Labour Day Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: suredis

CWNP CWAP-404 Certified Wireless Analysis Professional Exam Practice Test

Page: 1 / 6
Total 60 questions

Certified Wireless Analysis Professional Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$42  $119.99

PDF Study Guide

  • Product Type: PDF Study Guide
$36.75  $104.99
Question 1

Which one of the statements regarding the Frame Control field in an 802.11 MAC header is true?

Options:

A.

Only Control frames have a Frame Control field

B.

The Frame Control field is used to communicate the duration value

C.

The Frame Control field contains subfields, and soma in 1-bit flags

D.

The Frame Control field is always set to 0

Question 2

Which one of the following statements is not true concerning DTIMs?

Options:

A.

Buffered Broadcast and Multicast traffic will be transmitted following a DTIM

B.

The DTIM interval can dictate when an STA will wake up to listen to beacon frames

C.

DTIM stands for Delivery Traffic Indication Map

D.

Every Beacon frame must contain a DTIM

Question 3

Where would you look in a packet trace file to identify the configured Minimum Basic Rate (MBR) of a BSS?

Options:

A.

Supported Rates & Extended Supported Rates elements in a Beacon frame

B.

In the MBR Action frame

C.

In the MBR Information Element in an Association Response frame

D.

In the Minimum Basic Rate Element in a Beacon frame

Question 4

When a data frame is encrypted with WPA2, to which portion of the frame is the encryption applied?

Options:

A.

Frame body and MAC Header

B.

Frame body excluding the LLCPDU

C.

Frame body including the LLCPDU

D.

The whole MPDU

Question 5

In what scenario is Open Authentication without encryption not allowed based on the 802.11 standard?

Options:

A.

When operating a BS5 in the CBRS band

B.

When operating a BSS in FIPS mode

C.

When operating a BSS in a government facility

D.

When operating a BSS in the 6 GHz band

Question 6

How is the length of an AIFS calculated?

Options:

A.

DIFS + SIFS + AIFSN

B.

SIFS + AIFS * Time Unit

C.

SIFS * Slot Time + AIFSN

D.

AIFSN * Slot Time + SIFS

Question 7

When would you expect to see a Reassociation Request frame'

Options:

A.

Every time a STA associates to an AP to which it has previously been associated

B.

Only when a STA is using FT roaming

C.

Only when a STA roams back to an AP it has previously been associated with

D.

Every time a STA roams

Question 8

As a wireless network consultant you have been called in to troubleshoot a high-priority issue for one of your customers. The customer's office is based on two floors within a multi-tenant office block. On one of these floors (floor 5) users cannot connect to the wireless network. During their own testing the customer has discovered that users can connect on floor 6 but not when they move to the floor 5. This issue is affecting all users on floor 5 and having a negative effect on productivity.

To troubleshoot this issue, you perform both Spectrum and Protocol Analysis. The Spectrum Analysis shows the presence of Bluetooth signals which you have identified as coming from wireless mice. In the protocol analyzer you see the top frame on the network is Deauthentication frames. On closer investigation you see that the Deauthentication frames' source addresses match the BSSIDs of your customers APs and the destination address is FF:FF:FF:FF:FF:FF:FF.

What do you conclude from this troubleshooting exercise?

Options:

A.

The customer should replace all their Bluetooth wireless mice as they are stopping the users on floor 5 from connecting to the wireless network

B.

The users on floor 5 are being subjected to a denial of service attack, as this is happening across the entire floor it is likely to be a misconfigured WIPS solution belonging to the tenants on the floor below

C.

The customers APs are misbehaving and a technical support case should be open with the vendor

D.

The CCI from the APs on the floor 4 is the problem and you need to ask the tenant below to turn down their APs Tx power

Question 9

After examining a Beacon frame decode you see the SSID Element has a length of 0. What do you conclude about this frame?

Options:

A.

The frame is corrupted

B.

SSID elements always have a length of 0

C.

This is a common attack on WISP backend SQL databases

D.

The beacon is from a BSS configured to hide the SSID

Question 10

Which one of the following is not an 802.11 Management frame?

Options:

A.

PS-Poll

B.

Action

C.

Beacon

D.

Authentication

Question 11

What is the function of the PHY layer?

Options:

A.

Convert PPDUs to PSDUs for transmissions and PSDUs to PPDUs for receptions

B.

Convert MSDUs to PPDUs for transmissions and PPDUs to MSDUs for receptions

C.

Convert PPDUs to MSDUs for transmissions and MSDUs to PPDUs for receptions

D.

Convert PSDUs to PPDUs for transmissions and PPDUs to PSDUs for receptions

Question 12

You are analyzing a packet decode of a Probe Request and notice the SSID element has a length of zero. What do you conclude about the transmitting STA?

Options:

A.

The WLAN adaptor is configured in promiscuous mode

B.

The STA is operating in Ad-Hoc mode

C.

The STA's WLAN adaptor is disabled

D.

The STA is discovering a list of available BSSs

Question 13

The network administrator at ABC Engineering has taken a large packet capture from one of their APs running in monitor mode. She has very little knowledge of 802.11 protocols but would like to use the capture file to evaluate the overall health and performance of their wireless network. When she asks your advice, which tool do you recommend she opens the packet capture file with?

Options:

A.

Spectrum analyzer

B.

Python

C.

Capture visualization tool

D.

WLAN scanner

Question 14

Which one of the following is not a valid acknowledgement frame?

Options:

A.

RTS

B.

CTS

C.

Ack

D.

Block Ack

Question 15

What interframe space would be expected between a CIS and a Data frame?

Options:

A.

PIFS

B.

AIFS

C.

DIFS

D.

SIFS

Question 16

A manufacturing facility has installed a new automation system which incorporates an 802.11 wireless network. The automation system is controlled from tablet computers connected via the WLAN. However, the automation system has not gone live due to problem with the tablets connecting to the WLAN. The WLAN vendor has been onsite to perform a survey and confirmed good primary and secondary coverage across the facility. As a CWAP you are called in to perform Spectrum Analysis to identify any interference sources. From the spectrum analysis, you did not identify any interference sources but were able to correctly identify the issue. Which of the following issues did you identify from the spectrum analysis?

Options:

A.

The tablets are connecting to the wrong SSID

B.

The tablets are entering power save mode and failing to wake up to receive the access points transmissions

C.

A high noise floor has resulted in a SNR of less than 20dB

D.

There is a power mismatch between the APs and the clients

Question 17

Which common feature of a Spectrum Analyzer would be the best to help you locate a non-802.11 interference source?

Options:

A.

Max hold

B.

Min hold

C.

Location filter

D.

Device finder

Question 18

In the 2.4 GHZ band, what data rate are Probe Requests usually sent at from an unassociated STA?

Options:

A.

1 Mbps

B.

The minimum basic rate

C.

MCS 0

D.

6 Mbps

Page: 1 / 6
Total 60 questions