New Year Special Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > CWNP > CWNA Certification > CWNA-109

CWNA-109 Certified Wireless Network Administrator Question and Answers

Question # 4

What can an impedance mismatch in the RF cables and connectors cause?

A.

Increased range of the RF signal

B.

Fewer MCS values in the MCS table

C.

Increased amplitude of the RF signal

D.

Excessive VSWR

Full Access
Question # 5

XYZ Company has decided to install an 802.11 WLAN system that will support 1083 wireless users, but they are concerned about network security. XYZ is interested in deploying standardized security features. In addition to WPA2-Enterprise with PEAP and role-based access control, XYZ would like to support management frame protection as well as a fast secure roaming protocol for future mobile handsets.

As XYZ Company selects a product to deploy, what two IEEE amendments, which are included in 802.11-2016, and 802.11-2020 should be supported to provide the management frame protection and fast secure roaming security features?

A.

802.11j and 802.11z

B.

802.11r and 802.11w

C.

802.11j and 802.11k

D.

802.11k and 802.11v

Full Access
Question # 6

You are implementing a multi-AP WLAN and fast secure roaming is essential. Which one of the following methods is an IEEE 802.11 standard method for fast roaming?

A.

FT

B.

OKC

C.

Load balancing

D.

Band steering

Full Access
Question # 7

A client STA must choose the best AP for connectivity. As part of the evaluation, it must verify compatible data rates. What can the client STA use to verify that an

AP supports the same data rates that it supports?

A.

Beacon frames transmitted by the AP

B.

Data frames sent between the AP and current clients STAs

C.

Authentication frames transmitted by the other client STAs

D.

Probe request frames transmitted by other client STAs

Full Access
Question # 8

Which one of the following 802.11 PHYs is more likely to be used in an industrial deployment but not likely to be used in standard office deployments?

A.

S1G

B.

VHT

C.

OFDM

D.

HT

Full Access
Question # 9

What is the final step in an effective troubleshooting process?

A.

Disable the WLAN

B.

Verify the solution

C.

Notify the users of problem resolution

D.

Document the results

Full Access
Question # 10

When compared with legacy Power Save mode, how does VHT TXOP power save improve battery life for devices on a WLAN?

A.

Legacy Power Save mode was removed in the 802.11ac amendment.

B.

VHT TXOP power save allows the WLAN transceiver to disable more components when in a low power state.

C.

VHT TXOP power save uses the partial AID in the preamble to allow clients to identify frames targeted for them.

D.

VHT TXOP power save allows stations to enter sleep mode and legacy Power Save does not.

Full Access
Question # 11

In a long-distance RF link, what statement about Fade Margin is true?

A.

A Fade Margin is unnecessary on a long-distance RF link if more than 80% of the first Fresnel zone is clear of obstructions.

B.

The Fade Margin is a measurement of signal loss through free space and is a function of frequency and distance.

C.

Fade Margin is an additional pad of signal strength designed into the RF system to compensate for unpredictable signal fading.

D.

The Fade Margin of a long-distance radio link should be equivalent to the receiver’s low noise filter gain.

Full Access
Question # 12

What is the most effective method for testing roaming in relation to 802.11 VoIP handsets?

A.

Use a spectrum analyzer to monitor RF activity during a VoIP call.

B.

Use a protocol analyzer to capture the traffic generated when a laptop roams.

C.

Place a call with the handset and move around the facility to test quality during roaming.

D.

Use the built-in roaming monitor built into all VoIP handsets.

Full Access
Question # 13

A WLAN is implemented using wireless controllers. The APs must locate the controllers when powered on and connected to the network. Which one of the following methods is commonly used to locate the controllers by the APs?

A.

NTP

B.

DHCP

C.

SNMP

D.

GRE

Full Access
Question # 14

What security option for 802.11 networks supports SAE and requires protected management frames?

  • WPA

A.

WPA2

B.

WPA3

C.

OWE

Full Access
Question # 15

A natural disaster has occurred in a remote area that is approximately 57 miles from the response team headquarters. The response team must implement a local wireless network using 802.11 WLAN access points. What is the best method, of those listed, for implementation of a network back-haul for communications across the Internet in this

scenario?

A.

802.11 bridging to the response team headquarters

B.

Cellular/LTE/5G

C.

Turn up the output power of the WLAN at the response team headquarters

D.

Temporary wired DSL

Full Access
Question # 16

When an ACK frame is not received by the transmitting STA, what is assumed?

A.

The receiver processed the frame, but did not respond with an ACK frame because 802.11w is enabled

B.

The frame was correctly delivered

C.

The frame was not delivered and must be retransmitted

D.

The receiver is offline

Full Access
Question # 17

You have received a report of poor wireless connections on the third floor of a building under your administration. Three individuals have reported the problem. Apparently, the connections are reporting a strong signal, but the users cannot access the Internet. With the problem identified, what is the next logical step in the troubleshooting process?

A.

Verify the solution

B.

Discover the scale of the problem

C.

Perform corrective actions

D.

Create a plan of action or escalate the problem

Full Access
Question # 18

Lynne runs a small hotel, and as a value added service for his customers he has implemented a Wi-Fi hot-spot. Lynne has read news articles about how hackers wait at hot-spots trying to take advantage of unsuspecting users. He wants to avoid this problem at his hotel.

What is an efficient and practical step that Lynne can take to decrease the likelihood of active attacks on his customers’ wireless computers?

A.

Enable station-to-station traffic blocking by the access points in the hotel.

B.

Implement Network Access Control (NAC) and require antivirus and firewall software along with OS patches.

C.

Implement an SSL VPN in the WLAN controller that initiates after HTTPS login.

D.

Require EAP-FAST authentication and provide customers with a username/password on their receipt.

Full Access
Question # 19

What authentication method is referenced in the 802.11-2016 and 802.11-2020 specifications and is recommended for robust WI-AN client security?

A.

SSL

B.

802.1X/EAP

C.

IPSec

D.

WEP

Full Access
Question # 20

When implementing PoE, what role is played by a switch?

A.

PSE

B.

Midspan injector

C.

PD

D.

Power splitter

Full Access
Question # 21

You are deploying a WLAN monitoring solution that utilizes distributed sensor devices. Where should sensors be deployed for best results? Choose the single best answer.

A.

In switching closets

B.

Every 5 meters and alongside each AP

C.

In critical areas where WLAN performance must be high

D.

Above the plenum on each floor

Full Access
Question # 22

Which directional antenna types are commonly used by indoor Wi-Fi devices in a MIMO multiple spatial stream implementation?

A.

Dipole and yagi

B.

Grid and sector

C.

Patch and panel

D.

Dish and grid

Full Access
Question # 23

You are attempting to locate the cause of a performance problem in two WLAN cells in a mostly overlapping coverage area. You note that one AP is on channel 1 and the other is on channel 2. When you document your findings, what term do you use to describe the problem in this configuration?

A.

CCC

B.

Non-Wi-Fi interference

C.

CCI

D.

ACI

Full Access
Question # 24

An IEEE 802.11 amendment is in the daft state. What impact does this draft amendment have on the 802.11 standard?

A.

Devices will be released based on the draft amendment and the draft amendment features are part of the standard.

B.

No impact: Until an amendment is ratified, it does not become part of the standard.

C.

No impact: Draft amendments do not become part of the standard until a working group is formed.

D.

The standard is changed to reflect the new capabilities as soon as an amendment enters the draft stage.

Full Access
Question # 25

What ID is typically mapped to an AP’s MAC address if a single BSS is implemented?

A.

SSID

B.

Device ID

C.

VLAN ID

D.

BSSID

Full Access
Question # 26

What can cause excessive VSWR in RF cables used to connect a radio to an antenna?

A.

High gain yagi antenna

B.

Radio output power above 100 mW but below 400 mw

C.

High gain parabolic dish antenna

D.

Impedance mismatch

Full Access
Question # 27

You recently purchased four laptops containing dual-band 802.11ac adapters. The laptops can connect to your 2.4 GHz network, but they cannot connect to the 5 GHz network. The laptops do not show the 5 GHz SSIds, which are different than the 2.4 GHz SSIDs. Existing devices can connect to the 5 GHz SSIDs with no difficulty. What is the likely problem?

A.

Interference from non-Wi-Fi sources

B.

Faulty drivers

C.

DoS attack

D.

Interference from other WLANs

Full Access
Question # 28

A string of characters and digits is entered into an AP and a client STA for WPA2 security. The string is 8 characters long. What is this string called?

A.

MSK

B.

WEP key

C.

Passphrase

D.

PSK

Full Access
Question # 29

In an 802.11n (H T) 2.4 GHz BSS, what prevents each station from using all the airtime when other client stations are actively communicating in the same BSS?

A.

802.11 DOS prevention

B.

OFDMA

C.

CSMA/CD

D.

CSMA/CA

Full Access
Question # 30

ABC Company is planning a point-to-multipoint outdoor bridge deployment with standalone (autonomous)

802.11 bridge units. 802.1X/EAP will be used for bridge authentication. A Linux-based RADIUS server will be used for authentication. What device in the bridge implementation acts as the 802.1X Authenticator?

A.

The Ethernet switch

B.

The RADIUS server

C.

All non-root bridges

D.

The root bridge

Full Access
Question # 31

In an 802.11 2.4 GHz system, what 22 MHz channels are considered non-overlapping?

A.

7 and 11

B.

2 and 8

C.

1 and 5

D.

4 and 6

Full Access
Question # 32

What wireless networking term describes the increase of RF energy in an intentional direction with the use of an antenna?

A.

Directed Radiation

B.

Beam Digression

C.

Passive Gain

D.

Active Amplification

Full Access
Question # 33

Which IEEE 802.11 physical layer (PHY) specification includes support for and compatibility with both ERP and HR/DSSS?

A.

DSSS (802.11-Prime)

B.

OFDM (802.11a)

C.

HT (802.11n)

D.

VHT (802.11ac)

Full Access
Question # 34

What security solution is required to be used in place of Open System Authentication for all open network 802.11 implementations in the 6 GHz band?

A.

OWE

B.

Kerberos

C.

WPA3-Enterprise

D.

WPA3-SAE

Full Access
Question # 35

You are managing a wireless access point in autonomous mode using the Web based interface. You capture traffic during this management task and notice that you can see the HTML code of the Web pages used for access point management. What error in administration could be the cause of this security concern?

A.

IPsec is not in use of the management connection as recommended

B.

A VPN with the AP is not established

C.

WPA2 is disabled on the WLAN

D.

HTTP is in use instead of HTTPS

Full Access
Question # 36

You are troubleshooting a problem with a new 802.11ax AP. While the AP supports four spatial streams, most clients are only achieving maximum data rates of 150 Mbps. What is the likely cause?

A.

The clients are 802.11n devices

B.

The clients are only two stream 802.11ax clients

C.

Contention caused by an overlapping BSS

D.

Non-Wi-Fi interference in the channel

Full Access