Big Halloween Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: clap70

CWNA-109 Certified Wireless Network Administrator Questions and Answers

Questions 4

What is appended to the end of each 802.11 data frame after the payload?

Options:

A.

Preamble

B.

MAC header

C.

PHY header

D.

FCS

Buy Now
Questions 5

An RF signal sometimes bends as it passes through some material other than free space. What is the term that describes this behavior?

Options:

A.

Refraction

B.

Warping

C.

Scattering

D.

Reflection

Buy Now
Questions 6

You are reconfiguring an AP to use the short guard interval. How long will the new guard interval duration be after the change?

Options:

A.

800 ns

B.

400 ns

C.

104 ms

D.

10 ms

Buy Now
Questions 7

What is the final step in an effective troubleshooting process?

Options:

A.

Disable the WLAN

B.

Verify the solution

C.

Notify the users of problem resolution

D.

Document the results

Buy Now
Questions 8

An AP is advertised as a tri-band, 4x4:4, Wi-Fi 6, 802. 11ax AP. Based on this information and assuming it is correctly advertised, what can be determined as certainly true about this AP?

Options:

A.

It supports four channels in 2.4 GHz and 4 channels in 5 GHz

B.

It supports UL-MU-MIMO

C.

It uses a modified OpenWRT firmware

D.

It has 4 radio chains

Buy Now
Questions 9

You have implemented an 802.11ax WLAN for a customer. All APs are four stream HE APs. The customer states that it is essential that most of the clients can use the OFDMA modulation scheme. What do you tell the customer?

Options:

A.

The clients that must support OFDMA must also be upgraded to 802.11ax

B.

OFDMA is an optional feature of 802.11ax and most APs don't even support it

C.

All 5 GHz PHYs use OFDM modulation, so you will achieve OFDMA everywhere in 5 GHz

D.

If the devices support 802.11ac, they can be updated to support OFDMA through driver upgrades

Buy Now
Questions 10

Option 43 must be configured to allow access points to locate controllers. In what network service should this option be configured?

Options:

A.

DNS

B.

LDAP

C.

DHCP

D.

RADIUS

Buy Now
Questions 11

A WLAN transmitter that emits a 50 mW signal is connected to a cable with 3 dB loss. If the cable is connected to an antenna with 9dBi gain, what is the EIRP at the antenna element?

Options:

A.

26 dBm

B.

13 dBm

C.

23 dBm

D.

10 dBm

Buy Now
Questions 12

You are troubleshooting a WLAN problem and you suspect hidden node as the cause. What should you look for in a protocol analyzer?

Options:

A.

Frames with the retry bit set to 0

B.

Frames transmitted from the AP without acknowledgement

C.

Retransmitted frames from multiple STAs with higher retry counts than other STAs Frames with the HN bit set to 1

Buy Now
Questions 13

You are the network administrator for ABC Company. Your manager has recently attended a wireless security seminar. The seminar speaker taught that a wireless network could be hidden from potential intruders if you disabled the broadcasting of the SSID in Beacons and configured the access points not to respond to Probe Request frames that have a null SSID field.

Your manager suggests implementing these security practices. What response should you give to this suggestion?

Options:

A.

Any 802.11 protocol analyzer can see the SSID in clear text in frames other than Beacons frames. This negates any security benefit of trying to hide the SSID in Beacons and Probe Response frames.

B.

To improve security by hiding the SSID, the AP and client stations must both be configured to remove the SSID from association request and response frames. Most WLAN products support this.

C.

Any tenants in the same building using advanced penetration testing tools will be able to obtain the SSID by exploiting WPA EAPOL-Key exchanges. This poses an additional risk of exposing the WPA key.

D.

This security practice prevents manufacturers’ client utilities from detecting the SSID. As a result, the SSID cannot be obtained by attackers, except through social engineering, guessing, or use of a WIPS.

Buy Now
Questions 14

When a STA has authenticated to an AP (AP-1), but still maintains a connection with another AP (AP-2), what is the state of the STA on AP-1?

Options:

A.

Transitional

B.

Unauthenticated and Unassociated

C.

Authenticated and Unassociated

D.

Authenticated and Associated

Buy Now
Questions 15

A client complains of low data rates on his computer. When you evaluate the situation, you see that the signal strength is -84 dBm and the noise floor is -96 dBm. The client is an 802.11ac client and connects to an 802.11ac AP. Both the client and AP are 2x2:2 devices. What is the likely cause of the low data rate issue?

Options:

A.

Weak signal strength

B.

CAT5e cabling run to the AP

C.

Too few spatial streams

D.

Lack of support for 802.11n

Buy Now
Questions 16

What statement about 802.3, Clause 33 Power over Ethernet is true?

Options:

A.

When using CAT5 cabling, you increase the maximum draw available to the PD over that available with CAT6.

B.

Only endpoint PSEs are supported.

C.

Only midspan PSEs are supported.

D.

The lowest voltage drop is achieved when using CAT6 cable instead of Cat5 or CAT5e.

Buy Now
Questions 17

What ID is typically mapped to an AP’s MAC address if a single BSS is implemented?

Options:

A.

SSID

B.

Device ID

C.

VLAN ID

D.

BSSID

Buy Now
Questions 18

A dual-band 802.11ac AP must be powered by PoE. As a class 4 device, what power level should be received at the AP?

Options:

A.

30 W

B.

12.95 W

C.

25.5 W

D.

15.4 W

Buy Now
Questions 19

You administer a WLAN that offers a guest SSID of GUESTNWORK. Users connect to the GUESTNWORK SSID, but report that they cannot browse the Internet. The devices simply report no Internet connection. What common problem causes this scenario?

Options:

A.

NTP issues

B.

Hardware issues

C.

IP routing issues

D.

Captive portal issues

Buy Now
Questions 20

When an ACK frame is not received by the transmitting STA, what is assumed?

Options:

A.

The receiver processed the frame, but did not respond with an ACK frame because 802.11w is enabled

B.

The frame was correctly delivered

C.

The frame was not delivered and must be retransmitted

D.

The receiver is offline

Buy Now
Questions 21

You have received a report of poor wireless connections on the third floor of a building under your administration. Three individuals have reported the problem. Apparently, the connections are reporting a strong signal, but the users cannot access the Internet. With the problem identified, what is the next logical step in the troubleshooting process?

Options:

A.

Verify the solution

B.

Discover the scale of the problem

C.

Perform corrective actions

D.

Create a plan of action or escalate the problem

Buy Now
Questions 22

Three access points are used within a facility. One access point is on channel 11 and the other two are on channel 1. The two access points using channel 1 are on either side of the access point using channel 11 and sufficiently apart so that they do not interfere with each other when they transmit frames. Assuming no other APs are in the vicinity, is CCI still a possibility in this network and why?

Options:

A.

Yes, because the client devices connected to one of the channel 1 APs will transmit frames that reach the other channel 1 AP as well as clients connected to the other channel 1 AP.

B.

No, because the APs are far enough apart that no CCI will occur.

C.

No, because CCI only occurs in the 5 GHz frequency band.

D.

Yes, because channel 11 loops around and causes CCI with channel 1.

Buy Now
Questions 23

What security option for 802.11 networks supports SAE and requires protected management frames?

    WPA

Options:

A.

WPA2

B.

WPA3

C.

OWE

Buy Now
Questions 24

What is the most effective method for testing roaming in relation to 802.11 VoIP handsets?

Options:

A.

Use a spectrum analyzer to monitor RF activity during a VoIP call.

B.

Use a protocol analyzer to capture the traffic generated when a laptop roams.

C.

Place a call with the handset and move around the facility to test quality during roaming.

D.

Use the built-in roaming monitor built into all VoIP handsets.

Buy Now
Questions 25

You administer a small WLAN with nine access point. As a small business, you do not rum a RADIUS server and use WPA2-Personal for security. Recently, you changed the passphrase for WPA2-personal in all Aps and clients. Several users are now reporting the inability to connect to the network at time and it is constrained to one area of the building. When using scanner, you see that the AP covering that area is online

Options:

A.

The AP that covers the problem area requires a firmware update

B.

The clients are improperly configured

C.

The AP that covers the problem area has failed

D.

The AP that covers the problem area is improperly configured

Buy Now
Questions 26

ABC Company is planning a point-to-multipoint outdoor bridge deployment with standalone (autonomous)

802.11 bridge units. 802.1X/EAP will be used for bridge authentication. A Linux-based RADIUS server will be used for authentication. What device in the bridge implementation acts as the 802.1X Authenticator?

Options:

A.

The Ethernet switch

B.

The RADIUS server

C.

All non-root bridges

D.

The root bridge

Buy Now
Questions 27

You are installing an AP to be used by 27 laptops. All laptops will connect on the 5 GHz frequency band. A neighbor network uses channels 1 and 6. What channel should be used for this AP and why?

Options:

A.

Channel 6, because it is always best to use this channel

B.

A 5 GHz channel, because channels 1 and 6 are 2.4 GHz channels they have no impact on the decision

C.

Channel 1, because it is best to use the channel with the lowest frequency

D.

Channel 11, because channels 1 and 6 are in use nearby

Buy Now
Questions 28

What facts are true regarding controllers and APs in a Split MAC architecture?

Options:

A.

An IP tunnel is established between the AP and controller for AP management and control functions.

B.

Using centralized data forwarding, APs never tag Ethernet frames with VLAN identifiers or 802.1p CoS.

C.

With 802.1X/EAP security, the AP acts as the supplicant and the controller acts as the authenticator.

D.

Management and data frame types must be processed locally by the AP, while control frame types must be sent to the controller.

Buy Now
Questions 29

You have been tasked with creating a wireless link between two buildings on a single campus. The link must support at least 150 Mbps data rates. What kind of WLAN technology role should you deploy?

Options:

A.

WPAN

B.

IBSS

C.

Wireless bridging

D.

Access BSS

Buy Now
Questions 30

What can cause excessive VSWR in RF cables used to connect a radio to an antenna?

Options:

A.

High gain yagi antenna

B.

Radio output power above 100 mW but below 400 mw

C.

High gain parabolic dish antenna

D.

Impedance mismatch

Buy Now
Questions 31

XYZ Company has decided to install an 802.11 WLAN system that will support 1083 wireless users, but they are concerned about network security. XYZ is interested in deploying standardized security features. In addition to WPA2-Enterprise with PEAP and role-based access control, XYZ would like to support management frame protection as well as a fast secure roaming protocol for future mobile handsets.

As XYZ Company selects a product to deploy, what two IEEE amendments, which are included in 802.11-2016, and 802.11-2020 should be supported to provide the management frame protection and fast secure roaming security features?

Options:

A.

802.11j and 802.11z

B.

802.11r and 802.11w

C.

802.11j and 802.11k

D.

802.11k and 802.11v

Buy Now
Questions 32

What frame type is used to reserve the wireless medium for the transmission of high data rate frames that may not be understood by all clients connected to the BSS?

Options:

A.

RTS

B.

ACK

C.

Beacon

D.

PS-Poll

Buy Now
Questions 33

What factor is likely to cause the least impact on the application layer throughput of an 802.11n client station in a 2.4 GHz HT BSS?

Options:

A.

Increasing or decreasing the number of spatial streams in use by the client station and AP

B.

Implementing Fast BSS Transition (FT) for roaming

C.

Implementation of several other clients in the same BSS using 802.11g radios

D.

RF interference from more than 10 nearby Bluetooth transmitters

Buy Now
Questions 34

What terms accurately complete the following sentence?

The IEEE 802.11-2016 standard specifies mandatory support of the _______________ cipher suite for Robust Security Network Associations, and optional use of the ________________ cipher suite, which is designed for use with pre-RSNA hardware and is deprecated.

Options:

A.

802.1X/EAP, WEP

B.

CCMP, TKIP

C.

TLS, SSL

D.

RC5, RC4

Buy Now
Questions 35

An 802.11-based network uses an AP and has several connecting clients. The clients include iPhones, iPads, laptops and one desktop. What WLAN use case is represented?

Options:

A.

Ad-hoc

B.

WPAN

C.

BSS

D.

IBSS

Buy Now
Questions 36

When replacing the antenna of a WLAN device with a similar antenna type that has a higher passive gain, what antenna characteristic will decrease?

Options:

A.

Beamwidth

B.

Active gain

C.

Range

D.

Receive sensitivity

Buy Now
Questions 37

Return Loss is the decrease of forward energy in a system when some of the power is being reflected back toward the transmitter. What will cause high return loss in an RF transmission system, including the radio, cables, connectors and antenna?

Options:

A.

The use of 50 ohm cables longer than one meter in the RF system

B.

High output power at the transmitter and use of a low-gain antenna

C.

A significant impedance mismatch between components in the RF system

D.

A Voltage Standing Wave Ratio (VSWR) of 1:1

Buy Now
Exam Code: CWNA-109
Exam Name: Certified Wireless Network Administrator
Last Update: Nov 3, 2025
Questions: 125
CWNA-109 pdf

CWNA-109 PDF

$25.5  $84.99
CWNA-109 Engine

CWNA-109 Testing Engine

$30  $99.99
CWNA-109 PDF + Engine

CWNA-109 PDF + Testing Engine

$40.5  $134.99