Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

CWNA-109 Exam Dumps - Certified Wireless Network Administrator

Question # 4

A client complains of low data rates on his computer. When you evaluate the situation, you see that the signal strength is -84 dBm and the noise floor is -96 dBm. The client is an 802.11ac client and connects to an 802.11ac AP. Both the client and AP are 2x2:2 devices. What is the likely cause of the low data rate issue?

A.

Weak signal strength

B.

CAT5e cabling run to the AP

C.

Too few spatial streams

D.

Lack of support for 802.11n

Full Access
Question # 5

A WLAN transmitter that emits a 50 mW signal is connected to a cable with 3 dB loss. If the cable is connected to an antenna with 9dBi gain, what is the EIRP at the antenna element?

A.

26 dBm

B.

13 dBm

C.

23 dBm

D.

10 dBm

Full Access
Question # 6

You have implemented an 802.11ax WLAN for a customer. All APs are four stream HE APs. The customer states that it is essential that most of the clients can use the OFDMA modulation scheme. What do you tell the customer?

A.

The clients that must support OFDMA must also be upgraded to 802.11ax

B.

OFDMA is an optional feature of 802.11ax and most APs don't even support it

C.

All 5 GHz PHYs use OFDM modulation, so you will achieve OFDMA everywhere in 5 GHz

D.

If the devices support 802.11ac, they can be updated to support OFDMA through driver upgrades

Full Access
Question # 7

What can an impedance mismatch in the RF cables and connectors cause?

A.

Increased range of the RF signal

B.

Fewer MCS values in the MCS table

C.

Increased amplitude of the RF signal

D.

Excessive VSWR

Full Access
Question # 8

You administer a small WLAN with nine access point. As a small business, you do not rum a RADIUS server and use WPA2-Personal for security. Recently, you changed the passphrase for WPA2-personal in all Aps and clients. Several users are now reporting the inability to connect to the network at time and it is constrained to one area of the building. When using scanner, you see that the AP covering that area is online

A.

The AP that covers the problem area requires a firmware update

B.

The clients are improperly configured

C.

The AP that covers the problem area has failed

D.

The AP that covers the problem area is improperly configured

Full Access
Question # 9

What authentication method is referenced in the 802.11-2016 and 802.11-2020 specifications and is recommended for robust WI-AN client security?

A.

SSL

B.

802.1X/EAP

C.

IPSec

D.

WEP

Full Access
Question # 10

What is required when operating 802.11ax APS in the 6 GHz band using passphrase-based authentication?

  • VHT PHY

A.

HT PHY

B.

SAE

C.

CCMP

Full Access
Question # 11

What 802.11 PHY uses available space in very low frequency ranges that is not in use at the time by broadcast video signals?

A.

DMG

B.

SIG

C.

DSSS

D.

TVHT

Full Access
Question # 12

XYZ Company has decided to install an 802.11 WLAN system that will support 1083 wireless users, but they are concerned about network security. XYZ is interested in deploying standardized security features. In addition to WPA2-Enterprise with PEAP and role-based access control, XYZ would like to support management frame protection as well as a fast secure roaming protocol for future mobile handsets.

As XYZ Company selects a product to deploy, what two IEEE amendments, which are included in 802.11-2016, and 802.11-2020 should be supported to provide the management frame protection and fast secure roaming security features?

A.

802.11j and 802.11z

B.

802.11r and 802.11w

C.

802.11j and 802.11k

D.

802.11k and 802.11v

Full Access
Question # 13

What 802.11 network configuration would result in multiple stations broadcasting Beacon frames with the same BSSID but with different source addresses?

A.

Multiple APs have been loaded with the same configuration from an image file.

B.

A single AP supports multiple BSSs with different SSIDs.

C.

An IBSS is used instead of a BSS.

D.

An SCA network is in use.

Full Access
Question # 14

When a client station sends a broadcast probe request frame with a wildcard SSID, how do APs respond?

A.

Each AP responds in turn after preparing a probe response and winning contention.

B.

For each probe request frame, only one AP may reply with a probe response.

C.

Each AP checks with the DHCP server to see if it can respond and then acts accordingly.

D.

After waiting a SIFS, all APs reply at the same time with a probe response.

Full Access
Question # 15

You are troubleshooting a client issue on a Windows laptop. The laptop can see and connect to 2.4 GHz APs, but is does not even see 5 GHz APs. While evaluating the issue, you determine that this problem is happening for all of the laptops of this model in the organization. Several other tablets connect on channel 48 and channel 52 in the same work areas. What is the likely problem?

A.

The clients are configured to use WPA and 5 GHz channels only support WPA2.

B.

The client drivers are faulty and should be upgraded.

C.

The antennas in the laptop have insufficient gain to detect the 5 GHz signals.

D.

The access points are configured to disallow 5 GHz.

Full Access
Question # 16

You are tasked with performing a throughput test on the WLAN. The manager asks that you use open source tools to reduce costs. What open source tool is designed to perform a throughput test?

A.

iPerf

B.

PuTTy

C.

IxChariot

D.

Python

Full Access
Question # 17

You have received a report of poor wireless connections on the third floor of a building under your administration. Three individuals have reported the problem. Apparently, the connections are reporting a strong signal, but the users cannot access the Internet. With the problem identified, what is the next logical step in the troubleshooting process?

A.

Verify the solution

B.

Discover the scale of the problem

C.

Perform corrective actions

D.

Create a plan of action or escalate the problem

Full Access
Question # 18

In addition to coverage analysis results, what should be included in a post-deployment site survey report to ensure WLAN users experience acceptable performance?

A.

WAN interface analysis results

B.

Capacity analysis results

C.

Application Layer protocol availability analysis results

D.

Layer 4 protocol availability analysis results

Full Access
Question # 19

The center frequency of channel 1 in the 2.4 GHz band is 2.412 GHz (2412 MHz). What is the center frequency of channel 4?

A.

2.427

B.

2.422

C.

2.413

D.

2.417

Full Access
Question # 20

What security solution is required to be used in place of Open System Authentication for all open network 802.11 implementations in the 6 GHz band?

A.

OWE

B.

Kerberos

C.

WPA3-Enterprise

D.

WPA3-SAE

Full Access
Question # 21

A WLAN is implemented using wireless controllers. The APs must locate the controllers when powered on and connected to the network. Which one of the following methods is commonly used to locate the controllers by the APs?

A.

NTP

B.

DHCP

C.

SNMP

D.

GRE

Full Access
Question # 22

You are troubleshooting a controller-based AP that is unable to locate the controller. DHCP is not use and the controller is located at 10.10.10.81/24 while the AP is on the 10.10.16.0/24 network. What should be inspected to verify proper configuration?

A.

NTP

B.

BOOTH

C.

DNS

D.

AP hosts file

Full Access
Question # 23

What statement is true concerning the use of Orthogonal Frequency Division Multiplexing (OFDM) modulation method in IEEE 802.11 WLANs?

A.

OFDM implements BPSK modulation to allow for data rates up to 7 Gbps.

B.

OFDM was first introduced in 802.11a and is used by the ERP, HT and VHT PHYs as well.

C.

OFDM modulation is used only in 5 GHz 802.11 transmissions.

D.

OFDM was used by Frequency Hopping Spread Spectrum (FHSS) PHY devices.

Full Access
Question # 24

When antenna gain is reported in dBi, the gain of the antenna is compared to what theoretical radiator?

A.

End-fire radiator

B.

Dipole radiator

C.

Isotropic radiator

D.

Anthropomorphic radiator

Full Access
Question # 25

A natural disaster has occurred in a remote area that is approximately 57 miles from the response team headquarters. The response team must implement a local wireless network using 802.11 WLAN access points. What is the best method, of those listed, for implementation of a network back-haul for communications across the Internet in this

scenario?

A.

802.11 bridging to the response team headquarters

B.

Cellular/LTE/5G

C.

Turn up the output power of the WLAN at the response team headquarters

D.

Temporary wired DSL

Full Access
Question # 26

What security solution is deprecated in the 802.11 standard and should never be used in any modern WLAN deployment?

A.

Shared Key Authentication

B.

Open System Authentication

C.

CCMP

D.

AES

Full Access
Question # 27

You are installing an AP to be used by 27 laptops. All laptops will connect on the 5 GHz frequency band. A neighbor network uses channels 1 and 6. What channel should be used for this AP and why?

A.

Channel 6, because it is always best to use this channel

B.

A 5 GHz channel, because channels 1 and 6 are 2.4 GHz channels they have no impact on the decision

C.

Channel 1, because it is best to use the channel with the lowest frequency

D.

Channel 11, because channels 1 and 6 are in use nearby

Full Access
Question # 28

ABC Company is planning a point-to-multipoint outdoor bridge deployment with standalone (autonomous)

802.11 bridge units. 802.1X/EAP will be used for bridge authentication. A Linux-based RADIUS server will be used for authentication. What device in the bridge implementation acts as the 802.1X Authenticator?

A.

The Ethernet switch

B.

The RADIUS server

C.

All non-root bridges

D.

The root bridge

Full Access
Question # 29

You have been tasked with creating a wireless link between two buildings on a single campus. The link must support at least 150 Mbps data rates. What kind of WLAN technology role should you deploy?

A.

WPAN

B.

IBSS

C.

Wireless bridging

D.

Access BSS

Full Access
Question # 30

An IEEE 802.11 amendment is in the daft state. What impact does this draft amendment have on the 802.11 standard?

A.

Devices will be released based on the draft amendment and the draft amendment features are part of the standard.

B.

No impact: Until an amendment is ratified, it does not become part of the standard.

C.

No impact: Draft amendments do not become part of the standard until a working group is formed.

D.

The standard is changed to reflect the new capabilities as soon as an amendment enters the draft stage.

Full Access
Question # 31

Which directional antenna types are commonly used by indoor Wi-Fi devices in a MIMO multiple spatial stream implementation?

A.

Dipole and yagi

B.

Grid and sector

C.

Patch and panel

D.

Dish and grid

Full Access
Question # 32

What ID is typically mapped to an AP’s MAC address if a single BSS is implemented?

A.

SSID

B.

Device ID

C.

VLAN ID

D.

BSSID

Full Access
Question # 33

What statement describes the authorization component of a AAA implementation?

A.

Verifying that a user is who he says he is.

B.

Implementing a WIPS as a full-time monitoring solution to enforce policies.

C.

Granting access to specific network services or resources according to a user profile.

D.

Validating client device credentials against a database.

Full Access
Question # 34

What factor does not influence the distance at which an RF signal can be effectively received?

A.

Receiving station’s radio sensitivity

B.

Receiving station’s output power

C.

Transmitting station’s output power

D.

Free Space Path Loss

Full Access
Question # 35

What common feature of MDM solutions can be used to protect enterprise data on mobile devices?

A.

Over-the-air registration

B.

Onboarding

C.

Containerization

D.

Self-registration

Full Access
Question # 36

What cipher suite is specified by the 802.11-2016 standard and is not deprecated?

A.

Wired Equivalent Privacy

B.

Temporal Key Integrity Protocol

C.

Counter Mode with CBC-MAC Pro tocol

D.

Extensible Authentication Protocol

Full Access