ExamGecko
Home / CWNP / CWNA-109 / List of questions
Ask Question

CWNP CWNA-109 Practice Test - Questions Answers, Page 7

Add to Whishlist

List of questions

Question 61

Report Export Collapse

What primary metric of scanning can stations use to select the best AP for connectivity to the desired BSS?

Signal strength of AP beacons received.
Signal strength of AP beacons received.
PING latency when testing against an Internet server.
PING latency when testing against an Internet server.
Throughput speed in Mbps.
Throughput speed in Mbps.
FCS errors in frames transmitted to and from the AP.
FCS errors in frames transmitted to and from the AP.
Suggested answer: A
Explanation:

When a station scans for available wireless networks, it listens for beacon frames sent by APs. A beacon frame contains information about the BSS, such as SSID, supported rates, channel, security, etc. The station also measures the signal strength of the beacon frames, which indicates how well the station can communicate with the AP. The signal strength is usually expressed in dBm or RSSI units. The higher the signal strength, the better the connection quality and performance.Therefore, the station can use the signal strength of AP beacons as the primary metric to select the best AP for connectivity to the desired BSS12.Reference:CWNA-109 Study Guide, Chapter 6: Wireless LAN Devices and Topologies, page 249;CWNA-109 Study Guide, Chapter 6: Wireless LAN Devices and Topologies, page 243.

asked 16/09/2024
Ali Reza Farahnak
55 questions

Question 62

Report Export Collapse

Your consulting firm has recently been hired to complete a site survey for a company desiring an indoor coverage WI-AN. Your engineers use predictive design software for the task, but the company insists on a pre-design site visit.

What task should be performed as part of the pre-design visit to prepare for a predictive design?

Install at least one AP on each side of the exterior walls to test for co-channel interference through these walls
Install at least one AP on each side of the exterior walls to test for co-channel interference through these walls
Collect information about the company's security requirements and the current configuration of their RADIUS and user database servers
Collect information about the company's security requirements and the current configuration of their RADIUS and user database servers
Test several antenna types connected to the intended APS for use in the eventual deployment
Test several antenna types connected to the intended APS for use in the eventual deployment
Evaluate the building materials at the facility and confirm that the floor plan documents are consistent with the actual building
Evaluate the building materials at the facility and confirm that the floor plan documents are consistent with the actual building
Suggested answer: D
Explanation:

A pre-design site visit in preparation for a predictive wireless LAN design is essential for gathering physical and environmental data about the site. The key tasks to be performed during such a visit include:

Evaluating Building Materials: Different materials (concrete, glass, wood, etc.) have varying effects on RF signal propagation. Understanding the materials present helps in accurately predicting how signals will behave within the environment.

Floor Plan Verification: Ensuring that the floor plan documents are an accurate representation of the actual building layout is crucial. Discrepancies between the floor plans and the physical layout can lead to inaccuracies in the predictive design.

The other options, while potentially valuable in other contexts, are not directly related to preparing for a predictive design:

Installing APs (option A) for testing co-channel interference is more aligned with an active site survey rather than a pre-design visit for a predictive design.

Collecting information about security requirements (option B) is important but is not directly related to the physical aspects of the site that would impact a predictive design.

Testing antenna types (option C) would typically be part of an active site survey or the actual deployment phase, not a pre-design visit for predictive modeling.

Therefore, option D is the correct answer, focusing on evaluating physical aspects crucial for accurate predictive modeling.

CWNA Certified Wireless Network Administrator Official Study Guide: Exam CWNA-109, by David D. Coleman and David

A . Westcott.

Best practices for conducting pre-design site visits in wireless network planning.

asked 16/09/2024
Ian Wilson
51 questions

Question 63

Report Export Collapse

What feature of 802.1 lax (HE) may impact design decisions related to AP placement and the spacing between same-channel BSS cells (3SAs) because it is designed to reduce overlapping BSS contention?

TWT
TWT
BSS Color
BSS Color
uplink MU-MIMO
uplink MU-MIMO
6 GHz band support
6 GHz band support
Suggested answer: B
Explanation:

In the 802.11ax (High Efficiency, HE) amendment, one of the key features introduced is BSS (Basic Service Set) Coloring. This feature is designed to mitigate issues arising from overlapping BSSs (OBSS), which can lead to contention and interference in dense wireless environments. BSS Coloring works by:

Assigning a 'color' (a small number) to each BSS: This helps devices differentiate between frames from their own BSS and those from neighboring BSSs.

Reducing Inter-BSS Interference: Devices can ignore frames from different BSSs (with a different 'color') under certain conditions, reducing the impact of OBSS interference.

Improving Spatial Reuse: By distinguishing between transmissions from different BSSs, devices can make more informed decisions about when to transmit, improving the efficiency of spatial reuse and reducing unnecessary contention.

This feature directly impacts design decisions related to AP placement and the spacing between same-channel BSS cells, as it allows for closer placement of APs on the same channel without significantly increasing interference, thus improving overall network capacity and efficiency.

The other options, while features of 802.11ax, do not directly pertain to reducing overlapping BSS contention in the same manner:

TWT (Target Wake Time) optimizes device sleep schedules to conserve power.

Uplink MU-MIMO enhances uplink data transmission capabilities but doesn't specifically address OBSS contention.

6 GHz Band Support introduces new spectrum for Wi-Fi use but is not a feature aimed at reducing OBSS contention within the 802.11ax framework.

Therefore, the correct answer is B, BSS Color.

IEEE 802.11ax-2021: Enhancements for High Efficiency WLAN.

CWNA Certified Wireless Network Administrator Official Study Guide: Exam CWNA-109, by David D. Coleman and David A. Westcott.

asked 16/09/2024
Adam Burdett
40 questions

Question 64

Report Export Collapse

You are attempting to locate the cause of a performance problem in two WLAN cells in a mostly overlapping coverage are a. You note that one AP is on channel 1 and the other is on channel 2. When you document your findings, what term do you use to describe the problem in this configuration?

CCC
CCC
Non-Wi-Fi interference
Non-Wi-Fi interference
CCI
CCI
ACI
ACI
Suggested answer: C
Explanation:

The term used to describe the problem in this configuration is Co-Channel Interference (CCI)1.CCI occurs when multiple access points are on the same or overlapping channels, causing interference and degradation in network performance1.In this case, one AP is on channel 1 and the other is on channel 2, which are overlapping channels, leading to CCI1.

asked 16/09/2024
Vimal Varughese
46 questions

Question 65

Report Export Collapse

The center frequency of channel 1 in the 2.4 GHz band is 2.412 GHz (2412 MHz). What is the center frequency of channel 4?

2.427
2.427
2.422
2.422
2.413
2.413
2.417
2.417
Suggested answer: A
Explanation:

The center frequency of channel 4 in the 2.4 GHz band is 2.427 GHz (2427 MHz). The center frequency of a channel is the midpoint of its frequency range, where the signal strength is highest and most concentrated. The center frequency of channel 1 in the 2.4 GHz band is 2.412 GHz (2412 MHz), as given in the question. The center frequency of each subsequent channel is obtained by adding 5 MHz to the previous channel's center frequency, since the channels are spaced 5 MHz apart from each other in this band. Therefore, to find the center frequency of channel 4, we need to add 15 MHz (5 MHz x 3) to the center frequency of channel 1:

2.412 GHz + 0.015 GHz =2.427 GHz

Alternatively, we can use a formula to calculate the center frequency of any channel in the 2.4 GHz band:

Center frequency (GHz) =2.407 + (0.005 x Channel number)

Using this formula for channel 4, we get:

Center frequency (GHz) =2.407 + (0.005 x 4)

Center frequency (GHz) =2.407 + 0.02

Center frequency (GHz) =2.427Reference:1, Chapter 3, page 85;2, Section 3.2

asked 16/09/2024
David Romano
33 questions

Question 66

Report Export Collapse

You are the network administrator for ABC Company. Your manager has recently attended a wireless security seminar. The seminar speaker taught that a wireless network could be hidden from potential intruders if you disabled the broadcasting of the SSID in Beacons and configured the access points not to respond to Probe Request frames that have a null SSID field.

Your manager suggests implementing these security practices. What response should you give to this suggestion?

Any 802.11 protocol analyzer can see the SSID in clear text in frames other than Beacons frames. This negates any security benefit of trying to hide the SSID in Beacons and Probe Response frames.
Any 802.11 protocol analyzer can see the SSID in clear text in frames other than Beacons frames. This negates any security benefit of trying to hide the SSID in Beacons and Probe Response frames.
To improve security by hiding the SSID, the AP and client stations must both be configured to remove the SSID from association request and response frames. Most WLAN products support this.
To improve security by hiding the SSID, the AP and client stations must both be configured to remove the SSID from association request and response frames. Most WLAN products support this.
Any tenants in the same building using advanced penetration testing tools will be able to obtain the SSID by exploiting WPA EAPOL-Key exchanges. This poses an additional risk of exposing the WPA key.
Any tenants in the same building using advanced penetration testing tools will be able to obtain the SSID by exploiting WPA EAPOL-Key exchanges. This poses an additional risk of exposing the WPA key.
This security practice prevents manufacturers' client utilities from detecting the SSID. As a result, the SSID cannot be obtained by attackers, except through social engineering, guessing, or use of a WIPS.
This security practice prevents manufacturers' client utilities from detecting the SSID. As a result, the SSID cannot be obtained by attackers, except through social engineering, guessing, or use of a WIPS.
Suggested answer: A
Explanation:

The response that you should give to your manager's suggestion of implementing the security practices of disabling the broadcasting of the SSID in Beacons and configuring the access points not to respond to Probe Request frames that have a null SSID field is that any 802.11 protocol analyzer can see the SSID in clear text in frames other than Beacons frames. This negates any security benefit of trying to hide the SSID in Beacons and Probe Response frames. The SSID (Service Set Identifier) is a human-readable name that identifies a WLAN and allows users to connect to it. The SSID is transmitted in clear text in several types of 802.11 frames, such as Beacon frames, Probe Request frames, Probe Response frames, Association Request frames, Association Response frames, Reassociation Request frames, and Reassociation Response frames. Some people may think that hiding the SSID can improve the security of the WLAN by making it invisible to potential intruders. However, this is not true, as hiding the SSID only removes it from Beacon frames and Probe Response frames that have a null SSID field. The SSID is still present in other types of frames that can be easily captured and analyzed by any 802.11 protocol analyzer or wireless scanner tool.Therefore, hiding the SSID does not provide any real security benefit and may even cause some compatibility and performance issues for legitimate users.Reference:1, Chapter 4, page 133;2, Section 4.1

asked 16/09/2024
Tshimangadzo Mbulawa
41 questions

Question 67

Report Export Collapse

What cipher suite is specified by the 802.11-2016 standard and is not deprecated?

Wired Equivalent Privacy
Wired Equivalent Privacy
Temporal Key Integrity Protocol
Temporal Key Integrity Protocol
Counter Mode with CBC-MAC Pro tocol
Counter Mode with CBC-MAC Pro tocol
Extensible Authentication Protocol
Extensible Authentication Protocol
Suggested answer: C
Explanation:

The cipher suite specified by the 802.11-2016 standard and is not deprecated isCounter Mode with CBC-MAC Protocol (CCMP). CCMP is an encryption protocol that usesAdvanced Encryption Standard (AES)as the underlying cipher and providesconfidentiality, integrity, and origin authenticationfor wireless data. CCMP is the mandatory encryption protocol forWPA2andWPA3.Reference:[CWNP Certified Wireless Network Administrator Official Study Guide: Exam CWNA-109], page 295; [IEEE Standard for Information technology--Telecommunications and information exchange between systems Local and metropolitan area networks--Specific requirements - Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications], page 1560.

asked 16/09/2024
Wendie Canez
42 questions

Question 68

Report Export Collapse

To ease user complexity, your company has implemented a single SSID for all employees. However, the network administrator needs a way to control the network resources that can be accessed by each employee based in their department.

What WLAN feature would allow the network administrator to accomplish this task?

RBAC
RBAC
WPA2
WPA2
WIPS
WIPS
SNMP
SNMP
Suggested answer: A
Explanation:

The WLAN feature that would allow the network administrator to control the network resources that can be accessed by each employee based on their department isRole-Based Access Control (RBAC). RBAC is a method of assigning different permissions and policies to users or groups based on their roles in the organization. RBAC can be implemented by usingVLANs,ACLs, orfirewallsto restrict access to certain network segments or resources. RBAC can also be integrated with802.1X/EAPauthentication to dynamically assign roles and VLANs to users based on their credentials.Reference:[CWNP Certified Wireless Network Administrator Official Study Guide: Exam CWNA-109], page 403; [Role-Based Access Control (RBAC) in Wireless Networks], page 1.

asked 16/09/2024
rene laas
56 questions

Question 69

Report Export Collapse

ABC Company is planning a point-to-multipoint outdoor bridge deployment with standalone (autonomous)

802.11 bridge units. 802.1X/EAP will be used for bridge authentication. A Linux-based RADIUS server will be used for authentication. What device in the bridge implementation acts as the 802.1X Authenticator?

The Ethernet switch
The Ethernet switch
The RADIUS server
The RADIUS server
All non-root bridges
All non-root bridges
The root bridge
The root bridge
Suggested answer: D
Explanation:

The device in the bridge implementation that acts as the 802.1X Authenticator is theroot bridge. The root bridge is the bridge that connects to the wired network and acts as the central point for all other bridges in the point-to-multipoint topology. The root bridge authenticates the non-root bridges using 802.1X/EAP and forwards their authentication requests to the RADIUS server. The non-root bridges act as the 802.1X Supplicants and use EAP methods such as EAP-TLS or EAP-PEAP to authenticate with the root bridge.Reference:[CWNP Certified Wireless Network Administrator Official Study Guide: Exam CWNA-109], page 459; [Cisco Aironet Wireless Bridges FAQ], question 29.

asked 16/09/2024
Vasco Ricardo Ribeiro
32 questions

Question 70

Report Export Collapse

You are managing a wireless access point in autonomous mode using the Web based interface. You capture traffic during this management task and notice that you can see the HTML code of the Web pages used for access point management. What error in administration could be the cause of this security concern?

IPsec is not in use of the management connection as recommended
IPsec is not in use of the management connection as recommended
A VPN with the AP is not established
A VPN with the AP is not established
WPA2 is disabled on the WLAN
WPA2 is disabled on the WLAN
HTTP is in use instead of HTTPS
HTTP is in use instead of HTTPS
Suggested answer: D
Explanation:

The error in administration that could be the cause of this security concern is thatHTTP is in use instead of HTTPS. HTTP is an unencrypted protocol that transfers data in plain text over the network. This means that anyone who captures the traffic can see the HTML code of the Web pages used for access point management, as well as any sensitive information such as passwords or configuration settings. HTTPS is an encrypted protocol that uses SSL/TLS to secure the data transmission between the Web browser and the Web server. HTTPS prevents anyone from snooping on or tampering with the Web traffic. Therefore, HTTPS should always be used for Web based management of wireless access points, especially in autonomous mode where there is no centralized controller to enforce security policies.Reference:[CWNP Certified Wireless Network Administrator Official Study Guide: Exam CWNA-109], page 431; [HTTP vs HTTPS: What's The Difference And Why Should You Care?].

asked 16/09/2024
BRUNO DE BRIDA
41 questions
Total 122 questions
Go to page: of 13
Search

Related questions