ExamGecko
Home Home / CWNP / CWNA-109

CWNP CWNA-109 Practice Test - Questions Answers, Page 7

Question list
Search
Search

List of questions

Search

Related questions











What primary metric of scanning can stations use to select the best AP for connectivity to the desired BSS?

A.
Signal strength of AP beacons received.
A.
Signal strength of AP beacons received.
Answers
B.
PING latency when testing against an Internet server.
B.
PING latency when testing against an Internet server.
Answers
C.
Throughput speed in Mbps.
C.
Throughput speed in Mbps.
Answers
D.
FCS errors in frames transmitted to and from the AP.
D.
FCS errors in frames transmitted to and from the AP.
Answers
Suggested answer: A

Explanation:

When a station scans for available wireless networks, it listens for beacon frames sent by APs. A beacon frame contains information about the BSS, such as SSID, supported rates, channel, security, etc. The station also measures the signal strength of the beacon frames, which indicates how well the station can communicate with the AP. The signal strength is usually expressed in dBm or RSSI units. The higher the signal strength, the better the connection quality and performance.Therefore, the station can use the signal strength of AP beacons as the primary metric to select the best AP for connectivity to the desired BSS12.Reference:CWNA-109 Study Guide, Chapter 6: Wireless LAN Devices and Topologies, page 249;CWNA-109 Study Guide, Chapter 6: Wireless LAN Devices and Topologies, page 243.

Your consulting firm has recently been hired to complete a site survey for a company desiring an indoor coverage WI-AN. Your engineers use predictive design software for the task, but the company insists on a pre-design site visit.

What task should be performed as part of the pre-design visit to prepare for a predictive design?

A.
Install at least one AP on each side of the exterior walls to test for co-channel interference through these walls
A.
Install at least one AP on each side of the exterior walls to test for co-channel interference through these walls
Answers
B.
Collect information about the company's security requirements and the current configuration of their RADIUS and user database servers
B.
Collect information about the company's security requirements and the current configuration of their RADIUS and user database servers
Answers
C.
Test several antenna types connected to the intended APS for use in the eventual deployment
C.
Test several antenna types connected to the intended APS for use in the eventual deployment
Answers
D.
Evaluate the building materials at the facility and confirm that the floor plan documents are consistent with the actual building
D.
Evaluate the building materials at the facility and confirm that the floor plan documents are consistent with the actual building
Answers
Suggested answer: D

Explanation:

A pre-design site visit in preparation for a predictive wireless LAN design is essential for gathering physical and environmental data about the site. The key tasks to be performed during such a visit include:

Evaluating Building Materials: Different materials (concrete, glass, wood, etc.) have varying effects on RF signal propagation. Understanding the materials present helps in accurately predicting how signals will behave within the environment.

Floor Plan Verification: Ensuring that the floor plan documents are an accurate representation of the actual building layout is crucial. Discrepancies between the floor plans and the physical layout can lead to inaccuracies in the predictive design.

The other options, while potentially valuable in other contexts, are not directly related to preparing for a predictive design:

Installing APs (option A) for testing co-channel interference is more aligned with an active site survey rather than a pre-design visit for a predictive design.

Collecting information about security requirements (option B) is important but is not directly related to the physical aspects of the site that would impact a predictive design.

Testing antenna types (option C) would typically be part of an active site survey or the actual deployment phase, not a pre-design visit for predictive modeling.

Therefore, option D is the correct answer, focusing on evaluating physical aspects crucial for accurate predictive modeling.

CWNA Certified Wireless Network Administrator Official Study Guide: Exam CWNA-109, by David D. Coleman and David

A . Westcott.

Best practices for conducting pre-design site visits in wireless network planning.

What feature of 802.1 lax (HE) may impact design decisions related to AP placement and the spacing between same-channel BSS cells (3SAs) because it is designed to reduce overlapping BSS contention?

A.
TWT
A.
TWT
Answers
B.
BSS Color
B.
BSS Color
Answers
C.
uplink MU-MIMO
C.
uplink MU-MIMO
Answers
D.
6 GHz band support
D.
6 GHz band support
Answers
Suggested answer: B

Explanation:

In the 802.11ax (High Efficiency, HE) amendment, one of the key features introduced is BSS (Basic Service Set) Coloring. This feature is designed to mitigate issues arising from overlapping BSSs (OBSS), which can lead to contention and interference in dense wireless environments. BSS Coloring works by:

Assigning a 'color' (a small number) to each BSS: This helps devices differentiate between frames from their own BSS and those from neighboring BSSs.

Reducing Inter-BSS Interference: Devices can ignore frames from different BSSs (with a different 'color') under certain conditions, reducing the impact of OBSS interference.

Improving Spatial Reuse: By distinguishing between transmissions from different BSSs, devices can make more informed decisions about when to transmit, improving the efficiency of spatial reuse and reducing unnecessary contention.

This feature directly impacts design decisions related to AP placement and the spacing between same-channel BSS cells, as it allows for closer placement of APs on the same channel without significantly increasing interference, thus improving overall network capacity and efficiency.

The other options, while features of 802.11ax, do not directly pertain to reducing overlapping BSS contention in the same manner:

TWT (Target Wake Time) optimizes device sleep schedules to conserve power.

Uplink MU-MIMO enhances uplink data transmission capabilities but doesn't specifically address OBSS contention.

6 GHz Band Support introduces new spectrum for Wi-Fi use but is not a feature aimed at reducing OBSS contention within the 802.11ax framework.

Therefore, the correct answer is B, BSS Color.

IEEE 802.11ax-2021: Enhancements for High Efficiency WLAN.

CWNA Certified Wireless Network Administrator Official Study Guide: Exam CWNA-109, by David D. Coleman and David A. Westcott.

You are attempting to locate the cause of a performance problem in two WLAN cells in a mostly overlapping coverage are a. You note that one AP is on channel 1 and the other is on channel 2. When you document your findings, what term do you use to describe the problem in this configuration?

A.
CCC
A.
CCC
Answers
B.
Non-Wi-Fi interference
B.
Non-Wi-Fi interference
Answers
C.
CCI
C.
CCI
Answers
D.
ACI
D.
ACI
Answers
Suggested answer: C

Explanation:

The term used to describe the problem in this configuration is Co-Channel Interference (CCI)1.CCI occurs when multiple access points are on the same or overlapping channels, causing interference and degradation in network performance1.In this case, one AP is on channel 1 and the other is on channel 2, which are overlapping channels, leading to CCI1.

The center frequency of channel 1 in the 2.4 GHz band is 2.412 GHz (2412 MHz). What is the center frequency of channel 4?

A.
2.427
A.
2.427
Answers
B.
2.422
B.
2.422
Answers
C.
2.413
C.
2.413
Answers
D.
2.417
D.
2.417
Answers
Suggested answer: A

Explanation:

The center frequency of channel 4 in the 2.4 GHz band is 2.427 GHz (2427 MHz). The center frequency of a channel is the midpoint of its frequency range, where the signal strength is highest and most concentrated. The center frequency of channel 1 in the 2.4 GHz band is 2.412 GHz (2412 MHz), as given in the question. The center frequency of each subsequent channel is obtained by adding 5 MHz to the previous channel's center frequency, since the channels are spaced 5 MHz apart from each other in this band. Therefore, to find the center frequency of channel 4, we need to add 15 MHz (5 MHz x 3) to the center frequency of channel 1:

2.412 GHz + 0.015 GHz =2.427 GHz

Alternatively, we can use a formula to calculate the center frequency of any channel in the 2.4 GHz band:

Center frequency (GHz) =2.407 + (0.005 x Channel number)

Using this formula for channel 4, we get:

Center frequency (GHz) =2.407 + (0.005 x 4)

Center frequency (GHz) =2.407 + 0.02

Center frequency (GHz) =2.427Reference:1, Chapter 3, page 85;2, Section 3.2

You are the network administrator for ABC Company. Your manager has recently attended a wireless security seminar. The seminar speaker taught that a wireless network could be hidden from potential intruders if you disabled the broadcasting of the SSID in Beacons and configured the access points not to respond to Probe Request frames that have a null SSID field.

Your manager suggests implementing these security practices. What response should you give to this suggestion?

A.
Any 802.11 protocol analyzer can see the SSID in clear text in frames other than Beacons frames. This negates any security benefit of trying to hide the SSID in Beacons and Probe Response frames.
A.
Any 802.11 protocol analyzer can see the SSID in clear text in frames other than Beacons frames. This negates any security benefit of trying to hide the SSID in Beacons and Probe Response frames.
Answers
B.
To improve security by hiding the SSID, the AP and client stations must both be configured to remove the SSID from association request and response frames. Most WLAN products support this.
B.
To improve security by hiding the SSID, the AP and client stations must both be configured to remove the SSID from association request and response frames. Most WLAN products support this.
Answers
C.
Any tenants in the same building using advanced penetration testing tools will be able to obtain the SSID by exploiting WPA EAPOL-Key exchanges. This poses an additional risk of exposing the WPA key.
C.
Any tenants in the same building using advanced penetration testing tools will be able to obtain the SSID by exploiting WPA EAPOL-Key exchanges. This poses an additional risk of exposing the WPA key.
Answers
D.
This security practice prevents manufacturers' client utilities from detecting the SSID. As a result, the SSID cannot be obtained by attackers, except through social engineering, guessing, or use of a WIPS.
D.
This security practice prevents manufacturers' client utilities from detecting the SSID. As a result, the SSID cannot be obtained by attackers, except through social engineering, guessing, or use of a WIPS.
Answers
Suggested answer: A

Explanation:

The response that you should give to your manager's suggestion of implementing the security practices of disabling the broadcasting of the SSID in Beacons and configuring the access points not to respond to Probe Request frames that have a null SSID field is that any 802.11 protocol analyzer can see the SSID in clear text in frames other than Beacons frames. This negates any security benefit of trying to hide the SSID in Beacons and Probe Response frames. The SSID (Service Set Identifier) is a human-readable name that identifies a WLAN and allows users to connect to it. The SSID is transmitted in clear text in several types of 802.11 frames, such as Beacon frames, Probe Request frames, Probe Response frames, Association Request frames, Association Response frames, Reassociation Request frames, and Reassociation Response frames. Some people may think that hiding the SSID can improve the security of the WLAN by making it invisible to potential intruders. However, this is not true, as hiding the SSID only removes it from Beacon frames and Probe Response frames that have a null SSID field. The SSID is still present in other types of frames that can be easily captured and analyzed by any 802.11 protocol analyzer or wireless scanner tool.Therefore, hiding the SSID does not provide any real security benefit and may even cause some compatibility and performance issues for legitimate users.Reference:1, Chapter 4, page 133;2, Section 4.1

What cipher suite is specified by the 802.11-2016 standard and is not deprecated?

A.
Wired Equivalent Privacy
A.
Wired Equivalent Privacy
Answers
B.
Temporal Key Integrity Protocol
B.
Temporal Key Integrity Protocol
Answers
C.
Counter Mode with CBC-MAC Pro tocol
C.
Counter Mode with CBC-MAC Pro tocol
Answers
D.
Extensible Authentication Protocol
D.
Extensible Authentication Protocol
Answers
Suggested answer: C

Explanation:

The cipher suite specified by the 802.11-2016 standard and is not deprecated isCounter Mode with CBC-MAC Protocol (CCMP). CCMP is an encryption protocol that usesAdvanced Encryption Standard (AES)as the underlying cipher and providesconfidentiality, integrity, and origin authenticationfor wireless data. CCMP is the mandatory encryption protocol forWPA2andWPA3.Reference:[CWNP Certified Wireless Network Administrator Official Study Guide: Exam CWNA-109], page 295; [IEEE Standard for Information technology--Telecommunications and information exchange between systems Local and metropolitan area networks--Specific requirements - Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications], page 1560.

To ease user complexity, your company has implemented a single SSID for all employees. However, the network administrator needs a way to control the network resources that can be accessed by each employee based in their department.

What WLAN feature would allow the network administrator to accomplish this task?

A.
RBAC
A.
RBAC
Answers
B.
WPA2
B.
WPA2
Answers
C.
WIPS
C.
WIPS
Answers
D.
SNMP
D.
SNMP
Answers
Suggested answer: A

Explanation:

The WLAN feature that would allow the network administrator to control the network resources that can be accessed by each employee based on their department isRole-Based Access Control (RBAC). RBAC is a method of assigning different permissions and policies to users or groups based on their roles in the organization. RBAC can be implemented by usingVLANs,ACLs, orfirewallsto restrict access to certain network segments or resources. RBAC can also be integrated with802.1X/EAPauthentication to dynamically assign roles and VLANs to users based on their credentials.Reference:[CWNP Certified Wireless Network Administrator Official Study Guide: Exam CWNA-109], page 403; [Role-Based Access Control (RBAC) in Wireless Networks], page 1.

ABC Company is planning a point-to-multipoint outdoor bridge deployment with standalone (autonomous)

802.11 bridge units. 802.1X/EAP will be used for bridge authentication. A Linux-based RADIUS server will be used for authentication. What device in the bridge implementation acts as the 802.1X Authenticator?

A.
The Ethernet switch
A.
The Ethernet switch
Answers
B.
The RADIUS server
B.
The RADIUS server
Answers
C.
All non-root bridges
C.
All non-root bridges
Answers
D.
The root bridge
D.
The root bridge
Answers
Suggested answer: D

Explanation:

The device in the bridge implementation that acts as the 802.1X Authenticator is theroot bridge. The root bridge is the bridge that connects to the wired network and acts as the central point for all other bridges in the point-to-multipoint topology. The root bridge authenticates the non-root bridges using 802.1X/EAP and forwards their authentication requests to the RADIUS server. The non-root bridges act as the 802.1X Supplicants and use EAP methods such as EAP-TLS or EAP-PEAP to authenticate with the root bridge.Reference:[CWNP Certified Wireless Network Administrator Official Study Guide: Exam CWNA-109], page 459; [Cisco Aironet Wireless Bridges FAQ], question 29.

You are managing a wireless access point in autonomous mode using the Web based interface. You capture traffic during this management task and notice that you can see the HTML code of the Web pages used for access point management. What error in administration could be the cause of this security concern?

A.
IPsec is not in use of the management connection as recommended
A.
IPsec is not in use of the management connection as recommended
Answers
B.
A VPN with the AP is not established
B.
A VPN with the AP is not established
Answers
C.
WPA2 is disabled on the WLAN
C.
WPA2 is disabled on the WLAN
Answers
D.
HTTP is in use instead of HTTPS
D.
HTTP is in use instead of HTTPS
Answers
Suggested answer: D

Explanation:

The error in administration that could be the cause of this security concern is thatHTTP is in use instead of HTTPS. HTTP is an unencrypted protocol that transfers data in plain text over the network. This means that anyone who captures the traffic can see the HTML code of the Web pages used for access point management, as well as any sensitive information such as passwords or configuration settings. HTTPS is an encrypted protocol that uses SSL/TLS to secure the data transmission between the Web browser and the Web server. HTTPS prevents anyone from snooping on or tampering with the Web traffic. Therefore, HTTPS should always be used for Web based management of wireless access points, especially in autonomous mode where there is no centralized controller to enforce security policies.Reference:[CWNP Certified Wireless Network Administrator Official Study Guide: Exam CWNA-109], page 431; [HTTP vs HTTPS: What's The Difference And Why Should You Care?].

Total 122 questions
Go to page: of 13