ExamGecko
Home Home / CWNP / CWAP-404

CWNP CWAP-404 Practice Test - Questions Answers, Page 2

Question list
Search
Search

List of questions

Search

Related questions











Which one of the following is an advantage of using display filters that is not an advantage of capture-time filters?

A.
They allow for focused analysis on just the packets of interest
A.
They allow for focused analysis on just the packets of interest
Answers
B.
Once created they are reusable for later captures
B.
Once created they are reusable for later captures
Answers
C.
They only hide the packets from view and the filtered packets can be enabled for view later
C.
They only hide the packets from view and the filtered packets can be enabled for view later
Answers
D.
Multiple of them can be applied simultaneously
D.
Multiple of them can be applied simultaneously
Answers
Suggested answer: C

Explanation:

Display filters are applied after the capture is completed and they only hide the packets from view. The filtered packets are still present in the capture file and can be enabled for view later by changing or removing the display filter.This is an advantage over capture-time filters, which discard the packets that do not match the filter criteria and cannot be recovered later34Reference:

CWAP-403 Study Guide, Chapter 2: Protocol Analysis, page 37

CWAP-403 Objectives, Section 2.3: Apply display filters

Using a portable analyzer you perform a packet capture next to a client STA and you can see that the STA is associated to a BSS. You observe the STA sending packets to the AP and the AP sending packets to the ST

A.
Less than 2% of all packets are retransmissions. You move to capture packets by the AP and, while the retry rate is still less than 2%, you now only see unidirectional traffic from the AP to the client. How do you explain this behavior?
A.
Less than 2% of all packets are retransmissions. You move to capture packets by the AP and, while the retry rate is still less than 2%, you now only see unidirectional traffic from the AP to the client. How do you explain this behavior?
Answers
B.
The portable analyzer is too close to the AP causing CCI, blinding the AP to the clients packets
B.
The portable analyzer is too close to the AP causing CCI, blinding the AP to the clients packets
Answers
C.
The STA is transmitting data using more spatial streams than the potable analyzer can support
C.
The STA is transmitting data using more spatial streams than the potable analyzer can support
Answers
D.
There is a transmit power mismatch between the client and the AP and while the client can hear the APs traffic, the AP cannot hear the client
D.
There is a transmit power mismatch between the client and the AP and while the client can hear the APs traffic, the AP cannot hear the client
Answers
E.
The portable analyzer has a lower receive sensitivity than the AP and while it can't capture the packets from the client STA, the AP can receive them OK
E.
The portable analyzer has a lower receive sensitivity than the AP and while it can't capture the packets from the client STA, the AP can receive them OK
Answers
Suggested answer: D

Explanation:

Receive sensitivity is the minimum signal level that a receiver can detect and decode. Different devices may have different receive sensitivity levels depending on their hardware specifications and antenna configurations. In this scenario, the portable analyzer has a lower receive sensitivity than the AP, meaning that it requires a stronger signal to capture the packets from the client STA. The AP, on the other hand, has a higher receive sensitivity and can receive the packets from the client STA even if they have a weaker signal.This explains why the portable analyzer can only see unidirectional traffic from the AP to the client when capturing near the AP5Reference:

CWAP-403 Study Guide, Chapter 4: PHY Layer Analysis, page 121

CWAP-403 Objectives, Section 4.3: Analyze PHY layer metrics

Given a protocol analyzer can decrypt WPA2-PSK data packets providing the PSK and SSID are configured in the analyzer software. When performing packet capture (in a non-FT environment) which frames are required in order for PSK frame decryption to be possible?

A.
Authentication
A.
Authentication
Answers
B.
4-Way Handshake
B.
4-Way Handshake
Answers
C.
Reassociation
C.
Reassociation
Answers
D.
Probe Response
D.
Probe Response
Answers
Suggested answer: B

Explanation:

The 4-way handshake is the process that establishes the pairwise transient key (PTK) between the client and the AP in WPA2-PSK. The PTK is derived from the PSK, the SSID, and some random numbers exchanged in the handshake frames. The PTK is used to encrypt and decrypt the data frames between the client and the AP.Therefore, in order to decrypt WPA2-PSK data packets, a protocol analyzer needs to capture the 4-way handshake frames and have the PSK and SSID configured in the analyzer software12Reference:

CWAP-404 Study Guide, Chapter 3: 802.11 MAC Layer Frame Formats and Technologies, page 87

CWAP-404 Objectives, Section 3.5: Analyze security exchanges

When configuring a long-term, forensic packet capture and saving all packets to disk which of the following is not a consideration?

A.
Real-time packet decodes
A.
Real-time packet decodes
Answers
B.
Analyzer location
B.
Analyzer location
Answers
C.
Total capture storage space
C.
Total capture storage space
Answers
D.
Individual trace file size
D.
Individual trace file size
Answers
Suggested answer: A

Explanation:

Real-time packet decodes are not a consideration when configuring a long-term, forensic packet capture and saving all packets to disk. Real-time packet decodes are useful for live analysis and troubleshooting, but they consume CPU and memory resources that could affect the performance of the capture process. For a long-term, forensic packet capture, it is more important to consider the analyzer location, the total capture storage space, and the individual trace file size.These factors affect the quality and quantity of the captured packets and the ease of post-capture analysis34Reference:

CWAP-404 Study Guide, Chapter 2: Protocol Analysis, page 49

CWAP-404 Objectives, Section 2.1: Configure protocol analyzers

You are performing a multiple adapter channel aggregation capture to troubleshoot a VoIP roaming problem and would like to measure the roaming time from the last VoIP packet sent on the old AP's channel to the first VoIP packet sent on the new AP's channel. Which timing column in the packet view would measure this for you?

A.
Roaming
A.
Roaming
Answers
B.
Relative
B.
Relative
Answers
C.
Absolute
C.
Absolute
Answers
D.
Delta
D.
Delta
Answers
Suggested answer: D

Explanation:

Delta is the timing column in the packet view that measures the time difference between two consecutive packets in a capture file. Delta can be used to measure the roaming time from the last VoIP packet sent on the old AP's channel to the first VoIP packet sent on the new AP's channel by selecting these two packets and looking at their delta values. The other timing columns are not suitable for this measurement because they do not show the time difference between two specific packets. Roaming is a column that shows whether a packet belongs to a roaming event or not. Relative is a column that shows the time elapsed since the beginning of the capture file.Absolute is a column that shows the date and time when a packet was captured5Reference:

CWAP-404 Study Guide, Chapter 2: Protocol Analysis, page 57

CWAP-404 Objectives, Section 2.4: Analyze timing values

Protocol analyzers may present field values in either binary, decimal or hexadecimal. What preceeds a hexadecimal value to indicate it is hexadecimal?

A.
0x
A.
0x
Answers
B.
16x
B.
16x
Answers
C.
%
C.
%
Answers
D.
HEX
D.
HEX
Answers
Suggested answer: A

Explanation:

A hexadecimal value is a value that uses base 16 notation, which means it can have digits from 0 to 9 and letters from A to F. A hexadecimal value is usually preceded by 0x to indicate that it is hexadecimal and not decimal or binary. For example, 0x0A is hexadecimal for 10 in decimal or 00001010 in binary. The other options are not valid prefixes for hexadecimal values.

Reference:

CWAP-404 Study Guide, Chapter 2: Protocol Analysis, page 35

CWAP-404 Objectives, Section 2.2: Analyze field values

Which one of the these is the most important in the WLAN troubleshooting methodology among those listed?

A.
Obtain detailed -knowledge of the wireless vendors debug and logging options
A.
Obtain detailed -knowledge of the wireless vendors debug and logging options
Answers
B.
Interview the network manager about the issues being experienced
B.
Interview the network manager about the issues being experienced
Answers
C.
Observe the problem
C.
Observe the problem
Answers
D.
Talk to the end users about their experiences
D.
Talk to the end users about their experiences
Answers
Suggested answer: C

Explanation:

Observing the problem is the most important step in the WLAN troubleshooting methodology among those listed. This step involves capturing and analyzing the relevant data from the wireless network, such as packets, frames, spectrum, and performance metrics. Observing the problem helps to verify the existence and scope of the issue, identify the root cause and possible solutions, and validate the results of any actions taken.The other steps are also important, but they are not as critical as observing the problem12Reference:

CWAP-404 Study Guide, Chapter 1: Troubleshooting Methodology, page 15

CWAP-404 Objectives, Section 1.2: Observe the problem

The network administrator at ABC Engineering has taken a large packet capture from one of their APs running in monitor mode. She has very little knowledge of 802.11 protocols but would like to use the capture file to evaluate the overall health and performance of their wireless network. When she asks your advice, which tool do you recommend she opens the packet capture file with?

A.
Spectrum analyzer
A.
Spectrum analyzer
Answers
B.
Python
B.
Python
Answers
C.
Capture visualization tool
C.
Capture visualization tool
Answers
D.
WLAN scanner
D.
WLAN scanner
Answers
Suggested answer: C

Explanation:

A capture visualization tool is a software application that can open a packet capture file and display various graphs, charts, tables, and statistics that illustrate the characteristics and behavior of the wireless network. A capture visualization tool can help a network administrator with little knowledge of 802.11 protocols to evaluate the overall health and performance of their wireless network by providing a visual and intuitive representation of the captured data. A spectrum analyzer is a hardware device that measures the radio frequency signals in a given frequency range and displays their amplitude, frequency, and modulation. A spectrum analyzer can help identify sources of interference and noise in the wireless environment, but it cannot open a packet capture file. Python is a programming language that can be used to write scripts or applications that manipulate or analyze packet capture files, but it requires coding skills and knowledge of 802.11 protocols. A WLAN scanner is a software application that scans for available wireless networks and displays information such as SSID, BSSID, channel, signal strength, security type, and vendor.A WLAN scanner can help discover wireless networks and their basic parameters, but it cannot open a packet capture file345Reference:

CWAP-404 Study Guide, Chapter 2: Protocol Analysis, page 63

CWAP-404 Objectives, Section 2.5: Use capture visualization tools

CWAP-404 Study Guide, Chapter 4: Spectrum Analysis and Troubleshooting, page 117

CWAP-404 Objectives, Section 4.1: Use spectrum analysis tools

CWAP-404 Study Guide, Chapter 2: Protocol Analysis, page 33

CWAP-404 Objectives, Section 2.2: Analyze field values

What is used to respond with an uplink transmission to an MU-RTS trigger frame in the 802.11ax PHY?

A.
HE SU PPDU
A.
HE SU PPDU
Answers
B.
HE MU PPDU
B.
HE MU PPDU
Answers
C.
HE TB PPDU
C.
HE TB PPDU
Answers
D.
VHT PPDU
D.
VHT PPDU
Answers
Suggested answer: C

Explanation:

An HE TB PPDU (High Efficiency Trigger-Based Packet Data Unit) is used to respond with an uplink transmission to an MU-RTS trigger frame in the 802.11ax PHY (Physical Layer). An MU-RTS trigger frame is a frame that initiates a multi-user transmission opportunity (MU-TXOP) by requesting multiple stations (STAs) to send clear-to-send (CTS) frames on different spatial streams or resource units (RUs). An HE TB PPDU is a frame that contains data from multiple STAs that have been allocated RUs by an MU-RTS trigger frame or another type of trigger frame. An HE SU PPDU (High Efficiency Single User Packet Data Unit) is a frame that contains data from a single STA using all available spatial streams or RUs. An HE MU PPDU (High Efficiency Multi User Packet Data Unit) is a frame that contains data from multiple STAs using different spatial streams or RUs without being triggered by another frame. A VHT PPDU (Very High Throughput Packet Data Unit) is a frame that uses the 802.11ac PHY and does not support multi-user transmissions.

Reference:

CWAP-404 Study Guide, Chapter 3: 802.11 MAC Layer Frame Formats and Technologies, page 101

CWAP-404 Objectives, Section 3.4: Analyze multi-user transmissions

CWAP-404 Study Guide, Chapter 3: 802.11 MAC Layer Frame Formats and Technologies, page 99

Which common feature of a Spectrum Analyzer would be the best to help you locate a non-802.11 interference source?

A.
Max hold
A.
Max hold
Answers
B.
Min hold
B.
Min hold
Answers
C.
Location filter
C.
Location filter
Answers
D.
Device finder
D.
Device finder
Answers
Suggested answer: D

Explanation:

The device finder is a common feature of a spectrum analyzer that helps locate a non-802.11 interference source. The device finder uses a directional antenna to measure the signal strength of a specific frequency or signal source. By pointing the antenna in different directions, the device finder can indicate the direction and distance of the interference source. The device finder can also filter out other signals that are not related to the interference source. The other options are not correct, as they do not help locate a non-802.11 interference source. Max hold and min hold are features that show the maximum and minimum RF power levels over time, respectively. Location filter is a feature that filters out signals that are not from a specific location or area.Reference:[Wireless Analysis Professional Study Guide CWAP-404], Chapter 3: Spectrum Analysis, page 77-78

Total 60 questions
Go to page: of 6