Power Save mode: Enhanced Power Saving: VHT TXOP power save allows devices to disable more components of the WLAN transceiver when they are in a low power state. This reduces the power consumption during periods when the device is not actively transmitting or receiving data. Intelligent Wake-Up Mechanisms: It employs more sophisticated mechanisms for devices to determine when they need to wake up and listen to the channel, further reducing unnecessary power usage. Optimized Operation: This power save mode is optimized for the high-throughput environment of 802.11ac networks, allowing devices to efficiently manage power while maintaining high performance. Legacy Power Save mode, introduced in earlier versions of the 802.11 standards, does not provide the same level of component disablement or the intelligent wake-up mechanisms found 7 / 39 in VHT TXOP power save, making option B the correct answer. Reference: IEEE 802.11ac-2013 Amendment: Enhancements for Very High Throughput for Operation in Bands below 6 GHz. CWNA Certified Wireless Network Administrator Official Study Guide: Exam CWNA-109, by David D. Coleman and David A. Westcott. 20. Which type of identifier is used by BLE radios for iBeacon proximity purposes? A. BSSID B. UUID C. SSID D. PMKID Answer: B 21. What factors are taken into account when calculating the Link Budget of a point-to-point outdoor WLAN bridge link? A. Operating frequency B. Transmit antenna gain C. Transmit power D. Antenna height Answer: ABC 22. In which plane of the three networking planes is an access point configured by a WLAN controller? A. Control B. Management C. Security D. Data Answer: B 23. What are some questions that should be considered during WLAN client capacity planning? A. How many users and devices need access currently? B. How many users and devices will need access in the future? C. Where are the users and devices located? D. What are the MIMO capabilities of the client devices? E. What type of applications will be used for the WLAN? 8 / 39 F. All of the above Answer: F 24. The FCC is preparing for the advent of 802.11ac technology that can use 80 MHz and 160 MHz channels, and therefore, more unlicensed spectrum is needed. What are the newly proposed 5 GHz frequency bands? (Choose all that apply.) A. U-NII-1 B. U-NII-2A C. U-NII-2B D. U-NII-2C E. U-NII-3 F. U-NII-4 Answer: CF 25. Lynne runs a small hotel, and as a value added service for her customers she has implemented a Wi-Fi hot-spot. Lynne has read news articles about how hackers wait at hotspots trying to take advantage of unsuspecting users. She wants to avoid this problem at her hotel. What is an efficient and practical step that Lynne can take to decrease the likelihood of active attacks on her customers' wireless computers? A. Implement Network Access Control (NAC) and require antivirus and firewall software along with OS patches. B. Require EAP-FAST authentication and provide customers with a username/password on their receipt. C. Implement an SSL VPN in the WLAN controller that initiates after HTTPS login. D. Enable station-to-station traffic blocking by the access points in the hotel. Answer: D 26. Which two 802.11 topologies require the use of an access point? A. WPAN B. IBSS C. Basic service set D. Ad hoc E. ESS Answer: CE 27. The 802.11b amendment defined which PHY? 9 / 39 A. HR-DSSS B. FHSS C. OFDM D. PBCC E. EIRP Answer: A 28. 11 wireless bridge links are typically associated with which network architecture layer? A. Core B. Distribution C. Access D. Network Answer: B 29. After the station has performed the carrier sense and determined that no other devices are transmitting for a period of a DIFS interval, what is the next step for the station? A. Wait the necessary number of slot times before transmitting if a random backoff value has already been selected. B. Begin transmitting. C. Select a random backoff value. D. Begin the random backoff timer. Answer: C 30. What is the traditional data-forwarding model for 802.11 user traffic when WLAN controllers are deployed? A. Distributed data forwarding B. Autonomous forwarding C. Proxy data forwarding D. Centralized data forwarding E. All of the above Answer: D 31. Which 802.11ax guard interval (GI) is intended solely for outdoor communications? A. 0.4 microseconds B. 0.8 microseconds C. 1.6 microseconds 10 / 39 D. 3.2 microseconds E. 6.4 microseconds Answer: D 32. The presence of what type of transmissions can trigger the protection mechanism within an ERP basic service set? (Choose all that apply.) A. Association of an HR-DSSS client B. Association of an ERP-OFDM client C. HR-DSSS beacon frame D. ERP beacon frame with the NonERP_Present bit set to 1 E. Association of an FHSS client Answer: ACD 33. Which of the following is true for MIMO transmissions? A. The transceiver can only receive from one antenna at a time. B. Transceivers can transmit from multiple antennas at the same time. C. The transceiver samples multiple antennas and chooses the best received signal from one antenna. D. Transceivers can transmit from only one antenna at a time. Answer: B 34. To double the distance of a signal, the EIRP must be increased by how many dBs? A. 3 dB B. 6 dB C. 10 dB D. 20 dB Answer: B 35. What are some examples of how an 802.11 action frame can be used? (Choose all that apply.) A. An action frame can function as a probe request. B. An action frame can function as a neighbor report request. C. An action frame can function as a probe response. D. An action frame can function as a channel switch announcement. E. An action frame can function as a beacon. Answer: BD 11 / 39 36. What problems may exist for a multiple channel architecture (MCA) WLAN when its APs are all operating at full power (typically 100mW)? (Choose 2) A. Wi-Fi enabled voice handsets with low transmit power can experience asynchronous downlink and uplink performance. B. WLAN client stations can experience the hidden node problem when located near each other within the same cell. C. The mismatched power between WLAN client stations and APs violates regulatory and IEEE signal quality requirements. D. Cell size may be too large, causing co-channel interference to adjacent cells and reducing system capacity. E. APs operating in the 2.4 GHz band would prevent microwave ovens and analog video cameras from functioning. Answer: AD 37. Prior to association, what parameter can 802.11 client devices measure and use to select the optimal access point for association? A. Signal strength of access point beacons received B. Proximity to potential access points C. Retry rate of probe request and response frames D. Average round trip time to reach the InternetDNS server E. Average round trip time to reach the IP router Answer: A 38. Which management protocols are often used between a network management system (NMS) server and remote access points for the purpose of monitoring a WLAN? (Choose all that apply.) A. IPsec B. GRE C. CAPWAP D. DTLS E. SNMP Answer: CE 39. As a station moves away from the access point to which it is associated, it changes its data rate from 600 Mbps to 540 Mbps and then to 450 Mbps. 12 / 39 What IEEE 802.11 term is used to describe this functionality? A. Dynamic Rate Switching B. Multirate Control C. Modulation and Coding Selection D. Rate Set Selectivity E. Adaptive Rate Management Answer: A 40. What component of the 802.11 standard allows stations to reserve access to the RF medium for a specified period of time? A. Short guard intervals B. DTIM Interval C. Listen Interval D. Probe Request frames E. RTS or CTS frames Answer: E 41. What term is used to describe the time differential between a primary signal and a reflected signal arriving at a receiver? A. Path delay B. Spread spectrum C. Multipath D. Delay spread Answer: D 42. Which methods of EAP can be used for authentication for a Passpoint client to connect to a secure Passpoint SSID? (Choose all that apply.) A. EAP-PEAP B. EAP-TLS C. Anonymous EAP-TLS D. EAP-AKA E. EAP-LEAP Answer: BD 43. Which of these attacks can be mitigated with a mutual authentication solution? (Choose all that apply.) 13 / 39 A. Malicious eavesdropping B. Deauthentication C. Man-in-the-middle D. Wireless hijacking E. Authentication flood Answer: CD 44. What is the default minimum size of a resource unit if 1024-QAM modulation is used by an 802.11ax radio? A. 26-tone B. 52-tone C. 106-tone D. 242-tone E. 484-tone Answer: D 45. Professor Perry Correll has an Ethernet switch that is compliant with 802.3at. He is having problems with his APs randomly rebooting. Which of the following could be causing his problems? A. Multiple desktop PoE VoIP telephones are connected to the same Ethernet switch. B. Most of the Ethernet cables running from the switch to the APs are 90 meters long. C. The Ethernet cables are only Cat 5e. D. The switch is capable of 1000BaseT, which is not compatible with the AP. Answer: A 46. What primary metric of scanning can stations use to select the best AP for connectivity to the desired BSS? A. Signal strength of AP beacons received. B. PING latency when testing against an Internet server. C. FCS errors in frames transmitted to and from the AP. D. Throughput speed in Mbps. Answer: A 47. When a 160 MHz wide channel is used, how many primary channels are defined? A. 1 B. 2 14 / 39 C. 3 D. 4 E. None Answer: B 48. A Wi-Fi Alliance interoperability certificate indicates that a device is a/b/g/n certified. It further indicates one transmit and receive spatial stream for both the 2.4 GHz and 5.0 GHz bands. It further indicates support for both WPA and WPA2 Enterprise and Personal. Finally, it indicates support for EAP-TLS, EAP-TTLS/MSCHAPv2, PEAPv0/EAP-MSCHAPv2 and PEAPv1/EAP-GTC. Which one of the following statements is false? A. This client device supports protection mechanisms such as RTS/CTS and/or CTS-to-Self. B. This client device supports both TKIP and CCMP cipher suites. C. 300 Mbps is the maximum supported data rate for this device. D. This client device supports the ERP, OFDM, and HT physical layer specifications. E. This client device supports X.509 certificates for EAP authentication. Answer: C 49. You are troubleshooting a controller-based AP that is unable to locate the controller. DHCP is not use and the controller is located at 10.10.10.81/24 while the AP is on the 10.10.16.0/24 network. What should be inspected to verify proper configuration? A. NTP B. BOOTH C. DNS D. AP hosts file Answer: C Explanation: What should be inspected to verify proper configuration is DNS. DNS stands for Domain Name System and is a service that resolves hostnames to IP addresses. In a controller-based AP deployment, DNS can be used to help the AP locate the controller by using a predefined hostname such as CISCO-CAPWAP-CONTROLLER or aruba-master. The AP sends a DNS query for this hostname and receives an IP address of the controller as a response. Therefore, if DNS is not configured properly or if there is no DNS entry for the controller hostname, the AP may not be able to locate the controller. NTP, BOOTP, and AP hosts file are not relevant for this scenario. 15 / 39 Reference: [CWNP Certified Wireless Network Administrator Official Study Guide: Exam CWNA-109], page 374; [CWNA: Certified Wireless Network Administrator Official Study Guide: Exam CWNA-109], page 364. 50. __________ is the measurement of how broad or narrow the focus of an antenna is. A. Radiation envelopes B. Static beamforming C. Transmit beamforming D. Beamwidth Answer: D 51. 128-bit WEP encryption uses a user-provided static key of what size? A. 104 bytes B. 64 bits C. 124 bits D. 128 bits E. 104 bits Answer: E 52. Which of the following can cause roaming problems? (Choose all that apply.) A. Too little cell coverage overlap B. Too much cell coverage overlap C. Free space path loss D. CSMA/CA E. Hidden node Answer: AB 53. What does FCC stand for? A. Federal Castration Commission B. Foreign Colonization Congress C. Freight Coordination Capital D. Federal Communications Commission Answer: D 54. Select two solutions that can help mitigate peer-to-peer attacks from other clients associated to the same 802.11 access point. 16 / 39 A. Personal firewall B. Client isolation C. OSPF D. MAC filter Answer: AB 55. A WIPS uses which four labels to classify an 802.11 device? (Choose the best four answers.) A. Authorized B. Neighbor C. Enabled D. Disabled E. Rogue F. Unauthorized/unknown Answer: ABEF 56. Which organization is responsible for enforcing maximum transmit power rules in an unlicensed frequency band? A. IEEE B. Wi-Fi Alliance C. ISO D. IETF E. None of the above Answer: E 57. A client complains of low data rates on his computer. When you evaluate the situation, you see that the signal strength is -84 dBm and the noise floor is -96 dBm. The client is an 802.11ac client and connects to an 802.11ac AP. Both the client and AP are 2x2:2 devices. What is the likely cause of the low data rate issue? A. Weak signal strength B. CAT5e cabling run to the AP C. Too few spatial streams D. Lack of support for 802.11n Answer: A 58. What statement about 802.3, Clause 33 Power over Ethernet is true? 17 / 39 A. When using CAT5 cabling, you increase the maximum draw available to the PD over that available with CAT6. B. Only endpoint PSEs are supported. C. Only midspan PSEs are supported. D. The lowest voltage drop is achieved when using CAT6 cable instead of Cat5 or CAT5e. Answer: D Explanation: https://www.cablinginstall.com/articles/2012/08/cat-6a-vs-cat-5e-poe.html The statement that the lowest voltage drop is achieved when using CAT6 cable instead of Cat5 or CAT5e is true about 802.3, Clause 33 Power over Ethernet. Power over Ethernet (PoE) is a technology that allows electrical power to be delivered over Ethernet cables along with data signals. PoE is defined by IEEE 802.3, Clause 33 and has several variants, such as PoE (802.3af), PoE+ (802.3at), and PoE++ (802.3bt). PoE works by using a device called PSE (Power Sourcing Equipment) that injects power into the Ethernet cable and a device called PD (Powered Device) that receives power from the Ethernet cable. The PSE can be either an endpoint device, such as a switch or a router, or a midspan device, such as an injector or a splitter, that is inserted between two Ethernet devices. The PD can be any device that requirespower, such as an access point, a camera, or a phone. One of the factors that affects PoE performance is voltage drop, which is the reduction of voltage that occurs as current flows through a cable due to its resistance. Voltage drop can cause power loss and inefficiency in PoE systems, as well as damage to PDs if the voltage falls below their minimum requirement. To minimize voltage drop, it is recommended to use high- quality cables with low resistance and short length. Among the common types of Ethernet cables, CAT6 has the lowest resistance and therefore the lowest voltage drop compared to Cat5 or CAT5e. CAT6 also has higher bandwidth and data rate than Cat5 or CAT5e, making it more suitable for PoE applications. Reference: 1, Chapter 7, page 263; 2, Section 4.4 59. Which of the following encryption methods use symmetric ciphers? (Choose all that apply.) A. WEP B. TKIP C. Public-key cryptography D. CCMP Answer: ABD 60. For what likely reasons might an organization choose to purchase an AP designed for 18 / 39 outdoor deployment to use as an indoor WLAN AP at an industrial facility? (Choose 2) A. Aesthetic requirements B. Physical security and theft prevention C. Protection from environmental conditions D. Reduce transient RF interference E. 802.11 security compliance Answer: BC 61. What are some recommendations when using 40 MHz channels in the 5 GHz band? (Choose all that apply.) A. Enable the DFS channels. B. Lower AP transmit power. C. Verify wall attenuation. D. All of the above Answer: D 62. While aligning a directional antenna, you notice that the signal drops as you turn the antenna away from the other antenna, but then it increases a little. This increase in signal is cause by what? A. Signal reflection B. Frequency harmonic C. Side band D. Side lobe Answer: D 63. Which 802.11 radio technologies are most impacted by the destructive effects of multipath? (Choose all that apply.) A. 802.11a B. 802.11b C. 802.11g D. 802.11n E. 802.11i Answer: ABC 64. ACKs are required for which of the following frames? A. Unicast 19 / 39 B. Broadcast C. Multicast D. Anycast Answer: A 65. Which of the following terms refer to a PTMP network design? (Choose all that apply.) A. PTP B. Mesh C. Hub and spoke D. Star Answer: CD 66. What answers correctly complete the following sentence? ____________ and ____________ carrier sense functions are used to determine if the wireless medium is busy. (Choose 2) A. Backoff B. Pseudo-random C. Virtual D. Active E. Physical F. Interframe G. Vector Answer: CE 67. The IEEE process to create a PoE standard began in? A. 1999 B. 2002 C. 1998 D. 2000 Answer: A 68. If WMM-PS is not supported, after a station sees its AID set to 1 in the TIM, what typically is the next frame that the station transmits? A. CTS B. PS-Poll C. ATIM 20 / 39 D. ACK Answer: B 69. A WLAN transmitter that emits a 200 mW signal is connected to a cable with 3 dB loss. If the cable is connected to an antenna with 10 dBi gain, what is the EIRP at the antenna element? A. 10 dBm B. 13 dBm C. 20 dBm D. 26 dBm E. 30 dBm Answer: E 70. The EDCA medium access method provides for the prioritization of traffic via priority queues that are matched to eight 802.1D priority tags. What are the EDCA priority queues called? A. TXOP B. Access categories C. Priority levels D. Priority bits E. PT Answer: B 71. The basic architecture of any MDM solution consists of: A. Mobile Device B. AP and WLAN Controller C. MDM Server D. All of the above Answer: D 72. Which wave properties can be modulated to encode data? (Choose all that apply.) A. Amplitude B. Frequency C. Phase D. Wavelength Answer: ABC 21 / 39 73. A natural disaster has occurred in a remote area that is approximately 57 miles from the response team headquarters. The response team must implement a local wireless network using 802.11 WLAN access points. What is the best method, of those listed, for implementation of a network back-haul for communications across the Internet in this scenario? A. 802.11 bridging to the response team headquarters B. Cellular/LTE/5G C. Turn up the output power of the WLAN at the response team headquarters D. Temporary wired DSL Answer: B Explanation: Cellular/LTE/5G is the best method for implementing a network backhaul for communications across the Internet in a remote area that is affected by a natural disaster. This is because cellular/LTE/5G networks are wireless and do not depend on physical infrastructure that may be damaged or unavailable in such scenarios. Cellular/LTE/5G networks also offer high-speed data transmission and wide coverage area, which are essential for emergency response operations. 802.11 bridging to the response team headquarters is not feasible because it requires line-of- sight and has limited range. Turning up the output power of the WLAN at the response team headquarters is not effective because it may cause interference and does not guarantee reliable connectivity. Temporary wired DSL is not practical because it requires installing cables and equipment that may not be available or accessible in a remote area. Reference: CWNA-109 Study Guide, Chapter 7: Wireless LAN Topologies, page 2031 74. You have been tasked with creating a wireless link between two buildings on a single campus. The link must support at least 150 Mbps data rates. What kind of WLAN technology role should you deploy? A. WPAN B. IBSS C. Wireless bridging D. Access BSS Answer: C Explanation: https://www.wlanmall.com/what-is-a-wireless-bridge/ Wireless bridging is a WLAN technology role that allows two or more networks to be connected wirelessly over a distance. A wireless bridge consists of two or more APs that are configured to 22 / 39 operate in bridge mode and use directional antennas to establish a point-to-point or point-to- multipoint link. Wireless bridging can support high data rates and is suitable for scenarios where running cables is impractical or expensive. To create a wireless link between two buildings on a single campus that supports at least 150 Mbps data rates, wireless bridging is an appropriate solution678. Reference: CWNA-109 Study Guide, Chapter 6: Wireless LAN Devices and Topologies, page 271; CWNA-109 Study Guide, Chapter 6: Wireless LAN Devices and Topologies, page 265; Wi- Fi Wireless Bridging Explained. 75. Which of the following statements about scanning are true? (Choose all that apply.) A. There are two types of scanning: passive and active. B. Stations must transmit beacons in order to learn about local APs. C. The 802.11 standard allows APs to ignore probe requests for security reasons. D. It is common for stations to continue to send probe requests after being associated to an AP. Answer: AD 76. Which carrier sense method is used to detect and decode 802.11 transmissions? A. Network allocation vector B. Signal detect C. Energy detect D. Virtual carrier sense Answer: B 77. What is required when operating 802.11ax APS in the 6 GHz band using passphrase-based authentication? A. VHT PHY B. HT PHY C. SAE D. CCMP Answer: C 78. MIMO radios use which mechanisms for transmit diversity? (Choose all that apply.) A. Maximum ratio combining (MRC) B. Spatial multiplexing (SM) C. Space-time block coding (STBC) D. Cyclic shift diversity (CSD) 23 / 39 E. Multiple traffic ID block acknowledgment (MTBA) Answer: CD 79. dBi is an expression of what type of measurement? A. Access point gain B. Received power C. Transmitted power D. Antenna gain Answer: D 80. Which of these WLAN architectures may require the use of an NMS server to manage and monitor the WLAN? A. Autonomous WLAN architecture B. Centralized WLAN architecture C. Distributed WLAN architecture D. Allof the above Answer: D 81. Which ESS design scenario is required by the IEEE 802.11-2020 standard? A. Two or more access points with overlapping coverage cells B. Two or more access points with overlapping disjointed coverage cells C. One access point with a single BSA D. Two basic service sets interconnected by a distribution system medium (DSM) E. None of the above Answer: E 82. ABC Company has thousands of Wi-Fi users accessing their network on a daily basis. Their WLAN consists of 700 access points, 6 WLAN controllers, and a wireless network management system. What network functions are performed by the enterprise-class WNMS? (Choose 3) A. RF pre-deployment planning and post-deployment reporting of access point locations on a floor plan B. Performance and security monitoring of WLAN controllers with alarms and notifications for administrative staff C. Radio management, fast roaming, key caching, and other centralized control plane operations 24 / 39 D. Centralized bridging of guest data traffic and application of firewall and QoS policies to data E. Management of WLAN controller configuration and provisioning of firmware updates F. Generating, encrypting, and decrypting 802.11 frames and collecting RF radio data. Answer: ABE 83. CCMP encryption uses which AES key size? A. 192 bits B. 64 bits C. 256 bits D. 128 bits Answer: D 84. What planes of operation reside in the access points of a distributed WLAN architecture? (Choose all that apply.) A. Radio plane B. Data plane C. Network plane D. Control plane E. Management plane Answer: BD 85. _______ and _______ are two forms of contention that are heavily used in today’s networks. (Choose two) A. Carrier Sense Multiple Access with Collision Detection (CSMA \ CD) B. Carrier Sense Minimal Access with Collision Acceptance (CSMA \ CA) C. Carrier Sense Minimal Access with Collision Division (CSMA \ CD) D. Carrier Sense Multiple Access with Collision Avoidance (CSMA \ CA) Answer: AD 86. Which option best describes a device used to provide wireless connectivity for a small number of wired clients? A. VPN router B. Wireless workgroup bridge C. Wireless mesh router D. Wireless Ethernet repeater E. Wireless bridge 25 / 39 Answer: B 87. What phrase defines Equivalent Isotropically Radiated Power (EIRP)? A. The power output from the radio into the RF cable B. The power output from the radio after cable losses C. The highest RF signal strength that is transmitted from a given antenna D. Reflected power due to an impedance mismatch in the signal path E. Power supplied from the transmission line to the antenna input Answer: C 88. You are tasked with performing a throughput test on the WLAN. The manager asks that you use open source tools to reduce costs. What open source tool is designed to perform a throughput test? A. iPerf B. PuTTy C. IxChariot D. Python Answer: A 89. A wave is divided into degrees. How many degrees make up a complete wave? A. 100 B. 180 C. 212 D. 360 Answer: D 90. What is another name for an 802.11 data frame that is also known as a PSDU? A. PPDU B. MSDU C. MPDU D. BPDU Answer: C 91. Why would a WLAN network administrator consider disabling the two lowest rates on an 802.11b/g/n access point? (Choose all that apply.) 26 / 39 A. Medium contention B. Adjacent channel interference C. Hidden node D. Intersymbol interference E. All of the above Answer: AC 92. What are some additional recommendations that can be made along with the final site survey report? (Choose all that apply.) A. Training recommendations B. Security recommendations C. Coverage recommendations D. Capacity recommendations E. Roaming recommendations Answer: AB 93. What is an advantage of using WPA3-Personal instead of WPA2-Personal as a security solution for 802.11 networks? A. WPA3-Personal, also called WPA3-SAE, uses an authentication exchange and WPA2-Personal does not B. WPA3-Personal, also called WPA3-SAE, uses a stronger authentication exchange to better secure the network C. WPA3-Personal, also called WPA3-SAE, uses AES for encryption and WPA2-Personal does not D. WPA3-Personal, also called WPA3-SAE, uses a better encryption algorithm than WPA2-Personal Answer: B Explanation: An advantage of using WPA3-Personal instead of WPA2-Personal as a security solution for 802.11 networks is that WPA3-Personal, also called WPA3-SAE, uses a stronger authentication exchange to better secure the network. WPA3-Personal uses Simultaneous Authentication of Equals (SAE) as the key exchange protocol, which provides stronger protection against offline dictionary attacks and password guessing than WPA2-Personal. SAE uses a Diffie-Hellman key exchange with elliptic curve cryptography (ECC) to establish a pairwise master key (PMK) between the AP and the client without revealing it to any eavesdropper. SAE also provides forward secrecy, which means that if one PMK is compromised, it does not affect the security of 27 / 39 other PMKs. WPA2-Personal uses Pre-Shared Key (PSK) as the key exchange protocol, which is vulnerable to offline brute-force attacks if the passphrase is weak or leaked. Both WPA3-Personal and WPA2-Personal use AES for encryption, so there is no difference in that aspect. WPA3-Personal does not use a different encryption algorithm than WPA2-Personal, but rather a different key exchange protocol. Reference: [CWNP Certified Wireless Network Administrator Official Study Guide: Exam CWNA-109], page 307; [CWNA: Certified Wireless Network Administrator Official Study Guide: Exam CWNA-109], page 297. 94. What is the difference between association frames and reassociation frames? A. Association frames are management frames, whereas reassociation frames are control frames. B. Association frames are used exclusively for roaming. C. Reassociation frames contain the BSSID of the original AP. D. Only association frames are used to join a BSS. Answer: D 95. What factors will have the most significant impact on the amount of wireless bandwidth available to each station within a BSS? (Choose 2) A. The number of client stations associated to the BSS B. The power management settings in the access point’s beacons C. The presence of co-located (10m away) access points on non-overlapping channels D. The data rates at which nearby client stations are transmitting and receiving data E. The layer 3 protocol used by each station to transmit data over the wireless link Answer: AD 96. Transmit beamforming uses what type of frames to analyze the MIMO channel before transmitting directed paths of data? A. Trigger frames B. Beaming frames C. Sounding frames D. SM power save action frames Answer: C 97. The Wi-Fi HaLow certification from the Wi-Fi Alliance will likely be used for sensor networks and Internet of Things (IoT) devices and is based on which IEEE amendment? 28 / 39 A. 802.11aq B. 802.11ak C. 802.11ae D. 802.11ai E. 802.11ah Answer: E 98. Received signal strength indicator (RSSI) metrics are used by 802.11 radios to define which RF characteristics? A. Signal strength B. Phase C. Frequency D. Modulation Answer: A 99. What is the number one cause of layer 2 retransmissions? A. Low SNR B. Hidden node C. Adjacent cell interference D. RF interference Answer: D 100. When determining the mounting height of a long-distance point-to-point antenna, which of the following needs to be considered? (Choose all that apply.) A. Frequency B. Distance C. Visual line of sight D. Earth bulge E. Antenna beamwidth F. RF line of sight Answer: ABDF 101. What documents might be needed prior to performing an indoor site survey for a new wireless LAN? (Choose all that apply.) A. Blueprints B. Network topography map 29 / 39 C. Network topology map D. Coverage mapE. Frequency map Answer: AC 102. What statements about the SSID are true? (Choose 2) A. The SSID is a security session identifier used in RSNs. B. The SSID must be included in an association request frame. C. The SSID is an alphanumeric value assigned to device manufacturers by the IEEE. D. The SSID is a pseudo-random number assigned to each client by an AP. E. The SSID is an alphanumeric value with a maximum length of 32 octets. F. When configuring a new network, creating an SSID is optional. Answer: BE 103. Option 43 must be configured to allow access points to locate controllers. In what network service should this option be configured? A. DNS B. LDAP C. DHCP D. RADIUS Answer: C Explanation: DHCP (Dynamic Host Configuration Protocol) is the network service where option 43 must be configured to allow access points to locate controllers. DHCP is a protocol that allows a device to obtain an IP address and other network configuration parameters from a server. In a wireless controller scenario, the access points can use DHCP to request an IP address from a DHCP server, which can also provide the IP address or hostname of the wireless controller as an option in the DHCP response. Option 43 is a vendor-specific option that can be used to encode custom information for different types of devices. For example, Cisco access points can use option 43 to receive the IP address of the wireless controller from the DHCP server, while Aruba access points can use option 43 to receive the hostname of the wireless controller from the DHCP server. This way, the access points can discover the wireless controller and establish a connection with it. Reference: 1, Chapter 8, page 309; 2, Section 5.2 104. What is the maximum power draw of an 802.3at PD? 30 / 39 A. 12.95 watts B. 15 watts C. 7.4 watts D. 25.5 watts E. 30 watts Answer: D 105. Which of the following are true about scanning? (Choose all that apply.) A. There are two types of scanning: passive and active. B. Stations must transmit probe requests in order to learn about local APs. C. The 802.11 standard allows APs to ignore probe requests for security reasons. D. It is common for stations to continue to send probe requests after being associated to an AP. Answer: AD 106. What best describes hop time? A. The period of time that the transmitter waits before hopping to the next frequency B. The period of time that the standard requires when hopping between frequencies C. The period of time that the transmitter takes to hop to the next frequency D. The period of time the transmitter takes to hop through all of the FHSS frequencies Answer: C 107. You are managing a wireless access point in autonomous mode using the Web based interface. You capture traffic during this management task and notice that you can see the HTML code of the Web pages used for access point management. What error in administration could be the cause of this security concern? A. IPsec is not in use of the management connection as recommended B. A VPN with the AP is not established C. WPA2 is disabled on the WLAN D. HTTP is in use instead of HTTPS Answer: D 108. You are troubleshooting a problem with interference from a non-802.11 device. Given that the device is not a WLAN device, you cannot use a protocol analyzer and have chosen to use a spectrum analyzer. You want to view the signal from the interfering device over time to see the activity that is generating. What common spectrum analyzer view should you use for this analysis? 31 / 39 A. APs B. Waterfall/Spectrogram C. Real-time FFT D. Clients Answer: B 109. Which of these capabilities are considered mandatory for a phase one 802.11ac access point as defined by the Wi-Fi Alliance's vendor certification program called Wi-Fi CERTIFIED ac? (Choose all that apply.) A. 20, 40, 80, 160 MHz channel B. MCS 0C7 C. MCS 0C8 D. Two spatial streams E. Long guard interval Answer: BDE 110. What is another name for a wireless hijacking attack? A. Wi-Fi phishing B. Man-in-the-middle C. Fake AP D. Evil twin E. AirSpy Answer: D 111. You are reconfiguring an AP to use the short guard interval. How long will the new guard interval duration be after the change? A. 800 ns B. 400 ns C. 104 ms D. 10 ms Answer: B Explanation: The short guard interval is an optional feature of 802.11n and 802.11ac that reduces the time between OFDM symbols from 800 ns to 400 ns. This can increase the data rate by about 11%, but also requires more precise timing and synchronization between the transmitter and the receiver. The short guard interval is only used when both the AP and the client support it and 32 / 39 agree to use it. Reference: [CWNA-109 Study Guide], Chapter 4: Radio Frequency Signal and Antenna Concepts, page 163; [CWNA-109 Study Guide], Chapter 4: Radio Frequency Signal and Antenna Concepts, page 157. 112. What is a telecommunications unit of measurement of traffic equal to 1 hour of telephone traffic in 1 hour of time? A. Ohm B. dBm C. Erlang D. Call hour E. Voltage Standing Wave Ratio Answer: C 113. You are configuring an access point to use channel 128. What important fact should be considered about this channel? A. It is a 2.4 GHz frequency band 40 MHz channel, so it should not be used B. It is a 22 MHz channel so it will overlap with the channels above and below it C. It is a channel that may require DFS when used D. It is a channel that is unsupported by all access points in all regulatory domains Answer: C Explanation: It is a channel that may require DFS when used is an important fact that should be considered about channel 128. Channel 128 is a 5 GHz frequency band 20 MHz channel that has a center frequency of 5.64 GHz. Channel 128 is one of the channels that are subject to DFS (Dynamic Frequency Selection) rules, which require Wi-Fi devices to monitor and avoid using channels that are occupied by radar systems or other primary users. DFS is a feature that is defined in the IEEE 802.11h amendment and is mandated by some regulatory bodies, such as the FCC and the ETSI, to protect the licensed users of the 5 GHz band from interference by unlicensed Wi-Fi devices. DFS works by using a mechanism called channel availability check (CAC), which requires Wi-Fi devices to scan a channel for a certain period of time before using it. If a radar signal is detected during the CAC or while using the channel, the Wi-Fi devices must switch to another channel that is free from radar interference. When configuring an access point to use channel 128, it is important to consider the implications of DFS rules, such as: The access point must support DFS and comply with the local regulations and standards that 33 / 39 apply to DFS channels. The access point may experience delays or interruptions in its operation due to CAC or channel switching. The access point may have limited channel selection or availability due to radar interference or other Wi-Fi devices using DFS channels. The access point may have compatibility or interoperability issues with some client devices that do not support DFS or use different DFS parameters. The access point may have performance or quality issues due to co-channel or adjacent- channel interference from other Wi-Fi devices using non-DFS channels. Therefore, it is advisable to use channel 128 only when necessary and after performing a thorough site survey and spectrum analysis to determine the best channel for the access point. Reference: 1, Chapter 3, page 117; 2, Section 3.2 114. The IEEE 802.11-2012 standard defines communication mechanisms at which layers of the OSI model? (Choose all that apply.) A. Network B. Physical C. Transport D. Application E. Data-Link F. Session Answer: BE 115. Which answer correctly completes the following sentence? The WMM certification, createdby the Wi-Fi Alliance, is based on the ___________ coordination function with support for ___________ QoS priority. A. Hybrid, contention-based B. Point, scheduled C. Dynamic, distributed D. Distributed, trigger-and-delivery E. Enhanced, contention-free Answer: A 116. What type of 802.11 radio form factor is normally used in mobile devices? A. Integrated single chip B. PCMCIA 34 / 39 C. Express Mini PCI D. Mini PCI E. Secure Digital Answer: A 117. The 802.11 legacy standard defines which wireless security solution? A. Dynamic WEP B. 802.1X/EAP C. 64-bit static WEP D. Temporal Key Integrity Protocol E. CCMP/AES Answer: C 118. ABC Company performs government contract work that requires disabling WLANs and has recently purchased an 802.11 Wireless Intrusion Prevention System (WIPS) to enforce their “NO WIRELESS” network security policy. What attack type cannot be recognized by the WIPS? A. Deauthentication B. Rogue APs installation C. Layer 3 DoS D. Packet capturing E. RF jamming Answer: D 119. Which of these client radios will be able to transmit in the U-NII-5 band? A. Wi-Fi 4 client radios B. Wi-Fi 5 client radios C. Wi-Fi 6 client radios D. Wi-Fi 6E client radios E. Wi-Fi 7 client radios Answer: D 120. XYZ Company has decided to install an 802.11 WLAN system that will support 1000 wireless users, but they are concerned about network security. XYZ is interested in deploying standardized security features. In addition to WPA2-Enterprise with PEAP and role-based access control, XYZ would like to support management frame 35 / 39 protection as well as a fast secure roaming protocol for future mobile handsets. As XYZ Company selects a product to deploy, what two IEEE amendments, which are included in 802.11-2012, should be supported to provide the management frame protection and fast secure roaming security features? (Choose 2) A. 802.11j B. 802.11p C. 802.11r D. 802.11u E. 802.11w F. 802.11z Answer: CE 121. Hybrid Coordination Function (HCF) defines what allotted period of time in which a station can transmit multiple frames? A. Block acknowledgment B. Polling C. Virtual carrier sense D. Physical carrier sense E. TXOP Answer: E 122. Which of these 802.11 technologies can operate in the 2.4 GHz frequency band? (Choose all that apply.) A. 802.11a (OFDM radios) B. 802.11b (HR-DSSS radios) C. 802.11g (ERP radios) D. 802.11n (HT radios) E. 802.11ac (VHT radios) F. 802.11ax (HE radios) Answer: BCDF 123. The most common technologies in WPANs are ________ and _______ . (Choose two) A. Bluetooth B. Cellular C. Infrared D. WiMAX 36 / 39 Answer: AC 124. The PSE will apply a voltage of between 14.5 and 20.5 and measure the resulting current to determine the class of the device. Which current range represents Class 2 devices? A. 0 to 4 mA B. 5 to 8 mA C. 9 to 12 mA D. 13 to 16 mA E. 17 to 20 mA Answer: E 125. Thirty 2×2:2 access points have been deployed at a school where all the client devices are 1×1:1 802.11n tablets. The access points are transmitting on 20 MHz channels with the standard guard interval of 800 ns. What is the highest 802.11n data rate that can be used for communications between the APs and tablets? A. 54 Mbps B. 65 Mbps C. 72 Mbps D. 150 Mbps E. 300 Mbps Answer: B 126. The height or power of a wave is known as what? A. Phase B. Frequency C. Amplitude D. Wavelength Answer: C 127. A client STA must choose the best AP for connectivity. As part of the evaluation, it must verify compatible data rates. What can the client STA use to verify that an AP supports the same data rates that it supports? A. Beacon frames transmitted by the AP B. Data frames sent between the AP and current clients STAs 37 / 39 C. Authentication frames transmitted by the other client STAs D. Probe request frames transmitted by other client STAs Answer: A Explanation: The client STA can use Beacon frames transmitted by the AP to verify that an AP supports the same data rates that it supports. Beacon frames are management frames that are periodically broadcasted by the APs to announce their presence, capabilities, and parameters. One of the information elements contained in the Beacon frames is the Supported Rates or Extended Supported Rates, which lists the data rates that the AP can use for communication. The client STA can compare its own data rates with those advertised by the AP to determine if they are compatible. Data frames, authentication frames, and probe request frames do not contain information about data rates. Reference: [CWNP Certified Wireless Network Administrator Official Study Guide: Exam CWNA-109], page 133; [CWNA: Certified Wireless Network Administrator Official Study Guide: Exam CWNA-109], page 123. More Hot Exams are available. 38 / 39 https://www.certqueen.com/promotion.asp 350-401 ENCOR Exam Dumps 350-801 CLCOR Exam Dumps 200-301 CCNA Exam Dumps Powered by TCPDF (www.tcpdf.org) 39 / 39 https://www.certqueen.com/350-401.html https://www.certqueen.com/350-801.html https://www.certqueen.com/200-301.html http://www.tcpdf.org