Skip to content

CWNA-108 Certified Wireless Network Administrator exams demo

Exam A
QUESTION 1
An RF signal sometimes bends as it passes through some material other than free space. What is the term
that describes this behavior?
A. Refraction
B. Warping
C. Scattering
D. Reflection
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 2
What can an impedance mismatch in the RF cables and connectors cause?
A. Increased range of the RF signal
B. Fewer MCS values in the MCS table
C. Increased amplitude of the RF signal
D. Excessive VSWR
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 3
What factor does not influence the distance at which an RF signal can be effectively received?
A. Receiving station’s radio sensitivity
B. Receiving station’s output power
C. Transmitting station’s output power
D. Free Space Path Loss
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 4
A WLAN transmitter that emits a 50 mW signal is connected to a cable with 3 dB loss. If the cable is connected
to an antenna with 9dBi gain, what is the EIRP at the antenna element?
A. 26 dBm
B. 13 dBm
C. 23 dBm
96CE4376707A97CE80D4B1916F054522
D. 10 dBm
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 5
In a long-distance RF link, what statement about Fade Margin is true?
A. A Fade Margin is unnecessary on a long-distance RF link if more than 80% of the first Fresnel zone is clear
of obstructions.
B. The Fade Margin is a measurement of signal loss through free space and is a function of frequency and
distance.
C. Fade Margin is an additional pad of signal strength designed into the RF system to compensate for
unpredictable signal fading.
D. The Fade Margin of a long-distance radio link should be equivalent to the receiver’s low noise filter gain.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 6
What wireless networking term describes the increase of RF energy in an intentional direction with the use of
an antenna?
A. Directed Radiation
B. Beam Digression
C. Passive Gain
D. Active Amplification
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 7
Which directional antenna types are commonly used by indoor Wi-Fi devices in a MIMO multiple spatial stream
implementation?
A. Dipole and yagi
B. Grid and sector
C. Patch and panel
D. Dish and grid
Correct Answer: C
Section: (none)
Explanation
96CE4376707A97CE80D4B1916F054522
Explanation/Reference:
QUESTION 8
What statement about the beamwidth of an RF antenna is true?
A. Horizontal and vertical beamwidth are calculated at the points where the main lobe decreases power by 3
dB.
B. The beamwidth patterns on an antenna polar chart indicate the point at which the RF signal stops
propagating.
C. When antenna gain is lower, the beamwidth is also lower in both the horizontal and vertical dimensions.
D. Vertical beamwidth is displayed (in degrees) on the antenna’s Azimuth chart.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 9
Which one of the following is not a factor considered when calculating the Link Budget for an outdoor point-topoint
WLAN bridge link?
A. Operating frequency
B. MU-MIMO capabilities of the bridges
C. Receive antenna gain
D. Transmit power
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 10
What best describes WPA2 in relation to 802.11 wireless networks?
A. WPA2 is the standard that defines security for WLANs.
B. WPA2 is a certification created by the Wi-Fi Alliance that validates devices correctly implement CCMP/
AES.
C. WPA2 is the second version of WPA and it enhances security through the use of TKIP instead of WEP.
D. WPA2 is specified in the 802.11 standard as implementing CCMP/AES.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 11
An IEEE 802.11 amendment is in the daft state. What impact does this draft amendment have on the 802.11
standard?
96CE4376707A97CE80D4B1916F054522
A. Devices will be released based on the draft amendment and the draft amendment features are part of the
standard.
B. No impact: Until an amendment is ratified, it does not become part of the standard.
C. No impact: Draft amendments do not become part of the standard until a working group is formed.
D. The standard is changed to reflect the new capabilities as soon as an amendment enters the draft stage.
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 12
You are implementing a VHT-capable AP. Which one of the following channels is available in the 802.11-2016
standard that was not available before the ratification of 802.11 ac?
A. 56
B. 161
C. 153
D. 144
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 13
What statement is true concerning the use of Orthogonal Frequency Division Multiplexing (OFDM) modulation
method in IEEE 802.11 WLANs?
A. OFDM implements BPSK modulation to allow for data rates up to 7 Gbps.
B. OFDM was first introduced in 802.11a and is used by the ERP, HT and VHT PHYs as well.
C. OFDM modulation is used only in 5 GHz 802.11 transmissions.
D. OFDM was used by Frequency Hopping Spread Spectrum (FHSS) PHY devices.
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 14
Which IEEE 802.11 physical layer (PHY) specification includes support for and compatibility with both ERP and
HR/DSSS?
A. DSSS (802.11-Prime)
B. OFDM (802.11a)
C. HT (802.11n)
D. VHT (802.11ac)
Correct Answer: C
96CE4376707A97CE80D4B1916F054522
Section: (none)
Explanation
Explanation/Reference:
QUESTION 15
An 802.11-based network uses an AP and has several connecting clients. The clients include iPhones, iPads,
laptops and one desktop. What WLAN use case is represented?
A. Ad-hoc
B. WPAN
C. BSS
D. IBSS
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 16
What factor is likely to cause the least impact on the application layer throughput of an 802.11n client station in
a 2.4 GHz HT BSS?
A. Increasing or decreasing the number of spatial streams in use by the client station and AP
B. Implementing Fast BSS Transition (FT) for roaming
C. Implementation of several other clients in the same BSS using 802.11g radios
D. RF interference from more than 10 nearby Bluetooth transmitters
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 17
What ID is typically mapped to an AP’s MAC address if a single BSS is implemented?
A. SSID
B. Device ID
C. VLAN ID
D. BSSID
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 18
What is appended to the end of each 802.11 data frame after the payload?
96CE4376707A97CE80D4B1916F054522
A. Preamble
B. MAC header
C. PHY header
D. FCS
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 19
When an ACK frame is not received by the transmitting STA, what is assumed?
A. The receiver processed the frame, but did not respond with an ACK frame because 802.11w is enabled
B. The frame was correctly delivered
C. The frame was not delivered and must be retransmitted
D. The receiver is offline
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 20
When a client station sends a broadcast probe request frame with a wildcard SSID, how do APs respond?
A. Each AP responds in turn after preparing a probe response and winning contention.
B. For each probe request frame, only one AP may reply with a probe response.
C. Each AP checks with the DHCP server to see if it can respond and then acts accordingly.
D. After waiting a SIFS, all APs reply at the same time with a probe response.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 21
What security solution is deprecated in the 802.11 standard and should never be used in any modern WLAN
deployment?
A. Shared Key Authentication
B. Open System Authentication
C. CCMP
D. AES
Correct Answer: A
Section: (none)
Explanation
96CE4376707A97CE80D4B1916F054522
Explanation/Reference:
QUESTION 22
You are reconfiguring an AP to use the short guard interval. How long will the new guard interval duration be
after the change?
A. 800 ns
B. 400 ns
C. 104 ms
D. 10 ms
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 23
What statement about the IEEE 802.11-2016 QoS facility is true?
A. 802.11 control frames are assigned to the 802.11 EF priority queue.
B. When the Voice queue has frames awaiting transmission, no data will be transmitted from the Best Effort
queue.
C. 802.11 QoS is achieved by giving high priority queues a statistical advantage at winning contention.
D. Four 802.1p user priorities are mapped to eight 802.11 transmit queues.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 24
You manage a WLAN with 100 802.11ac access points. All access points are configured to use 80 MHz
channels. In a particular BSS, only 40 MHz communications are seen. What is the likely cause of this
behavior?
A. All clients implement single spatial stream radios
B. The clients are all 802.11n STAs or lower
C. The AP is improperly configured to use only 40 MHz of the 80 MHz allocated bandwidth
D. The short guard interval is also enabled
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 25
When compared with legacy Power Save mode, how does VHT TXOP power save improve battery life for
devices on a WLAN?
96CE4376707A97CE80D4B1916F054522
A. Legacy Power Save mode was removed in the 802.11ac amendment.
B. VHT TXOP power save allows the WLAN transceiver to disable more components when in a low power
state.
C. VHT TXOP power save uses the partial AID in the preamble to allow clients to identify frames targeted for
them.
D. VHT TXOP power save allows stations to enter sleep mode and legacy Power Save does not.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 26
What 802.11 network configuration would result in multiple stations broadcasting Beacon frames with the same
BSSID but with different source addresses?
A. Multiple APs have been loaded with the same configuration from an image file.
B. A single AP supports multiple BSSs with different SSIDs.
C. An IBSS is used instead of a BSS.
D. An SCA network is in use.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 27
What primary metric of scanning can stations use to select the best AP for connectivity to the desired BSS?
A. Signal strength of AP beacons received.
B. PING latency when testing against an Internet server.
C. Throughput speed in Mbps.
D. FCS errors in frames transmitted to and from the AP.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 28
Lynne runs a small hotel, and as a value added service for his customers he has implemented a Wi-Fi hotspot.
Lynne has read news articles about how hackers wait at hotspots trying to take advantage of unsuspecting
users. He wants to avoid this problem at his hotel.
What is an efficient and practical step that Lynne can take to decrease the likelihood of active attacks on his
customers’ wireless computers?
A. Enable station-to-station traffic blocking by the access points in the hotel.
B. Implement Network Access Control (NAC) and require antivirus and firewall software along with OS
patches.
96CE4376707A97CE80D4B1916F054522
C. Implement an SSL VPN in the WLAN controller that initiates after HTTPS login.
D. Require EAP-FAST authentication and provide customers with a username/password on their receipt.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 29
You have been tasked with creating a wireless link between two buildings on a single campus. The link must
support at least 150 Mbps data rates. What kind of WLAN technology role should you deploy?
A. WPAN
B. IBSS
C. Wireless bridging
D. Access BSS
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 30
When implementing PoE, what role is played by a switch?
A. PSE
B. Midspan injector
C. PD
D. Power splitter
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 31
A dual-band 802.11ac AP must be powered by PoE. As a class 4 device, what power level should be received
at the AP?
A. 30 W
B. 12.95 W
C. 25.5 W
D. 15.4 W
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
96CE4376707A97CE80D4B1916F054522
QUESTION 32
A WLAN is implemented using wireless controllers. The APs must locate the controllers when powered on and
connected to the network. Which one of the following methods is commonly used to locate the controllers by
the APs?
A. NTP
B. DHCP
C. SNMP
D. GRE
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 33
You are implementing a multi-AP WLAN and fast secure roaming is essential. Which one of the following
methods is an IEEE 802.11 standard method for fast roaming?
A. FT
B. OKC
C. Load balancing
D. Band steering
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 34
In an 802.11 2.4 GHz system, what 22 MHz channels are considered non-overlapping?
A. 7 and 11
B. 2 and 8
C. 1 and 5
D. 4 and 6
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 35
The center frequency of channel 1 in the 2.4 GHz band is 2.412 GHz (2412 MHz). What is the center
frequency of channel 4?
A. 2.427
B. 2.422
96CE4376707A97CE80D4B1916F054522
C. 2.413
D. 2.417
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 36
The requirements for a WLAN you are installing state that it must support unidirectional delays of less than 150
ms and the signal strength at all receivers can be no lower than -67 dBm. What application is likely used that
demands these requirements?
A. VoIP
B. E-Mail
C. FTP
D. RTLS
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 37
You are deploying a WLAN with the access points configured for 10 mW of output power on the 2.4 GHz
radios and 20 mW of output power on the 5GHz radios. Some semi-directional antennas are also in use. What
kind of deployment is described?
A. SOHO
B. Residential
C. High density
D. Standard office
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 38
Option 43 must be configured to allow access points to locate controllers. In what network service should this
option be configured?
A. DNS
B. LDAP
C. DHCP
D. RADIUS
Correct Answer: C
Section: (none)
96CE4376707A97CE80D4B1916F054522
Explanation
Explanation/Reference:
QUESTION 39
What statement about 802.3, Clause 33 Power over Ethernet is true?
A. When using CAT5 cabling, you increase the maximum draw available to the PD over that available with
CAT6.
B. Only endpoint PSEs are supported.
C. Only midspan PSEs are supported.
D. The lowest voltage drop is achieved when using CAT6 cable instead of Cat5 or CAT5e.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 40
What statement describes the authorization component of a AAA implementation?
A. Verifying that a user is who he says he is.
B. Implementing a WIPS as a full-time monitoring solution to enforce policies.
C. Granting access to specific network services or resources according to a user profile.
D. Validating client device credentials against a database.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 41
You are the network administrator for ABC Company. Your manager has recently attended a wireless security
seminar. The seminar speaker taught that a wireless network could be hidden from potential intruders if you
disabled the broadcasting of the SSID in Beacons and configured the access points not to respond to Probe
Request frames that have a null SSID field.
Your manager suggests implementing these security practices. What response should you give to this
suggestion?
A. Any 802.11 protocol analyzer can see the SSID in clear text in frames other than Beacons frames. This
negates any security benefit of trying to hide the SSID in Beacons and Probe Response frames.
B. To improve security by hiding the SSID, the AP and client stations must both be configured to remove the
SSID from association request and response frames. Most WLAN products support this.
C. Any tenants in the same building using advanced penetration testing tools will be able to obtain the SSID by
exploiting WPA EAPOL-Key exchanges. This poses an additional risk of exposing the WPA key.
D. This security practice prevents manufacturers’ client utilities from detecting the SSID. As a result, the SSID
cannot be obtained by attackers, except through social engineering, guessing, or use of a WIPS.
Correct Answer: A
Section: (none)
96CE4376707A97CE80D4B1916F054522
Explanation
Explanation/Reference:
QUESTION 42
What cipher suite is specified by the 802.11-2016 standard and is not deprecated?
A. Wired Equivalent Privacy
B. Temporal Key Integrity Protocol
C. Counter Mode with CBC-MAC Protocol
D. Extensible Authentication Protocol
Correct Answer: C
Section: (none)
Explanation


Buy full version for more questions
Previous article NSE5_FAZ-6.2 Fortinet NSE 5 - FortiAnalyzer 6.2 exams demo
Next article MS-700 Managing Microsoft Teams exams demo

Leave a comment

* Required fields