Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: suredis

CWNP CWNA-107 Certified Wireless Network Administrator Exam Practice Test

Page: 1 / 16
Total 156 questions

Certified Wireless Network Administrator Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$40.25  $114.99

PDF Study Guide

  • Product Type: PDF Study Guide
$35  $99.99
Question 1

When antenna gain is reported in dBI, the gain of the antenna is compared to what theoretical antenna?

Options:

A.

Yagi

B.

Dipole

C.

Rubber ducky

D.

Isotropic radiator

Question 2

You administer a small WLAN with nine access points. As a small business, you do not run a RADIUS server and use WPA2-Personal for security. Recently, you changed the passphrase for WPA2-Personal in all APs and clients. Several users are now reporting the inability to connect to the network at times and it is constrained to one area of the building. When using a WLAN scanner, you see that the AP covering that area is online and has a strong signal. No other changes have been made to the environment and all access points are the same model. What is the likely problem?

Options:

A.

The AP that covers the problem area requires a firmware update

B.

The clients are improperly configured

C.

The AP that covers the problem area has failed

D.

The AP that covers the problem area is improperly configured

Question 3

Your consulting firm has recently been hired to complete a site survey for a company. Your engineers use predictive design software for the task, but the company insists on a pre-deployment site visit.

What task should be performed as part of the pre-deployment visit to prepare for a predictive design?

Options:

A.

Evaluate the building materials at ABC’s facility and confirm that the floor plan documents are consistent with the actual building

B.

Install at least one AP on each side of the exterior walls to test for co-channel interference through these walls

C.

Test several antenna types connected to the intended Aps for use in the eventual deployment

D.

Collect information about the company’s security requirements and the current configuration of their RADIUS and user database servers

Question 4

What statement about 802.11 WLAN bridges is true?

Options:

A.

WLAN bridges only work in the 2.4 GHz frequency band and they support only SISO communications

B.

WLAN bridges must use a channel with acceptable SNR at both transceivers to maintain the desired data rate bi-directionally

C.

WLAN bridges may support MIMO communications, but only if used in the 5 GHz frequency band

D.

WLAN bridges must be implemented such that no interference occurs on the channel anywhere between the two endpoints used to establish the bridge

Question 5

What wireless networking term describes the increase of RF energy in an intentional direction with the use of an antenna?

Options:

A.

Directed Radiation

B.

Active Amplification

C.

Passive Gain

D.

Beam Digression

Question 6

You have been tasked with creating a wireless link between two buildings on a single campus. The link must support at least 150 Mbps data rates. What kind of WLAN technology role should you deploy?

Options:

A.

IBSS

B.

WPAN

C.

Access BSS

D.

Wireless bridging

Question 7

You administer a WLAN that offers a guest SSID of GUESTNWORK. User connect to the GUESTNWORK SSID, but report that they cannot browse the internet. The devices simply report no internet connection. What common problem causes this scenario?

Options:

A.

NTP issues

B.

Hardware issues

C.

IP routing issues

D.

Captive portal issues

Question 8

You are configuring an access point to use channel 128. What important fact should be considered about this channels?

Options:

A.

It is a 22 MHz channel so it will overlap with the channels above and below it

B.

It is a 2.4 GHz frequency band 40 MHz channel, so it should not be used

C.

It is a channel that is unsupported by most access points

D.

It is a channel that likely requires DFS when used

Question 9

A WLAN is implemented using wireless controllers. The APs must locate the controllers when powered on and connected to the network. Which one of the following methods is commonly used to locate the controllers by the APs?

Options:

A.

DHCP

B.

GRE

C.

NTP

D.

SNMP

Question 10

You manage a WLAN with 100 802.11ac access points. All access points are configured to use 80 MHz channels. In a particular BSS, only 40 MHz communications are seen. What is the likely cause of this behavior?

Options:

A.

The short guard interval is also enabled.

B.

The clients are all 802.11n STAs or lower

C.

The AP is improperly configured to use only 40 MHz of the 80 MHz allocated bandwidth

D.

All clients implement single spatial stream radios

Question 11

You are deploying a WLAN with the access points configured for 10 mW of output power on the 2.4 GHz radios and 20mW of output power on the 5GHz radios. Some semi-directional antennas are also in use. What kind of deployment is described?

Options:

A.

High density

B.

SOHO

C.

Standard office

D.

Residential

Question 12

You are managing a wireless access point in autonomous mode using the Web based interface. You capture traffic during this management task and notice that you can see the HTML code of the Web pages for access point management. What error in administration could be the cause of the security concern?

Options:

A.

A VPN with the AP is not established

B.

WPA2 is disabled on the WLAN

C.

HTTP is in use instead of HTTPS

D.

IPsec is not in use of the management connection as recommended

Question 13

You are installing AP to be used by 23 laptops. All laptops will connect on the 5 GHz frequency band. A neighbor network uses channels 1 and 6. What channel should be used for this AP and why?

Options:

A.

Channel 6, because it is always best to use this channel

B.

A 5 GHz channel, because channels 1 and 6 are 2.4 GHz channels they have no impact on the decision

C.

Channel 1, because it is best to use the channel with the lowest frequency

D.

Channel 11, because channels 1 and 6 are in use nearby

Question 14

What statement about 802.3, Clause 33 Power over Ethernet is true?

Options:

A.

Only midspan PSEs are supported.

B.

The lowest voltage drop is achieved when using CAT6 instead of Cat5 or CAT5e.

C.

Only endpoint PSEs are supported.

D.

When using CAT5 cabling, you increase the maximum draw available to the PD over that available with CAT6.

Question 15

You are evaluating access points for use in the 5GHz frequency band. What PHY supports this band and supports 80 MHz channels?

Options:

A.

OFDM

B.

HT

C.

VHT

D.

ERP

Question 16

What Linux shell command can be used to view the hardware and PHY capabilities of a wireless adapter in detail including channel widths, output power setting, channels supported, and more?

Options:

A.

ifconflg

B.

iw phy

C.

netsh wlan show device

D.

iwconflg

Question 17

You are deploying a WLAN monitoring solution that utilizes distributed sensor devices. Where should sensors be deployed for best results?

Options:

A.

Every 20 feet and alongside each AP

B.

Closer to the APs

C.

Closer to the client devices

D.

In critical areas where WLAN performance must be high

Question 18

What is always required to establish a high quality 2.4 GHz RF link at a distance of 3 miles (5 kilometers)?

Options:

A.

Grid antennas at each endpoint

B.

A Fresnel Zone that is at least 60% clear of obstructions

C.

A minimum antenna gain of 11 dBi at both endpoints

D.

Minimum output power level of 2 watts

Question 19

What cipher suite is specified by the 802.11-2016 standard and is not deprecated?

Options:

A.

Temporal Key Integrity Protocol

B.

Extensible Authentication Protocol

C.

Counter Mode with CBC- MAC Protocol

D.

Wired Equivalent Privacy

Question 20

ABC Company is planning a point-to-multipoint bridge deployment with standalone (autonomous) 802.11 bridge units. 802.1X/EAP will be used for bridge authentication. A Linux-based RADIUS server will be used for authentication. What device in the bridge implementation acts as the 802.11X Authenticator?

Options:

A.

All non-root bridges

B.

The root bridge

C.

The Ethernet switch

D.

The RADIUS server

Question 21

What ID is typically mapped to an AP’s MAC address if a single BSS is implemented?

Options:

A.

VLAN ID

B.

BSSID

C.

Device ID

D.

SSID

Question 22

What best describes WPA2 in relation to 802.11 wireless networks?

Options:

A.

WPA2 is specified in the 802.11 standard as implementing CCMP/AES.

B.

WPA2 is the standard that defines security for WLANs.

C.

WPA2 is a certification created by the Wi-Fi Alliance that validates devices correctly implement CCMP/AES.

D.

WPA2 is the second version of WPA and it enhances security through the use of TKIP instead of WEP.

Question 23

Which one of the following is not a factor considered when calculating the Link Budget for an outdoor point-to-point WLAN bridge link?

Options:

A.

MU-MIMO capabilities of the bridges

B.

Receive antenna gain

C.

Transmit power

D.

Operating frequency

Page: 1 / 16
Total 156 questions