Black Friday Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: clap70

CWNA-107 Certified Wireless Network Administrator Questions and Answers

Questions 4

You are attempting to locate the cause of a performance problem in two WLAN cells in a mostly overlapping coverage area. You note that one AP is on channel 1 and the other is on channel 2. When you document your findings, what term do you use to describe the problem in this configuration?

Options:

A.

Bluetooth interference

B.

Non-Wi-Fi interference

C.

CCI

D.

ACI

Buy Now
Questions 5

Which IEEE 802.11 physical layer (PHY) specification includes support for and compatibility with both ERP and HR/DSSS?

Options:

A.

VHT (802.11ac)

B.

OFDM (802.11a)

C.

DSSS (802.11-Prime)

D.

HT (802.11n)

Buy Now
Questions 6

You are attempting to locate the cause of a performance problem in two WLAN cells in a mostly overlapping coverage area. You note that one AP is on channel 1 and the other is on channel 2. When you document your findings, what term do you use to describe the problem in this configuration?

Options:

A.

Bluetooth interference

B.

Non-Wi-Fi interference

C.

CCI

D.

ACI

Buy Now
Questions 7

You are evaluating a connection that states the data rate is 150 Mbps. What is the expected throughput of this connection?

Options:

A.

Less than 150 Mbps because of 802.11 overhead and contention

B.

54 Mbps because that is the actual maximum throughput of an 802.11 connection

C.

More than 150 Mbps because of compression

D.

150 Mbps because the data rate is equal to the throughput

Buy Now
Questions 8

What is an advantage of using WPA2-Personal instead of WEP-128 as a security solution for 802.11 networks?

Options:

A.

WPA2-Personal uses CCMP for encryption, and WEP-128 uses TKIP for encryption

B.

WPA2-Personal uses dynamic encryption keys, and WEP-128 uses static keys

C.

WPA2-Personal uses 802.1X/EAP for authentication, and WEP-128 uses preshared keys

D.

WPA2-Personal is based on IEEE 802.11 industry standards, but WEP is not

Buy Now
Questions 9

Which one of the following is not a factor considered when calculating the Link Budget for an outdoor point-to-point WLAN bridge link?

Options:

A.

MU-MIMO capabilities of the bridges

B.

Receive antenna gain

C.

Transmit power

D.

Operating frequency

Buy Now
Questions 10

A string of characters and digits is entered into an AP and a client STA for WPA2 security. The string is 8 characters long. What is this string called?

Options:

A.

MSK

B.

WEP key

C.

Passphrase

D.

PSK

Buy Now
Questions 11

What non-standard WLAN solution attempts to give a longer transmission windows to devices with higher data rates then devise with lower data rates?

Options:

A.

AirTime Fairness

B.

Band Steering

C.

ARM

D.

RRM

Buy Now
Questions 12

XYZ Company has decided to install an 802.11 WLAN system that will support 1000 wireless users, but they are concerned about network security. XYZ is interested in deploying standardized security features. In addition to WPA2-Enterprise with PEAP and role-based access control, XYZ would like to support management frame protection as well as a fast secure roaming protocol for future mobile handsets.

As XYZ Company selects a product to deploy, what two IEEE amendments, which are included in 802.11-2016, should be supported to provide the management frame protection and fast secure roaming security features?

Options:

A.

802.11j and 802.11k

B.

802.11r and 802.11k

C.

802.11z and 802.11w

D.

802.11r and 802.11w

Buy Now
Questions 13

What 802.11 PHY uses available space in very low frequency ranges that is not in use at the time by broadcast video signals?

Options:

A.

DMG

B.

SIG

C.

DSSS

D.

TVNT

Buy Now
Questions 14

What statement about 802.11 WLAN bridges is true?

Options:

A.

WLAN bridges only work in the 2.4 GHz frequency band and they support only SISO communications

B.

WLAN bridges must use a channel with acceptable SNR at both transceivers to maintain the desired data rate bi-directionally

C.

WLAN bridges may support MIMO communications, but only if used in the 5 GHz frequency band

D.

WLAN bridges must be implemented such that no interference occurs on the channel anywhere between the two endpoints used to establish the bridge

Buy Now
Questions 15

When a client station sends a broadcast probe request frame with a wildcard SSID, how do APs respond?

Options:

A.

For each probe request frame, only one AP may reply with a probe response.

B.

Each AP responds in turn after preparing a probe response and winning contention.

C.

Each AP checks with the DHCP server to see if it can respond and then acts accordingly.

D.

After waiting a SIFS, all APs reply at the same time with a probe response.

Buy Now
Questions 16

A string of characters and digits is entered into an AP a client STA for WPA2 security. The string is 8 characters long. What is this string called?

Options:

A.

MSK

B.

WEP key

C.

Passphrase

D.

PSK

Buy Now
Questions 17

An RF sigma sometimes bends as it passes through some material other than free space. What is the term that describes this behavior?

Options:

A.

Reflection

B.

Refraction

C.

Scattering

D.

Warping

Buy Now
Questions 18

You are troubleshooting a client problem with a 2.4 GHz WLAN connection. The client is experiencing surprisingly low data rates during the work day. You analyze the workspace outside of business hours and detect a strong signal with a typical noise floor at the client location. During working hours, the user works with a laptop in the area and uses an external USB hard drive for continuous data access. The user also states that the laptop works as expected on her home network. The user working approximately 8 feet away from this client experiences no problems.

Based on this information, what is the likely cause of the problem?

Options:

A.

The laptop has a failing wireless adapter

B.

the AP is overloaded during the work day

C.

The external hard drive is USB 3.0 and is causing a significant increase in the noise floor when in use

D.

The drives in the laptop are corrupt

Buy Now
Questions 19

ABC Company is planning a point-to-multipoint bridge deployment with standalone (autonomous) 802.11 bridge units. 802.1X/EAP will be used for bridge authentication. A Linux-based RADIUS server will be used for authentication. What device in the bridge implementation acts as the 802.11X Authenticator?

Options:

A.

All non-root bridges

B.

The root bridge

C.

The Ethernet switch

D.

The RADIUS server

Buy Now
Questions 20

In a mesh BSS (MBSS), according to the 802.11-2016 standard, what device connect the mesh to an Ethernet network?

Options:

A.

Mesh Gate

B.

Mesh Switch

C.

Mesh Router

D.

Mesh Portal

Buy Now
Questions 21

You manage a WLAN with 100 802.11ac access points. All access points are configured to use 80 MHz channels. In a particular BSS, only 40 MHz communications are seen. What is the likely cause of this behavior?

Options:

A.

The short guard interval is also enabled.

B.

The clients are all 802.11n STAs or lower

C.

The AP is improperly configured to use only 40 MHz of the 80 MHz allocated bandwidth

D.

All clients implement single spatial stream radios

Buy Now
Questions 22

Which one of the following 802.11 PHYs is more likely to be used in an industrial deployment but not likely to be used in standard office deployments?

Options:

A.

SIG

B.

VHT

C.

OFDM

D.

HT

Buy Now
Questions 23

You are deploying a WLAN monitoring solution that utilizes distributed sensor devices. Where should sensors be deployed for best results?

Options:

A.

Every 20 feet and alongside each AP

B.

Closer to the APs

C.

Closer to the client devices

D.

In critical areas where WLAN performance must be high

Buy Now
Exam Code: CWNA-107
Exam Name: Certified Wireless Network Administrator
Last Update: Nov 23, 2024
Questions: 156
CWNA-107 pdf

CWNA-107 PDF

$25.5  $84.99
CWNA-107 Engine

CWNA-107 Testing Engine

$30  $99.99
CWNA-107 PDF + Engine

CWNA-107 PDF + Testing Engine

$40.5  $134.99