Exam4Training

CWNP CWNA-107 Certified Wireless Network Administrator Online Training

Question #1

An RF signal sometimes bends as it passes through some material other than free space.

What is the term that describes this behavior?

  • A . Reflection
  • B . Refraction
  • C . Scattering
  • D . Warping

Reveal Solution Hide Solution

Correct Answer: B
Question #2

What can an impedance mismatch in the RF cables and connectors cause?

  • A . Fewer MCS values in the MCS table
  • B . Excessive VSWR
  • C . Increased amplitude of the RF signal
  • D . Increased range of the RF signal

Reveal Solution Hide Solution

Correct Answer: B
B

Explanation:

Reference https://books.google.com.pk/books? id=uA68E68OqQgC&pg=PA235&lpg=PA235&dq=impedance+mismatch+in+the+RF+cables+and +connectors+cause&source=bl&ots=WEynkTBqO1&sig=-Hm_d26REw_UrVZtz20xErL­4Rg&hl=en&sa=X&ved=0ahUKEwj5rvW0j57ZAhVMzqQKHeCGB0kQ6AEISDAF#v=onepage&q=impedan ce%20mismatch%20in%20the%20RF%20cables%20and%20connectors%20cause&f=false

Question #3

What factor does not influence the distance at which an RF signal can be effectively received?

  • A . Free Space Path Loss
  • B . Receiving station’s radio sensitivity
  • C . Transmitting station’s output power
  • D . Receiving station’s output power

Reveal Solution Hide Solution

Correct Answer: D
Question #4

A WLAN transmitter that emits a 50 mW signal is connected to a cable with 3 dB loss.

If the cable is connected to an antenna with 9dBi gain, what is the EIRP at the antenna element?

  • A . 23 dBm
  • B . 26 dBm
  • C . 13 dBm
  • D . 10 dBm

Reveal Solution Hide Solution

Correct Answer: B
Question #5

In a long-distance RF link, which statement about Fade Margin is true?

  • A . The Fade Margin is a measurement of signal loss through free space and is a function of frequency and distance.
  • B . The Fade Margin of a long-distance radio link should be equivalent to the receiver’s low noise filter gain.
  • C . A Fade Margin is unnecessary on a long-distance RF link if more than 80% of
  • D . Fade Margin is an additional pad of signal strength designed into the RF system to compensate for unpredictable signal fading.

Reveal Solution Hide Solution

Correct Answer: D
Question #6

What wireless networking term describes the increase of RF energy in an intentional direction with the use of an antenna?

  • A . Directed Radiation
  • B . Active Amplification
  • C . Passive Gain
  • D . Beam Digression

Reveal Solution Hide Solution

Correct Answer: C
C

Explanation:

Reference https://books.google.com.pk/books?id=saC_2j-IwwIC&pg=PA51&lpg=PA51&dq=passive+gain +increase+of+RF+energy+in+an+intentional+direction+with+the+use+of+an +antenna&source=bl&ots=ePmfHdkUks&sig=TzpBqUuomGckVXy6kPAO8t2l_Jc&hl=en&sa=X&ved=0ahU KEwjwtb6Ds57ZAhUBesAKHfpCCSAQ6AEIKjAB#v=onepage&q=passive%20gain%20increase%20of% 20RF%20energy%20in%20an%20intentional%20direction%20with%20the%20use%20of%20an% 20antenna&f=false

Question #7

Which directional antenna types are commonly used by indoor Wi-Fi devices in a MIMO multiple spatial stream implementation?

  • A . Dish and grid
  • B . Dipole and yagi
  • C . Grid and sector
  • D . Patch and panel

Reveal Solution Hide Solution

Correct Answer: D
Question #8

What statement about the beamwidth of an RF antenna is true?

  • A . Horizontal and vertical beamwidth are calculated at the point where the main lobe decreases power by 3 dB.
  • B . Vertical beamwidth is displayed (in degrees) on the antenna’s Azimuth chart.
  • C . When antenna gain is lower, the beamwidth is also lower in both the horizontal and vertical dimensions.
  • D . The beamwidth patterns on an antenna polar chart indicate the point at which the RF signal stops propagating.

Reveal Solution Hide Solution

Correct Answer: A
Question #9

Which one of the following is not a factor considered when calculating the Link Budget for an outdoor point­to-point WLAN bridge link?

  • A . MU-MIMO capabilities of the bridges
  • B . Receive antenna gain
  • C . Transmit power
  • D . Operating frequency

Reveal Solution Hide Solution

Correct Answer: A
Question #10

What best describes WPA2 in relation to 802.11 wireless networks?

  • A . WPA2 is specified in the 802.11 standard as implementing CCMP/AES.
  • B . WPA2 is the standard that defines security for WLANs.
  • C . WPA2 is a certification created by the Wi-Fi Alliance that validates devices correctly implement CCMP/ AES.
  • D . WPA2 is the second version of WPA and it enhances security through the use of TKIP instead of WEP.

Reveal Solution Hide Solution

Correct Answer: C

Question #11

An IEEE 802.11 amendment is in the daft state.

What impact does this draft amendment have on the 802.11 standard?

  • A . No impact: Until an amendment is ratified, it does not become part of the standard.
  • B . Devices will be released based on the draft amendment and the draft amendment features are part of the standard.
  • C . The standard is changed to reflect the new capabilities as soon as an amendment enters the draft stage.
  • D . No impact: Draft amendments do not become part of the standard until a working group is formed.

Reveal Solution Hide Solution

Correct Answer: A
Question #12

You are implementing a VHT-capable AP.

Which one of the following channels is available in the 802.11­2016 standard that was not available before the ratification of 802.11 ac?

  • A . 153
  • B . 161
  • C . 144
  • D . 56

Reveal Solution Hide Solution

Correct Answer: C
Question #13

What statement is true concerning the use of Orthogonal Frequency Division Multiplexing (OFDM) modulation method in IEEE 802.11 WLANs?

  • A . OFDM was used by Frequency Hopping Spread Spectrum (FHSS) PHY devices.
  • B . OFDM was first introduced in 802.11 and is used by the ERP, HT and VHT PHYs as well.
  • C . OFDM implement BPSK modulation to allow for data rates up to 7 Gbps.
  • D . OFDM modulation is used only in 5 GHz 802.11 transmissions.

Reveal Solution Hide Solution

Correct Answer: D
D

Explanation:

Reference http://www.rhyshaden.com/802_11a.htm

Question #14

Which IEEE 802.11 physical layer (PHY) specification includes support for and compatibility with both ERP and HR/DSSS?

  • A . VHT (802.11ac)
  • B . OFDM (802.11a)
  • C . DSSS (802.11-Prime)
  • D . HT (802.11n)

Reveal Solution Hide Solution

Correct Answer: B
Question #15

An 802.11-based network uses an AP and has several connecting clients. The clients include iPhones, iPads, laptops and one desktop.

What WLAN use case is represented?

  • A . WPAN
  • B . Ad-hoc
  • C . BSS
  • D . IBSS

Reveal Solution Hide Solution

Correct Answer: C
Question #16

What factor is likely to cause the least impact on the application layer throughput of an 802.11n client station in a 2.4 GHz HT BSS?

  • A . Increasing or decreasing the number of spatial streams in use by the client station and AP
  • B . Implementation of several other clients in the same BSS using 802.11 g radios
  • C . Implementing Fast BSS Transition (FT) for roaming
  • D . RF interference from more than 10 nearby Bluetooth transmitters

Reveal Solution Hide Solution

Correct Answer: A
Question #17

What ID is typically mapped to an AP’s MAC address if a single BSS is implemented?

  • A . VLAN ID
  • B . BSSID
  • C . Device ID
  • D . SSID

Reveal Solution Hide Solution

Correct Answer: B
B

Explanation:

Reference https://technet.microsoft.com/en-us/library/cc757419(v=ws.10).aspx

Question #18

What is appended to the end of each 802.11 data frame after the payload?

  • A . FCS
  • B . Preamble
  • C . MAC header
  • D . PHY header

Reveal Solution Hide Solution

Correct Answer: A
Question #19

When an ACK frame is not received by the transmitting STA, what is assumed?

  • A . The frame was correctly delivered
  • B . The frame was not delivered and must be retransmitted
  • C . The receiver is offline
  • D . The receiver processed the frame, but did not respond with an ACK frame because 802.11w is enabled

Reveal Solution Hide Solution

Correct Answer: B
Question #20

When a client station sends a broadcast probe request frame with a wildcard SSID, how do APs respond?

  • A . For each probe request frame, only one AP may reply with a probe response.
  • B . Each AP responds in turn after preparing a probe response and winning contention.
  • C . Each AP checks with the DHCP server to see if it can respond and then acts accordingly.
  • D . After waiting a SIFS, all APs reply at the same time with a probe response.

Reveal Solution Hide Solution

Correct Answer: B

Question #21

What security solution is deprecated in the 802.11 standard and should never be used in any modern WLAN deployment?

  • A . AES
  • B . Shared Key Authentication
  • C . CCMP
  • D . Open System Authentication

Reveal Solution Hide Solution

Correct Answer: B
Question #22

You are reconfiguring an AP to use the short guard interval.

How long will the new guard interval duration be after the change?

  • A . 400 ns
  • B . 10 ms
  • C . 800 ns
  • D . 104 ms

Reveal Solution Hide Solution

Correct Answer: A
A

Explanation:

Reference https://www.sonicwall.com/en-us/support/knowledge-base/170504672960493

Question #23

What statement about the IEEE 802.11-2016 QoS facility is true?

  • A . 802.11 QoS is achieved by giving high priority queues a statistical advantage at winning contention.
  • B . Four 802.1p user priorities are mapped to eight 802.11 transmit queues.
  • C . 802.11 control frames are assigned to the 802.11 EF priority queue.
  • D . When the Voice queue has frames awaiting transmission, no data will be transmitted from the Best Effort queue.

Reveal Solution Hide Solution

Correct Answer: A
Question #24

You manage a WLAN with 100 802.11ac access points. All access points are configured to use 80 MHz channels. In a particular BSS, only 40 MHz communications are seen.

What is the likely cause of this behavior?

  • A . The short guard interval is also enabled.
  • B . The clients are all 802.11n STAs or lower
  • C . The AP is improperly configured to use only 40 MHz of the 80 MHz allocated bandwidth
  • D . All clients implement single spatial stream radios

Reveal Solution Hide Solution

Correct Answer: B
Question #25

When compared with legacy Power Save mode, how does VHT TXOP power save improve battery life for devices on a WLAN?

  • A . VHT TXOP power save allows stations to enter sleep mode and legacy Power Save does not.
  • B . VHT TXOP power save allows the WLAN transceiver to disable more components when in a low power state.
  • C . VHT TXOP power save uses the partial AID in the preamble to allow clients to identify frames targeted for them.
  • D . Legacy Power Save mode was removed in the 802.11ac amendment.

Reveal Solution Hide Solution

Correct Answer: C
Question #26

What 802.11 network configuration would result in multiple stations broadcasting Beacon frames with the same BSSID but with different source addresses?

  • A . A single AP supports multiple BSSs with different SSIDs.
  • B . An SCA network is in use.
  • C . Multiple APs have been loaded with the same configuration from an image file.
  • D . An IBSS is used instead of a BSS.

Reveal Solution Hide Solution

Correct Answer: D
D

Explanation:

Reference https://www.safaribooksonline.com/library/view/80211-wireless-networks/0596100523/ ch04.html

Question #27

What primary metric of scanning can stations use to select the best AP for connectivity to the desired BSS?

  • A . Signal strength of AP beacons received.
  • B . PING latency when testing against an Internet server.
  • C . FCS errors in frames transmitted to and from the AP.
  • D . Throughput speed in Mbps.

Reveal Solution Hide Solution

Correct Answer: A
Question #28

Lynne runs a small hotel, and as a value added for his customers he has implemented a Wi-Fi hotspot. Lynne has read news articles about how hackers wait at hotspots trying to take advantage of unsuspecting users. He wants to avoid this problem at his hotel.

What is an efficient and practical step that Lynne can take to decrease the likelihood of active attacks on his customers’ wireless computers?

  • A . Implement Network Access Control (NAC) and require antivirus and firewall software along with OS patches.
  • B . Implement an SSL VPN in the WLAN controller that initiates after HTTPS login.
  • C . Enable station-to-station traffic blocking by the access points in the hotel.
  • D . Require EAP_FAST authentication and provide customers with a username/password on their receipt.

Reveal Solution Hide Solution

Correct Answer: B
Question #29

You have been tasked with creating a wireless link between two buildings on a single campus. The link must support at least 150 Mbps data rates.

What kind of WLAN technology role should you deploy?

  • A . IBSS
  • B . WPAN
  • C . Access BSS
  • D . Wireless bridging

Reveal Solution Hide Solution

Correct Answer: D
D

Explanation:

Reference https://www.theseus.fi/bitstream/handle/10024/130087/Mengdi_Ji.pdf?sequence=1

Question #30

When implementing PoE, what role is played by a switch?

  • A . PD
  • B . PSE
  • C . Midspan injector
  • D . Power splitter

Reveal Solution Hide Solution

Correct Answer: B

Question #31

A dual-band 802.11ac AP must be powered by PoE.

As a class 4 device, what power level should be received at the AP?

  • A . 30 W
  • B . 25.5 W
  • C . 15.4 W
  • D . 12.95 W

Reveal Solution Hide Solution

Correct Answer: C
Question #32

A WLAN is implemented using wireless controllers. The APs must locate the controllers when powered on and connected to the network.

Which one of the following methods is commonly used to locate the controllers by the APs?

  • A . DHCP
  • B . GRE
  • C . NTP
  • D . SNMP

Reveal Solution Hide Solution

Correct Answer: A
A

Explanation:

Reference https://books.google.com.pk/books?id=YEW0DAAAQBAJ&pg=SA7-PA9&lpg=SA7­PA9&dq=methods+is+commonly+used+to+locate+the+controllers+by+the +APs&source=bl&ots=O2sMDljjDV&sig=M1_gvQnGaWfGg13Pbb1xTkflklA&hl=en&sa=X&ved=0ahUKEwj 3hvmPoaLZAhWRPFAKHb5MAyQQ6AEIJzAA#v=onepage&q=methods%20is%20commonly%20used% 20to%20locate%20the%20controllers%20by%20the%20APs&f=false

Question #33

You are implementing a multi-AP WLAN and fast secure roaming is essential.

Which one of the following methods is an IEEE 802.11 standard method for fast roaming?

  • A . Band steering
  • B . FT
  • C . OKC
  • D . Load balancing

Reveal Solution Hide Solution

Correct Answer: B
B

Explanation:

Reference https://www.networkcomputing.com/wireless-infrastructure/wifi-fast-roaming­simplified/1993108957

Question #34

In an 802.11 2.4 GHz system, what 22 MHz channels are considered non-overlapping?

  • A . 11 and 6
  • B . 7 and 11
  • C . 1 and 5
  • D . 2 and 8

Reveal Solution Hide Solution

Correct Answer: A
Question #35

The center frequency of channel 1 in the 2.4 GHz band is 2.412 GHz (2412 MHz).

What is the center frequency of channel 4?

  • A . 2.413
  • B . 2.427
  • C . 2.422
  • D . 2.417

Reveal Solution Hide Solution

Correct Answer: B
Question #36

The requirements for a WLAN you are installing state that it must support unidirectional delays of less than 150 ms and the signal strength at all receivers can be no lower than -67 dBm.

What application is likely used that demands these requirements?

  • A . E-Mail
  • B . RTLS
  • C . VoIP
  • D . FTP

Reveal Solution Hide Solution

Correct Answer: C
Question #37

You are deploying a WLAN with the access points configured for 10 mW of output power on the 2.4 GHz radios and 20mW of output power on the 5GHz radios. Some semi-directional antennas are also in use.

What kind of deployment is described?

  • A . High density
  • B . SOHO
  • C . Standard office
  • D . Residential

Reveal Solution Hide Solution

Correct Answer: A
Question #38

Option 43 must be configured to allow access points to locate controllers. In what network service should this option be configured?

  • A . DHCP
  • B . LDAP
  • C . DNS
  • D . RADIUS

Reveal Solution Hide Solution

Correct Answer: A
A

Explanation:

Reference https://www.cisco.com/c/en/us/support/docs/wireless-mobility/wireless-lan-wlan/97066-dhcp­option-43-00.html

Question #39

What statement about 802.3, Clause 33 Power over Ethernet is true?

  • A . Only midspan PSEs are supported.
  • B . The lowest voltage drop is achieved when using CAT6 instead of Cat5 or CAT5e.
  • C . Only endpoint PSEs are supported.
  • D . When using CAT5 cabling, you increase the maximum draw available to the PD over that available with CAT6.

Reveal Solution Hide Solution

Correct Answer: B
Question #40

What statement describes the authorization component of a AAA implementation?

  • A . Validating client device credentials against a database.
  • B . Implementing a WIPS as a full-time monitoring solution to enforce policies.
  • C . Granting access to specific network services or resources according to a user profile.
  • D . Verifying that a user is who he says he is.

Reveal Solution Hide Solution

Correct Answer: C
C

Explanation:

Reference http://searchsecurity.techtarget.com/definition/authentication-authorization-and-accounting

Question #41

You are the network administrator for ABC Company. Your manager has recently attended a wireless security seminar. The seminar speaker taught that a wireless network could be hidden from potential intruders if you disable the broadcasting of the SSID in Beacons and configured the access points not to respond to Probe Request frames that have a null SSID field.

Your manager suggests implementing these security practices.

What response should you give to this suggestion?

  • A . Any tenants in the same building using advanced penetration testing tools will be able to obtain the SSID by exploiting WPA EAPOL-Key exchanges. This poses an additional risk of exposing the WPA key.
  • B . Any 802.11 protocol analyzer can see the SSID in clear text in frames other than Beacons frames. This negates any security benefit of trying to hide the SSID in Beacons and Probe Response frames.
  • C . To improve security by hiding the SSID, the AP and client stations must both be configured to remove the SSID from association request and response frames. Most VLAN products support this.
  • D . This security practice prevents manufacturers’ client utilities from detecting the SSID. As a result, the SSID cannot be obtained by attackers, except through social engineering, guessing, or use of a WIPS.

Reveal Solution Hide Solution

Correct Answer: B
Question #42

What cipher suite is specified by the 802.11-2016 standard and is not deprecated?

  • A . Temporal Key Integrity Protocol
  • B . Extensible Authentication Protocol
  • C . Counter Mode with CBC- MAC Protocol
  • D . Wired Equivalent Privacy

Reveal Solution Hide Solution

Correct Answer: B
Question #43

To ease user complexity, your company has implemented a single SSID for all employees.

However, the network administrator needs a way to control the network resources that can be accessed by each employee based in their department.

What WLAN feature would allow the network administrator to accomplish this task?

  • A . RBAC
  • B . SNMP
  • C . WIPS
  • D . WPA2

Reveal Solution Hide Solution

Correct Answer: A
Question #44

ABC Company is planning a point-to-multipoint bridge deployment with standalone (autonomous) 802.11 bridge units. 802.1X/EAP will be used for bridge authentication. A Linux-based RADIUS server will be used for authentication.

What device in the bridge implementation acts as the 802.11X Authenticator?

  • A . All non-root bridges
  • B . The root bridge
  • C . The Ethernet switch
  • D . The RADIUS server

Reveal Solution Hide Solution

Correct Answer: C
Question #45

You are managing a wireless access point in autonomous mode using the Web based interface. You capture traffic during this management task and notice that you can see the HTML code of the Web pages for access point management.

What error in administration could be the cause of the security concern?

  • A . A VPN with the AP is not established
  • B . WPA2 is disabled on the WLAN
  • C . HTTP is in use instead of HTTPS
  • D . IPsec is not in use of the management connection as recommended

Reveal Solution Hide Solution

Correct Answer: C
Question #46

What is the most effective method of testing roaming in relation to 802.11 VoIP handsets?

  • A . Use the built-in roaming monitor built into all VoIP handsets.
  • B . Use a protocol analyzer to capture the traffic generated when a laptop roams.
  • C . Place a call with the handset and move around the facility to test quality during roaming.
  • D . Use a spectrum analyzer to monitor RF activity during a VoIP call.

Reveal Solution Hide Solution

Correct Answer: C
Question #47

You are performing a post-implementation validation survey.

What basic tool can be used to easily locate areas of high co-channel interference?

  • A . Throughput tester
  • B . Access point spectrum analyzer
  • C . Laptop-based spectrum analyzer
  • D . Wi-Fi scanner

Reveal Solution Hide Solution

Correct Answer: B
Question #48

During a post-implementation survey, you have detected a non-802.11 wireless device transmitting in the area used by handheld 802.11g scanners.

What is the most important factor in determining the impact of this non-802.11 device?

  • A . Protocols utilized
  • B . Channel occupied
  • C . Receive sensitivity
  • D . Airtime utilization

Reveal Solution Hide Solution

Correct Answer: B
Exit mobile version