New Year Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

CWNA-109 Questions and Answers

Question # 6

ABC Company is planning a point-to-multipoint outdoor bridge deployment with standalone (autonomous)

802.11 bridge units. 802.1X/EAP will be used for bridge authentication. A Linux-based RADIUS server will be used for authentication. What device in the bridge implementation acts as the 802.1X Authenticator?

A.

The Ethernet switch

B.

The RADIUS server

C.

All non-root bridges

D.

The root bridge

Full Access
Question # 7

What feature of 802.1 lax (HE) is managed with beacon and trigger frames and is primarily a power management method, but also provides more efficient access to the channel used within a BSS?

A.

TWT

B.

BSS Color

C.

UL-MU-MIMO

D.

OFDMA

Full Access
Question # 8

What can cause excessive VSWR in RF cables used to connect a radio to an antenna?

A.

High gain yagi antenna

B.

Radio output power above 100 mW but below 400 mw

C.

High gain parabolic dish antenna

D.

Impedance mismatch

Full Access
Question # 9

A client STA must choose the best AP for connectivity. As part of the evaluation, it must verify compatible data rates. What can the client STA use to verify that an

AP supports the same data rates that it supports?

A.

Beacon frames transmitted by the AP

B.

Data frames sent between the AP and current clients STAs

C.

Authentication frames transmitted by the other client STAs

D.

Probe request frames transmitted by other client STAs

Full Access
Question # 10

What statement is true concerning the use of Orthogonal Frequency Division Multiplexing (OFDM) modulation method in IEEE 802.11 WLANs?

A.

OFDM implements BPSK modulation to allow for data rates up to 7 Gbps.

B.

OFDM was first introduced in 802.11a and is used by the ERP, HT and VHT PHYs as well.

C.

OFDM modulation is used only in 5 GHz 802.11 transmissions.

D.

OFDM was used by Frequency Hopping Spread Spectrum (FHSS) PHY devices.

Full Access
Question # 11

You were previously onsite at XYZ’s facility to conduct a pre-deployment RF site survey. The WLAN has been deployed according to your recommendations and you are onsite again to perform a post-deployment validation survey.

When performing this type of post-deployment RF site survey voice over Wi-Fi, what is an action that must be performed?

A.

Spectrum analysis to locate and identify RF interference sources.

B.

Frequency-band hopping analysis to detect improper RF channel implementations.

C.

Application analysis with an active phone call on an VoWiFi handset.

D.

Protocol analysis to discover channel use on neighboring APs.

Full Access
Question # 12

An IEEE 802.11 amendment is in the daft state. What impact does this draft amendment have on the 802.11 standard?

A.

Devices will be released based on the draft amendment and the draft amendment features are part of the standard.

B.

No impact: Until an amendment is ratified, it does not become part of the standard.

C.

No impact: Draft amendments do not become part of the standard until a working group is formed.

D.

The standard is changed to reflect the new capabilities as soon as an amendment enters the draft stage.

Full Access
Question # 13

What 802.11 PHY uses available space in very low frequency ranges that is not in use at the time by broadcast video signals?

A.

DMG

B.

SIG

C.

DSSS

D.

TVHT

Full Access
Question # 14

What frame type is used to reserve the wireless medium for the transmission of high data rate frames that may not be understood by all clients connected to the BSS?

A.

RTS

B.

ACK

C.

Beacon

D.

PS-Poll

Full Access
Question # 15

You are configuring an access point to use channel 128. What important fact should be considered about this channel?

A.

It is a 2.4 GHz frequency band 40 MHz channel, so it should not be used

B.

It is a 22 MHz channel so it will overlap with the channels above and below it

C.

It is a channel that may require DFS when used

D.

It is a channel that is unsupported by all access points in all regulatory domains

Full Access
Question # 16

Your manager asked you to locate a solution that allows for centralized monitoring of WLAN performance over time. He wants a single pane of glass for administration and monitoring of the solution. What do you recommend?

A.

Laptop-based spectrum analyzers

B.

AP-based spectrum analysis

C.

Overlay WLAN monitoring solution

D.

Laptop-based protocol analyzers

Full Access
Question # 17

What factors will have the most significant impact on the amount of wireless bandwidth available to each station within a BSS? (Choose 2)

A.

The number of clientstations associated to the BSS

B.

The power management settings in the access point’s beacons

C.

The presence of co-located (10m away) access points on non-overlapping channels

D.

The layer 3 protocol used by each station to transmit data over the wireless link

Full Access
Question # 18

Lynne runs a small hotel, and as a value added service for his customers he has implemented a Wi-Fi hot-spot. Lynne has read news articles about how hackers wait at hot-spots trying to take advantage of unsuspecting users. He wants to avoid this problem at his hotel.

What is an efficient and practical step that Lynne can take to decrease the likelihood of active attacks on his customers’ wireless computers?

A.

Enable station-to-station traffic blocking by the access points in the hotel.

B.

Implement Network Access Control (NAC) and require antivirus and firewall software along with OS patches.

C.

Implement an SSL VPN in the WLAN controller that initiates after HTTPS login.

D.

Require EAP-FAST authentication and provide customers with a username/password on their receipt.

Full Access
Question # 19

You are deploying a WLAN monitoring solution that utilizes distributed sensor devices. Where should sensors be deployed for best results? Choose the single best answer.

A.

In switching closets

B.

Every 5 meters and alongside each AP

C.

In critical areas where WLAN performance must be high

D.

Above the plenum on each floor

Full Access
Question # 20

Which one of the following 802.11 PHYs is more likely to be used in an industrial deployment but not likely to be used in standard office deployments?

A.

S1G

B.

VHT

C.

OFDM

D.

HT

Full Access
Question # 21

A POE device requires 47 W of power. What POE specification should be used?

A.

802.3at

B.

802.3af

C.

802.3bt

D.

802. 11at

Full Access
Question # 22

You are troubleshooting a controller-based AP that is unable to locate the controller. DHCP is not use and the controller is located at 10.10.10.81/24 while the AP is on the 10.10.16.0/24 network. What should be inspected to verify proper configuration?

A.

NTP

B.

BOOTH

C.

DNS

D.

AP hosts file

Full Access
Question # 23

What feature of 802.1 lax (HE) may impact design decisions related to AP placement and the spacing between same-channel BSS cells (3SAs) because it is designed to reduce overlapping BSS contention?

A.

TWT

B.

BSS Color

C.

uplink MU-MIMO

D.

6 GHz band support

Full Access
Question # 24

The BSA of an AP covers the area used by the sales and marketing department. Thirty-five stations operate in this space. The users indicate that they need more throughput and all stations are 5 GHz capable 802.11ac clients. The current AP configuration uses 20 MHz channels in both 2.4 GHz and 5 GHz. What is the least expensive solution available for increasing throughput for these users without implementing configuration options that are not recommended?

A.

Use a 160 MHz channel on the 5 GHz radio

B.

Use a 40 MHz channel on the 5 GHz radio

C.

Install a second AP in the coverage area

D.

Use a 40 MHz channel on the 2.4 GHz radio

Full Access
Question # 25

You are the network administrator for ABC Company. Your manager has recently attended a wireless security seminar. The seminar speaker taught that a wireless network could be hidden from potential intruders if you disabled the broadcasting of the SSID in Beacons and configured the access points not to respond to Probe Request frames that have a null SSID field.

Your manager suggests implementing these security practices. What response should you give to this suggestion?

A.

Any 802.11 protocol analyzer can see the SSID in clear text in frames other than Beacons frames. This negates any security benefit of trying to hide the SSID in Beacons and Probe Response frames.

B.

To improve security by hiding the SSID, the AP and client stations must both be configured to remove the SSID from association request and response frames. Most WLAN products support this.

C.

Any tenants in the same building using advanced penetration testing tools will be able to obtain the SSID by exploiting WPA EAPOL-Key exchanges. This poses an additional risk of exposing the WPA key.

D.

This security practice prevents manufacturers’ client utilities from detecting the SSID. As a result, the SSID cannot be obtained by attackers, except through social engineering, guessing, or use of a WIPS.

Full Access
Question # 26

You are using a tool that allows you to see signal strength for all Aps in the area with a visual representation. It shows you SSIDs available and the security settings for each SSID. It allows you to filter by frequency band to see only 2.4 GHz networks or only 5 GHz networks. No additional features are available.

What kind of application is described?

A.

Protocol analyzer

B.

Site survey utility

C.

Spectrum analyzer

D.

WLAN scanner tool

Full Access
Question # 27

What is appended to the end of each 802.11 data frame after the payload?

A.

Preamble

B.

MAC header

C.

PHY header

D.

FCS

Full Access
Question # 28

You are attempting to explain RF shadow and how it can cause lack of coverage. What common building item frequently causes RF shadow and must be accounted for in coverage plans?

A.

Wooden doors

B.

Carpeted floors

C.

Elevators

D.

Cubicle partitions

Full Access
Question # 29

Three access points are used within a facility. One access point is on channel 11 and the other two are on channel 1. The two access points using channel 1 are on either side of the access point using channel 11 and sufficiently apart so that they do not interfere with each other when they transmit frames. Assuming no other APs are in the vicinity, is CCI still a possibility in this network and why?

A.

Yes, because the client devices connected to one of the channel 1 APs will transmit frames that reach the other channel 1 AP as well as clients connected to the other channel 1 AP.

B.

No, because the APs are far enough apart that no CCI will occur.

C.

No, because CCI only occurs in the 5 GHz frequency band.

D.

Yes, because channel 11 loops around and causes CCI with channel 1.

Full Access
Question # 30

You recently purchased four laptops containing dual-band 802.11ac adapters. The laptops can connect to your 2.4 GHz network, but they cannot connect to the 5 GHz network. The laptops do not show the 5 GHz SSIds, which are different than the 2.4 GHz SSIDs. Existing devices can connect to the 5 GHz SSIDs with no difficulty. What is the likely problem?

A.

Interference from non-Wi-Fi sources

B.

Faulty drivers

C.

DoS attack

D.

Interference from other WLANs

Full Access
Question # 31

A dual-band 802.11ac AP must be powered by PoE. As a class 4 device, what power level should be received at the AP?

A.

30 W

B.

12.95 W

C.

25.5 W

D.

15.4 W

Full Access
Question # 32

You are performing a post-implementation validation survey. What basic tool can be used to easily locate areas of high co-channel interference?

A.

Throughput tester

B.

Laptop-based spectrum analyzer

C.

Access point spectrum analyzer

D.

Wi-Fi scanner

Full Access
Question # 33

An 802.11-based network uses an AP and has several connecting clients. The clients include iPhones, iPads, laptops and one desktop. What WLAN use case is represented?

A.

Ad-hoc

B.

WPAN

C.

BSS

D.

IBSS

Full Access
Question # 34

You are using a site survey tool for post-implementation validation. You have installed the appropriate adapter driver and imported a floor plan. Now, you want to take the next step in proper tool use. What must you do before gathering survey data after the floor plan is imported?

A.

Calibrate the floor plan

B.

Install WinPCAP

C.

Nothing, you can simply start capturing signal readings

D.

Install iPerf

Full Access
Question # 35

What ID is typically mapped to an AP’s MAC address if a single BSS is implemented?

A.

SSID

B.

Device ID

C.

VLAN ID

D.

BSSID

Full Access
Question # 36

When a client station sends a broadcast probe request frame with a wildcard SSID, how do APs respond?

A.

Each AP responds in turn after preparing a probe response and winning contention.

B.

For each probe request frame, only one AP may reply with a probe response.

C.

Each AP checks with the DHCP server to see if it can respond and then acts accordingly.

D.

After waiting a SIFS, all APs reply at the same time with a probe response.

Full Access