Exam4Training

CWNP CWNA-109 Certified Wireless Network Administrator Online Training

Question #1

You are onsite with a client to perform a post-deployment site survey. When verifying a multiple channel VoWiFi deployment using a VoWiFi handset, which aspect is most important?

  • A . Performing protocol analysis with a single wireless adapter that is scanning all channels in use
  • B . Testing a constant conversation or handset tone while roaming from area to area, or performing an active survey
  • C . Configuring DSCP-to-802.11e QoS maps on the handset for each access category.
  • D . Verifying the VHT functionality to handle the call volume incurred by a single VoIP phone call.

Reveal Solution Hide Solution

Correct Answer: B
Question #2

Which protocols can be used to tunnel 802.11 user traffic from access points to WLAN controllers or other centralized network servers? (Choose all that apply.)

  • A . IPsec
  • B . GRE
  • C . CAPWAP
  • D . DTLS
  • E . VRRP

Reveal Solution Hide Solution

Correct Answer: ABC
Question #3

What is the traditional data-forwarding model for 802.11 user traffic when WLAN controllers are deployed?

  • A . Distributed data forwarding
  • B . Autonomous forwarding
  • C . Proxy data forwarding
  • D . Centralized data forwarding
  • E . All of the above

Reveal Solution Hide Solution

Correct Answer: D
Question #4

You were previously onsite at XYZ’s facility to conduct a pre-deployment RF site survey. The WLAN has been deployed according to your recommendations and you are onsite again to perform, a post-deployment validation survey.

When performing this type of post-deployment RF site survey voice over Wi-Fi, what is an action that must be performed?

  • A . Spectrum analysis to locate and identify RF interference sources.
  • B . Frequency-band hopping analysis to detect improper RF channel implementations.
  • C . Protocol analysis to discover channel use on neighboring APs.
  • D . Application analysis with an active phone call on an VoWiFi handset.

Reveal Solution Hide Solution

Correct Answer: D
Question #5

In a long-distance RF link, what statement about Fade Margin is true?

  • A . Fade Margin is an additional pad of signal strength designed into the RF system to compensate for unpredictable signal fading.
  • B . The Fade Margin of a long-distance radio link should be equivalent to the receiver’s antenna gain.
  • C . A Fade Margin is unnecessary on a long-distance RF link if more than 80% of the first Fresnel zone is clear of obstructions.
  • D . The Fade Margin is a measurement of signal loss through free space, and is a function of frequency and distance.

Reveal Solution Hide Solution

Correct Answer: A
Question #6

When implementing an 802.1X/EAP RSN network with a VoWiFi solution, what is needed to avoid latency issues during roaming?

  • A . Inter-Access Point Protocol
  • B . Fast BSS Transition
  • C . Distributed Coordination Function
  • D . Roaming Coordination Function
  • E . Lightweight APs

Reveal Solution Hide Solution

Correct Answer: B
Question #7

What are some results of multipath interference? (Choose all that apply.)

  • A . Scattering delay
  • B . Upfade
  • C . Excessive retransmissions
  • D . Absorption

Reveal Solution Hide Solution

Correct Answer: BC
Question #8

In an 802.11n 2.4 GHz BSS, what prevents each station from using the full network data rate (e.g. 216.7 Mbps) for user data when multiple clients are actively exchanging data with the AP?

  • A . Half of the bandwidth is allocated to uplink traffic and half to downlink traffic
  • B . All data frames must be acknowledged and the medium is shared
  • C . Radio receiver hardware cannot process data is quickly as it can be transmitted
  • D . APs do not have sufficient wired connection speeds to the LAN, even at 1 Gbps connections, with 802.11n and earlier APs

Reveal Solution Hide Solution

Correct Answer: B
Question #9

A VoIP telephone is connected to a 24-port PoE midspan PSE.

If the telephone does not provide a classification signature, how much power will the PSE provide to the telephone?

  • A . 12.95 watts
  • B . 4.0 watts
  • C . 7.0 watts
  • D . 15.4 watts

Reveal Solution Hide Solution

Correct Answer: D
Question #10

Which of these measurements are taken for indoor coverage analysis? (Choose all that apply.)

  • A . Received signal strength
  • B . Signal-to-noise ratio
  • C . Noise level
  • D . Path loss
  • E . Packet loss

Reveal Solution Hide Solution

Correct Answer: ABCE

Question #11

Which of the following statements are true? (Choose all that apply.)

  • A . When upfade occurs, the final received signal will be stronger than the original transmitted signal.
  • B . When downfade occurs, the final received signal will never be stronger than the original transmitted signal.
  • C . When upfade occurs, the final received signal will never be stronger than the original transmitted signal.
  • D . When downfade occurs, the final received signal will be stronger than the original transmitted signal.

Reveal Solution Hide Solution

Correct Answer: BC
Question #12

What is the difference between association frames and reassociation frames?

  • A . Association frames are management frames, whereas reassociation frames are control frames.
  • B . Association frames are used exclusively for roaming.
  • C . Reassociation frames contain the BSSID of the original AP.
  • D . Only association frames are used to join a BSS.

Reveal Solution Hide Solution

Correct Answer: D
Question #13

Which of the following are good uses for portable networks? (Choose all that apply.)

  • A . Military maneuvers
  • B . Disaster relief
  • C . Construction sites
  • D . Manufacturing plants

Reveal Solution Hide Solution

Correct Answer: ABC
Question #14

The basic architecture of any MDM solution consists of:

  • A . Mobile Device
  • B . AP and WLAN Controller
  • C . MDM Server
  • D . All of the above

Reveal Solution Hide Solution

Correct Answer: D
Question #15

What problems may exist for a multiple channel architecture (MCA) WLAN when its APs are all operating at full power (typically 100mW)? (Choose 2)

  • A . Wi-Fi enabled voice handsets with low transmit power can experience asynchronous downlink and uplink performance.
  • B . WLAN client stations can experience the hidden node problem when located near each other within the same cell.
  • C . The mismatched power between WLAN client stations and APs violates regulatory and IEEE signal quality requirements.
  • D . Cell size may be too large, causing co-channel interference to adjacent cells and reducing system capacity.
  • E . APs operating in the 2.4 GHz band would prevent microwave ovens and analog video cameras from functioning.

Reveal Solution Hide Solution

Correct Answer: AD
Question #16

Which ESS design scenario is required by the IEEE 802.11-2020 standard?

  • A . Two or more access points with overlapping coverage cells
  • B . Two or more access points with overlapping disjointed coverage cells
  • C . One access point with a single BSA
  • D . Two basic service sets interconnected by a distribution system medium (DSM)
  • E . None of the above

Reveal Solution Hide Solution

Correct Answer: E
Question #17

The IEEE 802.11-2012 standard defines communication mechanisms at which layers of the OSI model? (Choose all that apply.)

  • A . Network
  • B . Physical
  • C . Transport
  • D . Application
  • E . Data-Link
  • F . Session

Reveal Solution Hide Solution

Correct Answer: BE
Question #18

What wireless networking term describes the increase of RF energy in an intentional direction with the use of an antenna?

  • A . Directed Radiation
  • B . Active Amplification
  • C . Passive Gain
  • D . Beam Digression

Reveal Solution Hide Solution

Correct Answer: C
Question #19

When using a WLAN hotspot, company employees should do which of the following to ensure security back to your corporate network?

  • A . Enable WEP.
  • B . Enable 802.1X/EAP.
  • C . Use an IPsec VPN.
  • D . Security cannot be provided because you do not control the access point.

Reveal Solution Hide Solution

Correct Answer: C
Question #20

Which of the following information is included in a probe response frame? (Choose all that apply.)

  • A . Time stamp
  • B . Supported data rates
  • C . Service set capabilities
  • D . SSID
  • E . Traffic indication map

Reveal Solution Hide Solution

Correct Answer: ABCD

Question #21

Which protocol is used by iOS and macOS devices for over-the-air provisioning of MDM profiles using certificates and SSL encryption?

  • A . OAuth
  • B . GRE
  • C . SCEP
  • D . XML
  • E . HTTPS

Reveal Solution Hide Solution

Correct Answer: C
Question #22

What three cipher suites are specified by the IEEE 802.11-2012 standard? (Choose 3)

  • A . Counter Mode with CBC-MAC Protocol
  • B . Wi-Fi Protected Access v1 and v2
  • C . Internet Protocol Security
  • D . Extensible Authentication Protocol
  • E . GCM with Galois Message Authentication Code (GMAC) Protocol
  • F . Wired Equivalent Privacy
  • G . Temporal Key Integrity Protocol

Reveal Solution Hide Solution

Correct Answer: AFG
Question #23

Which one of the following 802.11 PHYs is more likely to be used in an industrial deployment but not likely to be used in standard office deployments?

  • A . SIG
  • B . VHT
  • C . OFDM
  • D . HT

Reveal Solution Hide Solution

Correct Answer: A
Question #24

Samantha received a gaming system as a gift. She would like to have it communicate with her sister Jennifer’s gaming system so that they can play against each other.

Which of the following technologies, if deployed in the two gaming systems, should provide for the easiest configuration of the two systems to communicate with each other?

  • A . Wi-Fi Personal
  • B . Wi-Fi Direct
  • C . 802.11n
  • D . CWG-RF
  • E . Wi-Fi Protected Setup

Reveal Solution Hide Solution

Correct Answer: B
Question #25

What is the channel and band of a Wi-Fi transmission whose center frequency is 5.300 GHz?

  • A . U-NII-1 channel 30
  • B . U-NII-1 channel 60
  • C . U-NII-2 channel 30
  • D . U-NII-2 channel 60

Reveal Solution Hide Solution

Correct Answer: D
Question #26

What is required when operating 802.11ax APS in the 6 GHz band using passphrase-based authentication?

  • A . VHT PHY
  • B . HT PHY
  • C . SAE
  • D . CCMP

Reveal Solution Hide Solution

Correct Answer: C
Question #27

A robust security network (RSN) requires the use of which security mechanisms? (Choose all that apply.)

  • A . 802.11x
  • B . WEP
  • C . IPsec
  • D . CCMP/AES
  • E . CKIP
  • F . 802.1X

Reveal Solution Hide Solution

Correct Answer: DF
Question #28

Professor Perry Correll has an Ethernet switch that is compliant with 802.3at. He is having problems with his APs randomly rebooting.

Which of the following could be causing his problems?

  • A . Multiple desktop PoE VoIP telephones are connected to the same Ethernet switch.
  • B . Most of the Ethernet cables running from the switch to the APs are 90 meters long.
  • C . The Ethernet cables are only Cat 5e.
  • D . The switch is capable of 1000BaseT, which is not compatible with the AP.

Reveal Solution Hide Solution

Correct Answer: A
Question #29

What terms accurately complete the following sentence?

The IEEE 802.11-2012 standard specifies mandatory support of the ___________ cipher suite for Robust Security Network Associations, and optional use of the ___________ cipher suite, which is designed for use with pre-RSNA hardware.

  • A . CCMP, TKIP
  • B . 802.1X/EAP, WEP
  • C . TLS, SSL
  • D . CCKM, WEP
  • E . RC5, RC4

Reveal Solution Hide Solution

Correct Answer: A
Question #30

If the access points transmit on the same frequency channel in an MCA architecture, what type of interference is caused by overlapping coverage cells?

  • A . Intersymbol interference
  • B . Adjacent channel interference
  • C . All-band interference
  • D . Narrowband interference
  • E . Co-channel interference

Reveal Solution Hide Solution

Correct Answer: E

Question #31

The WonderPuppy Coffee Company has hired you to make recommendations about deploying wireless hotspots inside 500 coffee shops across the country.

What solutions might you recommend? (Choose all that apply.)

  • A . WPA2-Personal security solution
  • B . 802.11 a/b/g/n access points at 100 mW transmit power
  • C . 802.11a/b/g/n access points at 1 to 5 mW transmit power
  • D . NEMA enclosures
  • E . Captive portal authentication
  • F . 802.1X/EAP security solution

Reveal Solution Hide Solution

Correct Answer: CE
Question #32

What type of signal is required to carry data?

  • A . Communications signal
  • B . Data signal
  • C . Carrier signal
  • D . Binary signal
  • E . Digital signal

Reveal Solution Hide Solution

Correct Answer: C
Question #33

What are some of the possible negative effects of an impendence mismatch? (Choose all that apply.)

  • A . Voltage reflection
  • B . Blockage of the Fresnel zone
  • C . Erratic signal strength
  • D . Decreased signal amplitude
  • E . Amplifier/transmitter failure

Reveal Solution Hide Solution

Correct Answer: ACDE
Question #34

What frame type is used to reserve the wireless medium for the transmission of high data rate frames that may not be understood by all clients connected to the BSS?

  • A . RTS
  • B . ACK
  • C . Beacon
  • D . PS-Poll

Reveal Solution Hide Solution

Correct Answer: A
Question #35

Physical carrier sense uses which two thresholds during the clear channel assessment to determine if the medium is busy?

  • A . RF detect
  • B . Signal detect
  • C . Transmission detect
  • D . Energy detect
  • E . Random detect

Reveal Solution Hide Solution

Correct Answer: BD
Question #36

Which new power-management method defined by the 802.11n amendment conserves power by powering down all but one radio?

  • A . A-MPDU
  • B . Power Save protection
  • C . PSMP
  • D . SM power save
  • E . PS mode

Reveal Solution Hide Solution

Correct Answer: D
Question #37

802. 11ax (HE) introduces Resource Units that can be used to allow communications with multiple devices at the same time, on the same channel, in the same BSS.

What feature of 802.1 lax provides this functionality?

  • A . 6 GHz support
  • B . TWT
  • C . Wi-Fi-LTE
  • D . OFDMA

Reveal Solution Hide Solution

Correct Answer: D
Question #38

The client devices that connect to your network include a mix of dual-band 802.11n and 802.11ac, single-band 802.11b/g/n, and some 802.11a/g/n. Your access points are configured with the same SSID on both the 2.4 and 5 GHz bands. The APs are also configured to prioritize client connectivity to 5 GHz.

How does an AP perform band steering to encourage clients to use 5 GHz?

  • A . When the client sends a probe request in the 2.4 GHz band, the AP may reply with information about the 5 GHz BSS.
  • B . The AP may ignore the initial probe requests or 802.11 authentication requests sent in the 2.4 GHz band by dual-band clients
  • C . The AP may allow an 802.11 association with the client in the 2.4 GHz band, then send unicast channel switch announcements to the client announcing the 5 GHz channel as the new channel.
  • D . After receiving probe request frames from the same client in both bands, the AP may send an association request frame to the client in the 5 GHz band.
  • E . The AP may allow an 802.11 association with the client in the 2.4 GHz band, then the AP may perform a transparent client handoff by transferring the client’s MAC address to the 5 GHz radio.

Reveal Solution Hide Solution

Correct Answer: B
Question #39

Based on RSSI metrics, concentric zones of variable data rate coverage exist around an access point due to the upshifting and downshifting of client stations between data rates.

What is the correct name of this process, according to the IEEE 802.11-2012 standard?

  • A . Dynamic rate shifting
  • B . Dynamic rate switching
  • C . Automatic rate selection
  • D . Adaptive rate selection
  • E . All of the above

Reveal Solution Hide Solution

Correct Answer: B
Question #40

An RF signal sometimes bends as it passes through some material other than free space.

What is the term that describes this behavior?

  • A . Reflection
  • B . Refraction
  • C . Scattering
  • D . Warping

Reveal Solution Hide Solution

Correct Answer: B

Question #41

What are the security options available as defined in the original IEEE Std 802.11-1999 (R2003)? (Choose all that apply.)

  • A . CCMP/AES
  • B . Open System authentication
  • C . Preshared keys
  • D . Shared Key authentication
  • E . WEP
  • F . TKIP

Reveal Solution Hide Solution

Correct Answer: BDE
Question #41

What are the security options available as defined in the original IEEE Std 802.11-1999 (R2003)? (Choose all that apply.)

  • A . CCMP/AES
  • B . Open System authentication
  • C . Preshared keys
  • D . Shared Key authentication
  • E . WEP
  • F . TKIP

Reveal Solution Hide Solution

Correct Answer: BDE
Question #41

What are the security options available as defined in the original IEEE Std 802.11-1999 (R2003)? (Choose all that apply.)

  • A . CCMP/AES
  • B . Open System authentication
  • C . Preshared keys
  • D . Shared Key authentication
  • E . WEP
  • F . TKIP

Reveal Solution Hide Solution

Correct Answer: BDE
Question #41

What are the security options available as defined in the original IEEE Std 802.11-1999 (R2003)? (Choose all that apply.)

  • A . CCMP/AES
  • B . Open System authentication
  • C . Preshared keys
  • D . Shared Key authentication
  • E . WEP
  • F . TKIP

Reveal Solution Hide Solution

Correct Answer: BDE
Question #45

SSID = Corporate / BSSID = BB:BB:BB:BB:BB:BB /

VLAN = 44 / Subnet = 192.168.44.0 / RF Channel = 6 / User Type B

  • A . Multiple WLAN Profiles
  • B . Call Admission Control
  • C . Virtual Cell with SCA
  • D . Access Categories
  • E . User-based authentication
  • F . Dual-radio AP hardware
  • G . Integrated DHCP server

Reveal Solution Hide Solution

Correct Answer: AE
Question #46

Several users are complaining that their VoWiFi phones keep losing connectivity.

The WLAN administrator notices that the frame transmissions of the VoWiFi phones are corrupted when listened to with a protocol analyzer near the access point but are not corrupted when listened to with the protocol analyzer near the VoWiFi phone.

What is the most likely cause of this problem?

  • A . RF interference
  • B . Multipath
  • C . Hidden node
  • D . Adjacent channel interference
  • E . Mismatched power settings

Reveal Solution Hide Solution

Correct Answer: E
Question #47

Which 802.11 amendments provide for throughput of 1 Gbps or higher? (Choose all that apply.)

  • A . 802.11aa
  • B . 802.11ab
  • C . 802.11ac
  • D . 802.11ad
  • E . 802.11ae
  • F . 802.11af

Reveal Solution Hide Solution

Correct Answer: CD
Question #48

When performing a validation survey for a Multiple Channel Architecture (MCA) system in a multi-tenant building with five floors, what aspect should you, as the surveyor, keep in mind?

  • A . The RF interference caused by passing airplanes supporting on-board Wi-Fi should be a prime consideration
  • B . The channel reuse pattern should be three dimensional with the RF cell extending coverage of each access point to other floors
  • C . The omni-directional antennas of the access points should be oriented parallel to the floor to maximize the coverage pattern across as many floors as possible
  • D . The Fresnel Zone is completely blocked between floors so each floor is considered a separate site survey

Reveal Solution Hide Solution

Correct Answer: B
Question #49

To reduce airtime consumption and provide for better capacity in the 5 GHz band, which data rates are recommended to be selected as basic rates? (Choose all that apply.)

  • A . 6 Mbps
  • B . 9 Mbps
  • C . 12 Mbps
  • D . 18 Mbps
  • E . 24 Mbps

Reveal Solution Hide Solution

Correct Answer: CE
Question #50

ABC Company has a 2.4 and 5 GHz WLAN deployment. DFS functionality is enabled as required by the regulatory domain and APs use DFS channels as long as radar is not detected. Band steering is also enabled to encourage dual-band clients to use frequency bands with more capacity.

Your performance analysis shows that many dual-band VoWiFi client devices will move back and forth between 2.4 and 5 GHz as the users roam throughout the building. All APs have 2.4 and 5 GHz radios enabled with transmit power adjusted to accommodate relatively similar cell sizes. This “band hopping” behavior is viewed by network staff to be undesirable.

What is the most likely cause of the unpredictable client band selection behavior?

  • A . Interference from 5 GHz radar sources has increased frame corruption and retries on channels 36- 48.
  • B . 5 GHz frequencies offer better RF penetration than 2.4 GHz, but 2.4 GHz offers more voice call capacity and lower latency than 5 GHz.
  • C . The voice client does not support DFS, and therefore experiences some 5 GHz coverage holes as it moves through the network.
  • D . The client’s band selection algorithm prefers 5 GHz, but band steering behavior usually steers 75- 85% of client devices to 2.4 GHz.

Reveal Solution Hide Solution

Correct Answer: C

Question #51

What does 802.1X/EAP provide when implemented for WLAN security? (Choose all that apply.)

  • A . Access to network resources
  • B . Verification of access point credentials
  • C . Dynamic authentication
  • D . Dynamic encryption-key generation
  • E . Verification of user credentials

Reveal Solution Hide Solution

Correct Answer: ADE
Question #52

What mechanism can be used if the guest VLAN is not supported at the edge of the network and only resides in A DMZ?

  • A . GRE
  • B . VPN
  • C . STP
  • D . RTSP
  • E . IGMP

Reveal Solution Hide Solution

Correct Answer: A
Question #53

Which WLAN architectural models typically require support for 802.1Q tagging at the edge on the network when multiple user VLANs are required? (Choose all that apply.)

  • A . Autonomous WLAN architecture
  • B . Centralized WLAN architecture
  • C . Distributed WLAN architecture
  • D . None of the above

Reveal Solution Hide Solution

Correct Answer: AC
Question #54

The basic service set identifier address can be found in which topologies? (Choose all that apply.)

  • A . FHSS
  • B . IBSS
  • C . ESS
  • D . HR-DSSS
  • E . BSS

Reveal Solution Hide Solution

Correct Answer: BCE
Question #55

Requiring all frames to be transmitted as A-MPDU frames increases performance due to which of the following? (Choose all that apply.)

  • A . Frame overhead is reduced.
  • B . Block ACK is required.
  • C . Frame information is shifted from the MPDU header to the PLCP header.
  • D . Reduced Interframe Space (RIFS) decreases the amount of time between frames.
  • E . A-MSDU is required; A-MPDU is optional.

Reveal Solution Hide Solution

Correct Answer: AB
Question #56

What scenarios might result in a hidden node problem? (Choose all that apply.)

  • A . Distributed antenna system
  • B . Coverage cells that are too large
  • C . Coverage cells that are too small
  • D . Physical obstruction
  • E . Co-channel interference

Reveal Solution Hide Solution

Correct Answer: ABD
Question #57

When an RF signal bends around an object, this propagation behavior is known as what?

  • A . Stratification
  • B . Refraction
  • C . Scattering
  • D . Diffraction
  • E . Attenuation

Reveal Solution Hide Solution

Correct Answer: D
Question #58

What factor will have the most significant impact on the amount of wireless throughput available to each station within a BSS?

  • A . The Layer 3 protocol used by each station to transmit data over the wireless link
  • B . The number of client stations associated to the BSS
  • C . The power management settings in the access point beacons
  • D . The presence of co-located (10m away) access points on non-overlapping channels

Reveal Solution Hide Solution

Correct Answer: B
Question #59

What is the recommended received signal and SNR when providing for VoWiFi client communications?

  • A . C70 dBm and 20 dB
  • B . C70 dBm and 25 dB
  • C . C70 dBm and 15 dB
  • D . C65 dBm and 15 dB
  • E . C65 dBm and 25 dB

Reveal Solution Hide Solution

Correct Answer: E
Question #60

What are of some of the common security capabilities often integrated within access points deployed in a distributed WLAN architecture?

  • A . Captive web portal
  • B . Firewall
  • C . Integrated RADIUS
  • D . WIPS
  • E . All of the above

Reveal Solution Hide Solution

Correct Answer: E

Question #61

You are designing an 802.3at-compliant network and are installing a 24-port Ethernet switch to support 10 Class 1 VoIP phones and 10 Class 0 APs.

The switch requires 500 watts to perform its basic switching functions.

How much total power will be needed?

  • A . 500 watts
  • B . 694 watts
  • C . 808 watts
  • D . 1,000 watts

Reveal Solution Hide Solution

Correct Answer: B
Question #62

The ___________ is the initial component in the creation of the wireless medium.

  • A . Antenna
  • B . Receiver
  • C . Transmitter
  • D . Intentional Radiator

Reveal Solution Hide Solution

Correct Answer: C
Question #63

To double the distance of a signal, the EIRP must be increased by how many dBs?

  • A . 3 dB
  • B . 6 dB
  • C . 10 dB
  • D . 20 dB

Reveal Solution Hide Solution

Correct Answer: B
Question #64

Which field in the MAC header of an 802.11 frame resets the NAV timer for all listening 802.11 stations?

  • A . NAV
  • B . Frame control
  • C . Duration/ID
  • D . Sequence number
  • E . Strictly ordered bit

Reveal Solution Hide Solution

Correct Answer: C
Question #65

Which of the following statements is not true regarding the number of subcarriers in the following channels? (Choose all that apply.)

  • A . 40 MHz subcarriers = 2 times 20 MHz subcarriers
  • B . 40 MHz subcarriers > 2 times 20 MHz subcarriers
  • C . 80 MHz subcarriers = 2 times 40 MHz subcarriers
  • D . 80 MHz subcarriers > 2 times 40 MHz subcarriers
  • E . 160 MHz subcarriers = 2 times 80 MHz subcarriers
  • F . 160 MHz subcarriers > 2 times 80 MHz subcarriers

Reveal Solution Hide Solution

Correct Answer: BDE
Question #66

What standard is referenced in the 802.11-2016 specification and is recommended for robust WLAN client security?

  • A . SSID hiding
  • B . WEP
  • C . 802.1X/EAP
  • D . IPSec VPN

Reveal Solution Hide Solution

Correct Answer: C
Question #67

When is an ERP (802.11g) AP required by the IEEE 802.11-2012 standard to respond to probe request frames from nearby HR-DSSS (802.11b) stations? (Choose all that apply.)

  • A . When the probe request frames contain a null SSID value
  • B . When the AP supports only ERP-OFDM data rates
  • C . When the AP supports only HR/DSSS data rates
  • D . When the Power Management bit is set to 1
  • E . When the probe request frames contain the correct SSID value

Reveal Solution Hide Solution

Correct Answer: AE
Question #68

Wi-Fi 4 radios using 802.11n (HT) technology can operate on which frequency bands? (Choose all that apply.)

  • A . 902C928 MHz
  • B . 2.4C2.4835 GHz
  • C . 5.15C5.25 GHz
  • D . 5.47C5.725 GHz
  • E . 5.925C6.425 GHz

Reveal Solution Hide Solution

Correct Answer: BCD
Question #69

Identify the security solutions that are defined by WPA2. (Choose all that apply.)

  • A . 802.1X/EAP authentication
  • B . Dynamic WEP encryption
  • C . Optional CCMP/AES encryption
  • D . Passphrase authentication
  • E . DES encryption

Reveal Solution Hide Solution

Correct Answer: AD
Question #70

How does transmit beamforming (TxBF) use multiple MIMO antennas to increase range?

  • A . Beamsteering
  • B . Phase shifting
  • C . Dynamic beamforming
  • D . Spatial multiplexing

Reveal Solution Hide Solution

Correct Answer: B

Question #71

Which of these WLAN architectures may require the use of an NMS server to manage and monitor the WLAN?

  • A . Autonomous WLAN architecture
  • B . Centralized WLAN architecture
  • C . Distributed WLAN architecture
  • D . All of the above

Reveal Solution Hide Solution

Correct Answer: D
Question #72

What type of security can be used to stop attackers from seeing the MAC addresses used by your legitimate 802.11 WLAN devices?

  • A . MAC filtering
  • B . CCMP/AES encryption
  • C . MAC spoofing
  • D . Rogue mitigation
  • E . Rogue detection
  • F . None of the above

Reveal Solution Hide Solution

Correct Answer: F
Question #73

Which of these attacks are considered denial-of-service attacks? (Choose all that apply.)

  • A . Man-in-the-middle
  • B . Jamming
  • C . Deauthentication spoofing
  • D . MAC spoofing
  • E . Peer-to-peer

Reveal Solution Hide Solution

Correct Answer: BC
Question #74

What are some examples of control plane intelligence? (Choose three)

  • A . Dynamic RF
  • B . Roaming mechanisms
  • C . Port filtering
  • D . Mesh protocols

Reveal Solution Hide Solution

Correct Answer: ABD
Question #75

What are some objects or materials that are common causes of reflection? (Choose all that apply.)

  • A . Metal
  • B . Trees
  • C . Asphalt Road
  • D . Lake
  • E . Carpet floors

Reveal Solution Hide Solution

Correct Answer: ACD
Question #76

Scott is an administrator at the Williams Lumber Company, and his WIPS has detected a rogue access point.

What actions should he take after the WIPS detects the rogue AP? (Choose the best two answers.)

  • A . Enable the layer 2 rogue containment feature that his WIPS provides.
  • B . Unplug the rogue AP from the electrical outlet upon discovery.
  • C . Call the police.
  • D . Call his mother.
  • E . Unplug the rogue AP from the data port upon discovery.

Reveal Solution Hide Solution

Correct Answer: AE
Question #77

Which type of wired access switch technology is the most important consideration when deploying 4×4:4 or 8×8:8 Wi-Fi 6 access points?

  • A . STP
  • B . SPB
  • C . AVB
  • D . PoE
  • E . IGMP

Reveal Solution Hide Solution

Correct Answer: D
Question #78

A PD must be capable of accepting power with either polarity from the power supply.

In mode A, on which conductors/wires does the PD accept power?

  • A . 1, 2, 3, 4
  • B . 5, 6, 7, 8
  • C . 1, 2, 3, 6
  • D . 4, 5, 7, 8

Reveal Solution Hide Solution

Correct Answer: C
Question #79

What are the required data rates of an OFDM station?

  • A . 3, 6, and 12 Mbps
  • B . 6, 9, 12, 18, 24, 36, 48, and 54 Mbps
  • C . 6, 12, 24, and 54 Mbps
  • D . 6, 12, and 24 Mbps
  • E . 1, 2, 5.5, and 11 Mbps

Reveal Solution Hide Solution

Correct Answer: D
Question #80

When using a hotspot, you should do which of the following to ensure security back to your corporate network?

  • A . Enable WEP.
  • B . Enable 802.1X/EAP.
  • C . Use an IPsec VPN.
  • D . Security cannot be provided because you do not control the access point.

Reveal Solution Hide Solution

Correct Answer: C

Question #81

CCMP encryption uses which AES key size?

  • A . 192 bits
  • B . 64 bits
  • C . 256 bits
  • D . 128 bits

Reveal Solution Hide Solution

Correct Answer: D
Question #82

Select two components that should be mandatory in every remote access wireless security policy.

  • A . Encrypted VPN
  • B . 802.1X/EAP
  • C . Personal firewall
  • D . Captive portal
  • E . Wireless stun gun

Reveal Solution Hide Solution

Correct Answer: AC
Question #83

dBi is an expression of what type of measurement?

  • A . Access point gain
  • B . Received power
  • C . Transmitted power
  • D . Antenna gain

Reveal Solution Hide Solution

Correct Answer: D
Question #84

ABC Company is planning to install a new 802.11ac WLAN, but wants to upgrade its wired infrastructure first to provide the best user experience possible. ABC Company has hired you to perform the RF site survey.

During the interview with the network manager, you are told that the new Ethernet edge switches will support VoIP phones and 802.11 access points, both using 802.3 PoE.

After hearing this information, what immediate concerns do you note?

  • A . VoIP phones and 802.11 access points should not be powered by the same edge switch due to distortion.
  • B . The edge Ethernet switches should support Ether-channel to get the best results out of the network.
  • C . If the switches are in optimal locations for VoIP phones, they are likely to be suboptimal locations for 802.11 APs.
  • D . The power budget in the edge switches must be carefully planned and monitored based on the number of supported PoE devices.

Reveal Solution Hide Solution

Correct Answer: D
Question #85

802.11 collision detection is achieved using which technology?

  • A . Network allocation vector (NAV)
  • B . Clear channel assessment (CCA)
  • C . Duration/ID value
  • D . Receiving an ACK from the destination station
  • E . Positive collision detection cannot be determined.

Reveal Solution Hide Solution

Correct Answer: E
Question #86

Which of the following are valid ISM bands? (Choose all that apply.)

  • A . 902 MHz − 928 MHz
  • B . 2.4 GHz − 2.5 GHz
  • C . 5.725 GHz − 5.85 GHz
  • D . 5.725 GHz − 5.875 GHz

Reveal Solution Hide Solution

Correct Answer: ABD
Question #87

The 802.11 legacy standard defines which wireless security solution?

  • A . Dynamic WEP
  • B . 802.1X/EAP
  • C . 64-bit static WEP
  • D . Temporal Key Integrity Protocol
  • E . CCMP/AES

Reveal Solution Hide Solution

Correct Answer: C
Question #88

A WIPS uses which four labels to classify an 802.11 device? (Choose the best four answers.)

  • A . Authorized
  • B . Neighbor
  • C . Enabled
  • D . Disabled
  • E . Rogue
  • F . Unauthorized/unknown

Reveal Solution Hide Solution

Correct Answer: ABEF
Question #89

dBi is a measure of what?

  • A . The output of the transmitter
  • B . The signal increase caused by the antenna
  • C . The signal increase of the intentional transmitter
  • D . The comparison between an isotropic radiator and the transceiver
  • E . The strength of the intentional radiator

Reveal Solution Hide Solution

Correct Answer: B
Question #90

Which of the following 802.11 frames carry an MSDU payload that may eventually be transferred by the integration service into an 802.3 Ethernet frame?

  • A . 802.11 management frames
  • B . 802.11 control frames
  • C . 802.11 data frames
  • D . 802.11 action frames
  • E . 802.11 association frames

Reveal Solution Hide Solution

Correct Answer: C

Question #91

CSMA/CA and DCF define which mechanisms that attempt to ensure that only one 802.11 radio can transmit on the half-duplex RF medium? (Choose all that apply.)

  • A . Random backoff timer
  • B . NAV
  • C . CCMP
  • D . CCA
  • E . Interframe spacing

Reveal Solution Hide Solution

Correct Answer: ABDE
Question #92

When is an 802.11ac AP transmitting on 5 GHz required by the IEEE 802.11-2020 standard to respond to probe request frames from nearby client stations? (Choose all that apply.)

  • A . When the probe request frames contain a null SSID value
  • B . When the probe request client is also an 802.11ac radio
  • C . When the probe request is encrypted
  • D . When the probe request has the Power Management bit set to 1
  • E . When the probe request frames contain the correct SSID value

Reveal Solution Hide Solution

Correct Answer: AE
Question #93

What type of interference is caused by overlapping coverage cells with overlapping frequencies?

  • A . Intersymbol interference
  • B . Adjacent channel interference
  • C . All-band interference
  • D . Narrowband interference
  • E . Co-channel interference

Reveal Solution Hide Solution

Correct Answer: B
Question #94

Which two 802.11 topologies require the use of an AP?

  • A . IBSS
  • B . BSS
  • C . PBSS
  • D . ESS

Reveal Solution Hide Solution

Correct Answer: BD
Question #95

In WLAN security, which authentication methods always create Layer 2 dynamic encryption keys? (Choose 2)

  • A . HTTPS Captive Portal
  • B . WEP
  • C . WPA2-PSK
  • D . EAP-TLS
  • E . Shared Key
  • F . TKIP

Reveal Solution Hide Solution

Correct Answer: CD
Question #96

What phrase defines Equivalent Isotropically Radiated Power (EIRP)?

  • A . The power output from the radio into the RF cable
  • B . The power output from the radio after cable losses
  • C . The highest RF signal strength that is transmitted from a given antenna
  • D . Reflected power due to an impedance mismatch in the signal path
  • E . Power supplied from the transmission line to the antenna input

Reveal Solution Hide Solution

Correct Answer: C
Question #97

What are some popular 802.11 applications used in the healthcare industry? (Choose all that apply.)

  • A . VoWiFi
  • B . Bridging
  • C . RTLS
  • D . Patient monitoring

Reveal Solution Hide Solution

Correct Answer: ACD
Question #98

What documents might be needed prior to performing an indoor site survey for a new wireless LAN? (Choose all that apply.)

  • A . Blueprints
  • B . Network topography map
  • C . Network topology map
  • D . Coverage map
  • E . Frequency map

Reveal Solution Hide Solution

Correct Answer: AC
Question #99

In the 1970’s _______ had a wireless communication model for transmitting between islands.

  • A . China
  • B . Hawaii
  • C . Alaska
  • D . Russia

Reveal Solution Hide Solution

Correct Answer: B
Question #100

If an 802.11 RF transmission reaches a receiving antenna simultaneously by direct and reflected paths, what effect will the reflected signal have on the signal that took the direct line-of-sight path?

  • A . The direct signal will only be received if the reflected signal is more than 180 degrees out of phase.
  • B . The direct signal cannot be received if the indirect signal is less than 90 degrees out-of-phase.
  • C . The signals will be distorted if the indirect signal arrives simultaneously at the receiver, but 90 degrees out-of-phase.
  • D . If the signals are in-phase, they will combine together, cancel one another out, and create a null.

Reveal Solution Hide Solution

Correct Answer: C

Question #101

Prior to association, what parameter can 802.11 client devices measure and use to select the optimal access point for association?

  • A . Signal strength of access point beacons received
  • B . Proximity to potential access points
  • C . Retry rate of probe request and response frames
  • D . Average round trip time to reach the Internet DNS server
  • E . Average round trip time to reach the IP router

Reveal Solution Hide Solution

Correct Answer: A
Question #102

Layer 2 retransmissions occur when frames become corrupted.

What are some of the causes of layer 2 retries? (Choose all that apply.)

  • A . High SNR
  • B . Low SNR
  • C . Co-channel interference
  • D . RF interference
  • E . Adjacent channel interference

Reveal Solution Hide Solution

Correct Answer: BDE
Question #103

Jane Barrett is installing a controller-based wireless network that uses both software and hardware to monitor and dynamically change the power and channel settings of the APs.

This technology is known as what? (Choose all that apply.)

  • A . Dynamic rate selection (DRS)
  • B . Radio resource management (RRM)
  • C . Adaptive radio configuration (ARC)
  • D . Self-organizing wireless LAN

Reveal Solution Hide Solution

Correct Answer: BD
Exit mobile version