ExamGecko
Home Home / CWNP / CWNA-109

CWNP CWNA-109 Practice Test - Questions Answers, Page 9

Question list
Search
Search

List of questions

Search

Related questions











What statement about 802.11 WLAN performance is true?

A.
In modem networks, both centralized and distributed data forwarding work well for most standard office deployments
A.
In modem networks, both centralized and distributed data forwarding work well for most standard office deployments
Answers
B.
In most WLANs, no special skill or tuning is required to get peak performance
B.
In most WLANs, no special skill or tuning is required to get peak performance
Answers
C.
WLANs perform better as more wireless clients connect with each AP
C.
WLANs perform better as more wireless clients connect with each AP
Answers
D.
To get the best performance out of an AP, you should disable data rates of 72 Mbps and lower
D.
To get the best performance out of an AP, you should disable data rates of 72 Mbps and lower
Answers
Suggested answer: A

Explanation:

The statement that in modern networks, both centralized and distributed data forwarding work well for most standard office deployments is true about WLAN performance. Data forwarding refers to how wireless frames are transmitted from wireless clients to wired networks or vice versa through wireless access points (APs). Centralized data forwarding means that all wireless frames are sent to a central controller or gateway before being forwarded to their destinations. Distributed data forwarding means that wireless frames are forwarded directly by the APs to their destinations without going through a central controller or gateway. Both methods have their advantages and disadvantages, depending on the network size, topology, traffic pattern, security, and management requirements. However, in modern networks, both methods can achieve high performance and scalability for most standard office deployments, as they can leverage advanced features such as fast roaming, load balancing, quality of service, and encryption. The other statements about WLAN performance are false. In most WLANs, special skill or tuning is required to get peak performance, such as selecting the appropriate channel, power, data rate, and antenna settings. WLANs perform worse as more wireless clients connect with each AP, as they cause more contention and interference on the wireless medium.To get the best performance out of an AP, you should not disable data rates of 72 Mbps and lower, as they are needed for backward compatibility and range extension.Reference:CWNA-109 Study Guide, Chapter 9: Wireless LAN Architecture, page 2811

What is an advantage of using WPA3-Personal instead of WPA2-Personal as a security solution for 802.11 networks?

A.
WPA3-Personal, also called WPA3-SAE, uses an authentication exchange and WPA2-Personal does not
A.
WPA3-Personal, also called WPA3-SAE, uses an authentication exchange and WPA2-Personal does not
Answers
B.
WPA3-Personal, also called WPA3-SAE, uses a stronger authentication exchange to better secure the network
B.
WPA3-Personal, also called WPA3-SAE, uses a stronger authentication exchange to better secure the network
Answers
C.
WPA3-Personal, also called WPA3-SAE, uses AES for encryption and WPA2-Personal does not
C.
WPA3-Personal, also called WPA3-SAE, uses AES for encryption and WPA2-Personal does not
Answers
D.
WPA3-Personal, also called WPA3-SAE, uses a better encryption algorithm than WPA2-Personal
D.
WPA3-Personal, also called WPA3-SAE, uses a better encryption algorithm than WPA2-Personal
Answers
Suggested answer: B

Explanation:

An advantage of using WPA3-Personal instead of WPA2-Personal as a security solution for 802.11 networks is thatWPA3-Personal, also called WPA3-SAE, uses a stronger authentication exchange to better secure the network. WPA3-Personal uses Simultaneous Authentication of Equals (SAE) as the key exchange protocol, which provides stronger protection against offline dictionary attacks and password guessing than WPA2-Personal. SAE uses a Diffie-Hellman key exchange with elliptic curve cryptography (ECC) to establish a pairwise master key (PMK) between the AP and the client without revealing it to any eavesdropper. SAE also provides forward secrecy, which means that if one PMK is compromised, it does not affect the security of other PMKs. WPA2-Personal uses Pre-Shared Key (PSK) as the key exchange protocol, which is vulnerable to offline brute-force attacks if the passphrase is weak or leaked. Both WPA3-Personal and WPA2-Personal use AES for encryption, so there is no difference in that aspect. WPA3-Personal does not use a different encryption algorithm than WPA2-Personal, but rather a different key exchange protocol.Reference:[CWNP Certified Wireless Network Administrator Official Study Guide: Exam CWNA-109], page 307; [CWNA: Certified Wireless Network Administrator Official Study Guide: Exam CWNA-109], page 297.

What authentication method is referenced in the 802.11-2016 and 802.11-2020 specifications and is recommended for robust WI-AN client security?

A.
SSL
A.
SSL
Answers
B.
802.1X/EAP
B.
802.1X/EAP
Answers
C.
IPSec
C.
IPSec
Answers
D.
WEP
D.
WEP
Answers
Suggested answer: B

Explanation:

The authentication method that is referenced in the 802.11-2016 and 802.11-2020 specifications and is recommended for robust WLAN client security is802.1X/EAP. 802.1X/EAP stands for IEEE 802.1X Port-Based Network Access Control with Extensible Authentication Protocol and is a framework that provides strong authentication and dynamic encryption key generation for WLAN clients. 802.1X/EAP involves three parties: the supplicant (the client), the authenticator (the AP or the controller), and the authentication server (usually a RADIUS server). The supplicant sends its credentials (such as username and password, certificate, or token) to the authenticator, which forwards them to the authentication server. The authentication server verifies the credentials and sends a response to the authenticator, which grants or denies access to the supplicant. The authentication server also generates a master key that is used to derive encryption keys for the data frames between the supplicant and the authenticator. 802.1X/EAP supports various EAP methods that offer different levels of security and flexibility, such as EAP-TLS, EAP-PEAP, EAP-TTLS, EAP-FAST, and EAP-SIM. SSL, IPSec, and WEP are not authentication methods, but rather encryption or security protocols that are not specific to WLANs or referenced in the 802.11 specifications.Reference:[CWNP Certified Wireless Network Administrator Official Study Guide: Exam CWNA-109], page 299; [CWNA: Certified Wireless Network Administrator Official Study Guide: Exam CWNA-109], page 289.

What security solution is required to be used in place of Open System Authentication for all open network 802.11 implementations in the 6 GHz band?

A.
OWE
A.
OWE
Answers
B.
Kerberos
B.
Kerberos
Answers
C.
WPA3-Enterprise
C.
WPA3-Enterprise
Answers
D.
WPA3-SAE
D.
WPA3-SAE
Answers
Suggested answer: A

What terms accurately complete the following sentence?

The IEEE 802.11-2016 standard specifies mandatory support of the _______________ cipher suite for Robust Security Network Associations, and optional use of the ________________ cipher suite, which is designed for use with pre-RSNA hardware and is deprecated.

A.
802.1X/EAP, WEP
A.
802.1X/EAP, WEP
Answers
B.
CCMP, TKIP
B.
CCMP, TKIP
Answers
C.
TLS, SSL
C.
TLS, SSL
Answers
D.
RC5, RC4
D.
RC5, RC4
Answers
Suggested answer: B

XYZ Company has decided to install an 802.11 WLAN system that will support 1083 wireless users, but they are concerned about network security. XYZ is interested in deploying standardized security features. In addition to WPA2-Enterprise with PEAP and role-based access control, XYZ would like to support management frame protection as well as a fast secure roaming protocol for future mobile handsets.

As XYZ Company selects a product to deploy, what two IEEE amendments, which are included in 802.11-2016, and 802.11-2020 should be supported to provide the management frame protection and fast secure roaming security features?

A.
802.11j and 802.11z
A.
802.11j and 802.11z
Answers
B.
802.11r and 802.11w
B.
802.11r and 802.11w
Answers
C.
802.11j and 802.11k
C.
802.11j and 802.11k
Answers
D.
802.11k and 802.11v
D.
802.11k and 802.11v
Answers
Suggested answer: B

Explanation:

The two IEEE amendments that should be supported to provide the management frame protection and fast secure roaming security features are 802.11r and 802.11w12.

802.11r (Fast BSS Transition): This amendment to the IEEE 802.11 standard permits continuous connectivity aboard wireless devices in motion, with fast and secure client transitions from one Basic Service Set to another1.

802.11w (Management Frame Protection): This amendment increases the security of its management frames2.

You are using a tool that allows you to see signal strength for all Aps in the area with a visual representation. It shows you SSIDs available and the security settings for each SSID. It allows you to filter by frequency band to see only 2.4 GHz networks or only 5 GHz networks. No additional features are available.

What kind of application is described?

A.
Protocol analyzer
A.
Protocol analyzer
Answers
B.
Site survey utility
B.
Site survey utility
Answers
C.
Spectrum analyzer
C.
Spectrum analyzer
Answers
D.
WLAN scanner tool
D.
WLAN scanner tool
Answers
Suggested answer: D

Explanation:

The tool described is a WLAN (Wireless Local Area Network) scanner tool. WLAN scanner tools are designed to provide information about the wireless networks in a given area, including:

Signal Strength: They show the signal strength of all access points (APs) in the vicinity, which is crucial for understanding the coverage area and potential interference.

SSID Visualization: These tools display the SSIDs (Service Set Identifiers) of available networks, allowing users to identify different wireless networks easily.

Security Settings Information: WLAN scanner tools often show the type of security implemented on each network, such as WPA2, WEP, etc.

Frequency Band Filtering: They allow users to filter and view networks based on the frequency band (2.4 GHz or 5 GHz), which is useful for analyzing network distribution and planning.

While protocol analyzers, site survey utilities, and spectrum analyzers are also used in wireless networking, their functions are distinct from what is described:

Protocol Analyzers are more sophisticated and are used to capture and analyze network traffic.

Site Survey Utilities are used to map signal coverage and plan network layouts, often with more advanced features for detailed site surveys.

Spectrum Analyzers provide a detailed view of the frequency spectrum and non-Wi-Fi interference but don't typically focus on SSIDs or security settings.

Thus, the correct answer is D, a WLAN scanner tool, based on the functionalities described.

CWNA Certified Wireless Network Administrator Official Study Guide: Exam PW0-105, by David D. Coleman and David A. Westcott.

Tools and techniques for wireless network analysis and troubleshooting.

You are attempting to explain RF shadow and how it can cause lack of coverage. What common building item frequently causes RF shadow and must be accounted for in coverage plans?

A.
Wooden doors
A.
Wooden doors
Answers
B.
Carpeted floors
B.
Carpeted floors
Answers
C.
Elevators
C.
Elevators
Answers
D.
Cubicle partitions
D.
Cubicle partitions
Answers
Suggested answer: C

Explanation:

Elevators are a common building item that frequently causes RF shadow and must be accounted for in coverage plans. RF shadow is a term that describes an area where wireless signals are blocked or significantly weakened by an obstacle or an object that absorbs or reflects RF energy. RF shadow can cause lack of coverage or poor performance in a WLAN because wireless devices in those areas may not be able to communicate with access points or other devices. RF shadow can be mitigated by adjusting access point placement, antenna orientation, transmit power level, or channel selection to avoid or overcome the obstacle or object that causes it. Elevators are a common building item that frequently causes RF shadow because they are made of metal and they move up and down within a shaft. Metal is a material that has high attenuation and reflection values, which means it can block or bounce off wireless signals very effectively. A moving elevator can create dynamic RF shadow that changes depending on its position and direction. Therefore, elevators must be accounted for in coverage plans to ensure adequate WLAN coverage and performance throughout the facility. The other options are not common building items that frequently cause RF shadow or must be accounted for in coverage plans. Wooden doors are not likely to cause RF shadow because they are made of wood, which is a material that has low attenuation and reflection values, which means it can pass through or slightly weaken wireless signals. Carpeted floors are not likely to cause RF shadow because they are made of fabric, which is a material that has low attenuation and reflection values, which means it can pass through or slightly weaken wireless signals. Cubicle partitions are not likely to cause RF shadow because they are made of thin plastic or cardboard, which are materials that have low attenuation and reflection values, which means they can pass through or slightly weaken wireless signals.Reference:CWNA-109 Study Guide, Chapter 13: Wireless LAN Site Surveys - Types & Processes , page 433

You administer a small WLAN with nine access point. As a small business, you do not rum a RADIUS server and use WPA2-Personal for security. Recently, you changed the passphrase for WPA2-personal in all Aps and clients. Several users are now reporting the inability to connect to the network at time and it is constrained to one area of the building. When using scanner, you see that the AP covering that area is online

A.
The AP that covers the problem area requires a firmware update
A.
The AP that covers the problem area requires a firmware update
Answers
B.
The clients are improperly configured
B.
The clients are improperly configured
Answers
C.
The AP that covers the problem area has failed
C.
The AP that covers the problem area has failed
Answers
D.
The AP that covers the problem area is improperly configured
D.
The AP that covers the problem area is improperly configured
Answers
Suggested answer: B

Explanation:

This is because the passphrase for WPA2-Personal is case-sensitive and must match exactly on both the AP and the client. If the passphrase is entered incorrectly on the client, the client will not be able to authenticate with the AP and connect to the network. The AP that covers the problem area is not likely to require a firmware update, fail, or be improperly configured, as it is online and works with other clients that have the correct passphrase. To troubleshoot this issue, you can check the passphrase settings on the clients and make sure they match with the AP. You can also try to reconnect the clients to the network or reboot them if necessary. For more information on how to configure WPA2-Personal on your router

You have implemented an 802.11ax WLAN for a customer. All APs are four stream HE APs. The customer states that it is essential that most of the clients can use the OFDMA modulation scheme. What do you tell the customer?

A.
The clients that must support OFDMA must also be upgraded to 802.11ax
A.
The clients that must support OFDMA must also be upgraded to 802.11ax
Answers
B.
OFDMA is an optional feature of 802.11ax and most APs don't even support it
B.
OFDMA is an optional feature of 802.11ax and most APs don't even support it
Answers
C.
All 5 GHz PHYs use OFDM modulation, so you will achieve OFDMA everywhere in 5 GHz
C.
All 5 GHz PHYs use OFDM modulation, so you will achieve OFDMA everywhere in 5 GHz
Answers
D.
If the devices support 802.11ac, they can be updated to support OFDMA through driver upgrades
D.
If the devices support 802.11ac, they can be updated to support OFDMA through driver upgrades
Answers
Suggested answer: A

Explanation:

OFDMA is a new modulation scheme introduced in 802.11ax that allows multiple users to share the same channel by dividing it into smaller subchannels called resource units (RUs). This improves the efficiency and capacity of the WLAN by reducing contention and overhead. However, to use OFDMA, both the AP and the client must support 802.11ax and negotiate the parameters of the subchannel allocation.Therefore, the customer needs to upgrade the clients that require OFDMA to 802.11ax devices12.

The other options are not correct because they do not reflect the reality of OFDMA.Option B is incorrect because OFDMA is a mandatory feature of 802.11ax for both downlink and uplink transmissions, and all 802.11ax APs must support it1. Option C is incorrect because OFDM and OFDMA are different modulation schemes, and OFDM does not allow multiple users to share the same channel.Option D is incorrect because 802.11ac devices cannot support OFDMA through driver upgrades, as they lack the hardware and firmware capabilities to do so2.

Total 122 questions
Go to page: of 13