ExamGecko
Home Home / CWNP / CWAP-404

CWNP CWAP-404 Practice Test - Questions Answers

Question list
Search
Search

List of questions

Search

Related questions











Which one of the following is required for Wi-Fi integration in laptop-based Spectrum Analyzer software in addition to the spectrum analysis adapter?

A.
An 802.11 wireless adaptor
A.
An 802.11 wireless adaptor
Answers
B.
A firmware upgrade for the spectrum analysis adapter
B.
A firmware upgrade for the spectrum analysis adapter
Answers
C.
A directional antenna
C.
A directional antenna
Answers
D.
SNMP read credentials to the WLAN controller or APs
D.
SNMP read credentials to the WLAN controller or APs
Answers
Suggested answer: A

Explanation:

An 802.11 wireless adaptor is required for Wi-Fi integration in laptop-based spectrum analyzer software in addition to the spectrum analysis adapter. The spectrum analysis adapter is a hardware device that captures the RF signals in the wireless environment and sends them to the spectrum analyzer software for analysis and display. The 802.11 wireless adapter is a hardware device that connects the laptop to the wireless network and allows the spectrum analyzer software to correlate the RF data with the Wi-Fi data, such as SSID, channel, and BSSID. This enables the spectrum analyzer software to provide more context and insight into the spectrum activity and its impact on the Wi-Fi network. A firmware upgrade for the spectrum analysis adapter is not required for Wi-Fi integration, but it may be needed to fix bugs or add features to the device. A directional antenna is an antenna that focuses the RF energy in a specific direction and has a high gain and a narrow beamwidth. A directional antenna can be used with a spectrum analysis adapter to pinpoint the location or source of interference or noise in the wireless environment, but it is not required for Wi-Fi integration. SNMP read credentials to the WLAN controller or APs are not required for Wi-Fi integration, but they may be useful for obtaining additional information about the wireless network configuration and performance from the network devices.

Reference:

CWAP-404 Study Guide, Chapter 4: Spectrum Analysis and Troubleshooting, page 123

CWAP-404 Objectives, Section 4.2: Integrate Wi-Fi data with spectrum analysis data

CWAP-404 Study Guide, Chapter 4: Spectrum Analysis and Troubleshooting, page 131

You're the WLAN administrator for a large retailer based at the HQ in New York. The London-based office has been complaining about WLAN disconnections around lunch time each day. You suspect this might be interference from the staff microwave, how might you test your theory from the New York office?

A.
Ask a local member of staff to change the frequency of the microwave and see if the disconnections stop
A.
Ask a local member of staff to change the frequency of the microwave and see if the disconnections stop
Answers
B.
Ask a local member of staff to take some pictures of the microwave, including some close-ups of the door seal so that you can assess it
B.
Ask a local member of staff to take some pictures of the microwave, including some close-ups of the door seal so that you can assess it
Answers
C.
Access the microwave remotely and run a diagnostic check
C.
Access the microwave remotely and run a diagnostic check
Answers
D.
Place one of the London APs into spectrum analyzer mode and monitor the situation over lunch time
D.
Place one of the London APs into spectrum analyzer mode and monitor the situation over lunch time
Answers
Suggested answer: D

Explanation:

The best way to test the theory of microwave interference from the New York office is to use a remote spectrum analyzer. By placing one of the London APs into spectrum analyzer mode, you can capture and analyze the RF spectrum in the London office over lunch time. You can then look for any signs of microwave interference, such as high duty cycle, high amplitude, or frequency hopping on the 2.4 GHz band. This method does not require any physical access to the microwave or any changes to its frequency.Reference:[Wireless Analysis Professional Study Guide], Chapter 3: Spectrum Analysis, page 64

What is encrypted within the third message of the 4-Way Handshake?

A.
PMK
A.
PMK
Answers
B.
PTK
B.
PTK
Answers
C.
GMK
C.
GMK
Answers
D.
GTK
D.
GTK
Answers
Suggested answer: D

Explanation:

The GTK (Group Temporal Key) is encrypted within the third message of the 4-Way Handshake. The 4-Way Handshake is a process that establishes a secure connection between a STA (station) and an AP (access point) using WPA2 (Wi-Fi Protected Access 2), which is a security protocol that uses AES-CCMP (Advanced Encryption Standard-Counter Mode CBC-MAC Protocol) as its encryption algorithm. The 4-Way Handshake consists of four messages that are exchanged between the STA and the AP. The first message is sent by the AP to the STA, containing the ANonce (Authenticator Nonce), which is a random number generated by the AP. The second message is sent by the STA to the AP, containing the SNonce (Supplicant Nonce), which is a random number generated by the STA, and the MIC (Message Integrity Code), which is a value that verifies the integrity of the message. The third message is sent by the AP to the STA, containing the GTK, which is a key that is used to encrypt and decrypt multicast and broadcast data frames, and the MIC. The GTK is encrypted with the KEK (Key Encryption Key), which is derived from the PTK (Pairwise Temporal Key). The PTK is a key that is used to encrypt and decrypt unicast data frames, and it is derived from the PMK (Pairwise Master Key), the ANonce, and the SNonce. The fourth message is sent by the STA to the AP, containing only the MIC, to confirm the completion of the 4-Way Handshake. The other options are not correct, as they are not encrypted within the third message of the 4-Way Handshake. The PMK is a key that is derived from a passphrase or obtained from an authentication server, and it is not transmitted in any message of the 4-Way Handshake. The PTK is a key that is derived from the PMK, the ANonce, and the SNonce, and it is not transmitted in any message of the 4-Way Handshake. The GMK (Group Master Key) is a key that is generated by the AP and used to derive the GTK, and it is not transmitted in any message of the 4-Way Handshake.Reference:[Wireless Analysis Professional Study Guide CWAP-404], Chapter 8: Security Analysis, page 211-213

How many frames are exchanged for 802.11 authentication in the 6 GHz band when WPA3-Enterprise is not used, and a passphrase is used instead?

A.
1
A.
1
Answers
B.
2
B.
2
Answers
C.
3
C.
3
Answers
D.
4
D.
4
Answers
Suggested answer: B

Explanation:

Two frames are exchanged for 802.11 authentication in the 6 GHz band when WPA3-Enterprise is not used, and a passphrase is used instead. Authentication is a process that establishes an identity relationship between a STA (station) and an AP (access point) before joining a BSS (Basic Service Set). There are two types of authentication methods defined by 802.11: Open System Authentication and Shared Key Authentication. Open System Authentication does not require any credentials or security information from a STA to join a BSS, and it consists of two frames: an Authentication Request frame sent by the STA to the AP, and an Authentication Response frame sent by the AP to the STA. Shared Key Authentication requires a shared secret key from a STA to join a BSS, and it consists of four frames: two challenge-response frames in addition to the request-response frames. However, Shared Key Authentication uses WEP (Wired Equivalent Privacy) as its encryption algorithm, which is insecure and deprecated. In the 6 GHz band, which is a newly available frequency band for WLANs, Shared Key Authentication is prohibited by the 802.11 standard, as it poses security and interference risks for other users and services in the band. The 6 GHz band requires all WLANs to use WPA3-Personal or WPA3-Enterprise encryption methods, which are more secure and robust than previous encryption methods such as WPA2 or WEP. WPA3-Personal uses a passphrase to derive a PMK (Pairwise Master Key), while WPA3-Enterprise uses an authentication server to obtain a PMK. Both methods use SAE (Simultaneous Authentication of Equals) as their authentication protocol, which replaces PSK (Pre-Shared Key) or EAP (Extensible Authentication Protocol). SAE consists of two frames: an SAE Commit frame sent by both parties to exchange elliptic curve parameters and nonces, and an SAE Confirm frame sent by both parties to verify each other's identities and generate a PMK. Therefore, when WPA3-Enterprise is not used, and a passphrase is used instead in the 6 GHz band, only two frames are exchanged for 802.11 authentication: an SAE Commit frame and an SAE Confirm frame.Reference:[Wireless Analysis Professional Study Guide CWAP-404], Chapter 8: Security Analysis, page 220-221

As a wireless network consultant you have been called in to troubleshoot a high-priority issue for one of your customers. The customer's office is based on two floors within a multi-tenant office block. On one of these floors (floor 5) users cannot connect to the wireless network. During their own testing the customer has discovered that users can connect on floor 6 but not when they move to the floor 5. This issue is affecting all users on floor 5 and having a negative effect on productivity.

To troubleshoot this issue, you perform both Spectrum and Protocol Analysis. The Spectrum Analysis shows the presence of Bluetooth signals which you have identified as coming from wireless mice. In the protocol analyzer you see the top frame on the network is Deauthentication frames. On closer investigation you see that the Deauthentication frames' source addresses match the BSSIDs of your customers APs and the destination address is FF:FF:FF:FF:FF:FF:FF.

What do you conclude from this troubleshooting exercise?

A.
The customer should replace all their Bluetooth wireless mice as they are stopping the users on floor 5 from connecting to the wireless network
A.
The customer should replace all their Bluetooth wireless mice as they are stopping the users on floor 5 from connecting to the wireless network
Answers
B.
The users on floor 5 are being subjected to a denial of service attack, as this is happening across the entire floor it is likely to be a misconfigured WIPS solution belonging to the tenants on the floor below
B.
The users on floor 5 are being subjected to a denial of service attack, as this is happening across the entire floor it is likely to be a misconfigured WIPS solution belonging to the tenants on the floor below
Answers
C.
The customers APs are misbehaving and a technical support case should be open with the vendor
C.
The customers APs are misbehaving and a technical support case should be open with the vendor
Answers
D.
The CCI from the APs on the floor 4 is the problem and you need to ask the tenant below to turn down their APs Tx power
D.
The CCI from the APs on the floor 4 is the problem and you need to ask the tenant below to turn down their APs Tx power
Answers
Suggested answer: B

Explanation:

The users on floor 5 are being subjected to a denial of service attack, as this is happening across the entire floor it is likely to be a misconfigured WIPS solution belonging to the tenants on the floor below. This is because the Deauthentication frames have a source address that matches the BSSIDs of the customer's APs and a destination address that is a broadcast address (FF:FF:FF:FF:FF:FF). This indicates that someone is sending spoofed Deauthentication frames to all STAs associated with the customer's APs, causing them to disconnect from the wireless network.This is a common type of DoS attack on wireless networks, and it could be caused by a rogue device or a WIPS solution that is configured to protect the wireless network of another tenant on the floor below12.

Reference: CWAP-404 Certified Wireless Analysis Professional Study and Reference Guide, Chapter 13: Troubleshooting Common Wi-Fi Issues, page 4961; CWAP-404 Certified Wireless Analysis Professional Study and Reference Guide, Chapter 14: Troubleshooting Tools, page 5272.

During a VHT Transmit Beamforming sounding exchange, the beamformee transmits a Compressed Beamforming frame to the beamformer. What is communicated within this Compressed Beamforming frame?

A.
Steering Matrix
A.
Steering Matrix
Answers
B.
Beamforming Matrix
B.
Beamforming Matrix
Answers
C.
Feedback Matrix
C.
Feedback Matrix
Answers
D.
Beamformee Matrix
D.
Beamformee Matrix
Answers
Suggested answer: C

Explanation:

The beamformee transmits a Feedback Matrix within the Compressed Beamforming frame to the beamformer. The Feedback Matrix contains information about the channel state between the beamformee and each spatial stream of the beamformer.This information is used by the beamformer to adjust its transmit weights and optimize its signal for the beamformee34.

Reference: CWAP-404 Certified Wireless Analysis Professional Study and Reference Guide, Chapter 11: 802.11n/ac/ax PHYsical Layer Frame Exchanges, page 4033; CWAP-404 Certified Wireless Analysis Professional Study and Reference Guide, Chapter 11: 802.11n/ac/ax PHYsical Layer Frame Exchanges, page 4064.

ABC International has installed a new smart ZigBee controlled lighting system. However, the network team is concerned that this new system will interfere with the existing WLAN and has asked you to investigate the impact of the two systems operating simultaneously in the 2.4 GHz band. When performing Spectrum Analysis, which question could you answer by looking at the FFT plot?

A.
Do the ZigBee channels used by the lighting system overlap with the WLAN channels?
A.
Do the ZigBee channels used by the lighting system overlap with the WLAN channels?
Answers
B.
Is the ZigBee system using more than 50% of the available airtime?
B.
Is the ZigBee system using more than 50% of the available airtime?
Answers
C.
Is the WLAN corrupting ZigBee system messages?
C.
Is the WLAN corrupting ZigBee system messages?
Answers
D.
Is the ZigBee system causing an increase in WLAN retries?
D.
Is the ZigBee system causing an increase in WLAN retries?
Answers
Suggested answer: A

Explanation:

The FFT plot is a spectrum analysis plot that shows the RF power present at a particular frequency over a short period of time. It can help identify the sources and characteristics of RF signals in the spectrum. By looking at the FFT plot, you can determine which ZigBee channels are used by the lighting system and whether they overlap with the WLAN channels in the 2.4 GHz band. ZigBee channels are 5 MHz wide and WLAN channels are 20 MHz or 40 MHz wide, so there is a possibility of overlap and interference between them. The other questions cannot be answered by looking at the FFT plot alone, as they require other types of plots or analysis tools, such as duty cycle plot, airtime utilization plot, or protocol analyzer.Reference:[Wireless Analysis Professional Study Guide], Chapter 3: Spectrum Analysis, page 69-70

In a Spectrum Analyzer the Swept Spectrogram plot displays what information?

A.
RF power present at a particular frequency over the course of time
A.
RF power present at a particular frequency over the course of time
Answers
B.
Reductions in frame transmissions
B.
Reductions in frame transmissions
Answers
C.
Wi-Fi Device information
C.
Wi-Fi Device information
Answers
D.
The RF time domain
D.
The RF time domain
Answers
Suggested answer: A

Explanation:

The Swept Spectrogram plot is a spectrum analysis plot that shows the RF power present at a particular frequency over the course of time. It can help identify trends and patterns in the RF spectrum over a longer period of time. It can also show how the RF environment changes over time and how different sources of RF signals affect each other. The other options are not correct, as they describe different types of plots or information that are not related to the Swept Spectrogram plot.Reference:[Wireless Analysis Professional Study Guide], Chapter 3: Spectrum Analysis, page 72-73

You have installed a new 802.1 lac WLAN configured with 80 MHz channels. Users in one area are complaining about poor performance. This area is currently served by a single AP. You take a spectrum analysis capture in the poor performing are a. While examining the waterfall plot you notice the airtime utilization is higher on the first 20 MHz of the 80 MHz channel when compared to the rest of the channel. What do you conclude?

A.
The AP is misconfigured and needs to be reconfigured to 80 MHz operation
A.
The AP is misconfigured and needs to be reconfigured to 80 MHz operation
Answers
B.
Non-Wi-Fi interference is preventing the APs 80 MHz operation
B.
Non-Wi-Fi interference is preventing the APs 80 MHz operation
Answers
C.
The first 20 MHz is the AP's primary channel and higher airtime utilization on the primary channel is normal when an AP is configured for 80 MHz operation
C.
The first 20 MHz is the AP's primary channel and higher airtime utilization on the primary channel is normal when an AP is configured for 80 MHz operation
Answers
D.
RRM is enabled and has dynamically picked a 20 MHz channel
D.
RRM is enabled and has dynamically picked a 20 MHz channel
Answers
Suggested answer: B

Explanation:

The most likely cause of higher airtime utilization on the first 20 MHz of the 80 MHz channel is non-Wi-Fi interference. Non-Wi-Fi interference can prevent an AP from using its full channel width, as it will degrade the signal quality and increase the noise floor on some parts of the channel. This will force the AP to fall back to a narrower channel width, such as 20 MHz or 40 MHz, to maintain communication with its clients. The waterfall plot can help identify non-Wi-Fi interference by showing spikes or bursts of RF energy on specific frequencies or sub-channels. The other options are not correct, as they do not explain why only the first 20 MHz of the channel has higher airtime utilization.Reference:[Wireless Analysis Professional Study Guide], Chapter 3: Spectrum Analysis, page 74-75

Which one of the following should be the first step when troubleshooting a WLAN issue?

A.
Identify probable causes
A.
Identify probable causes
Answers
B.
Identify capture locations
B.
Identify capture locations
Answers
C.
Perform an initial WLAN scan and see if any obvious issues stand out
C.
Perform an initial WLAN scan and see if any obvious issues stand out
Answers
D.
Define the problem
D.
Define the problem
Answers
Suggested answer: D

Explanation:

The first step in any troubleshooting process is to define the problem. This involves gathering information from various sources, such as users, network administrators, network documentation, and network monitoring tools.Defining the problem helps to narrow down the scope of the issue and identify the symptoms, causes, and effects of the problem12Reference:

CWAP-403 Study Guide, Chapter 1: Troubleshooting Methodology, page 7

CWAP-403 Objectives, Section 1.1: Define the problem

Total 60 questions
Go to page: of 6