CWNA-108 Practice Test 1 Flashcards
An RF wave is weaker after traveling through some material in its path, what is the term used to describe what happened as the RF wave passed through the material?
Scattering
Refraction
Absorption
Reflection
Absorption
What occurs naturally as an RF wave travels through space between antennas?
Phase altering
FSPL
Amplification
VSWR
FSPL (Free space path loss)
What is a relative unit of measurement that allows comparison of the amplitude between two signals?
RSSI
mW
dBm
dB
dB (decibel)
A AP transmits with an output power level of 25 mW and uses a 3 dBi antenna. What is the EIRP?
17 dBm
10 dBm
3 dBm
5 dBm
17 dBm
When an RF link in a bridging implementation spans more than 7 miles, what must be considered that need not typically be considered otherwise?
SNR
FSPL
Output power
Earth bulge
Earth bulge
What phrase defines an Intentional Radiator?
The power provided to the antenna including radio output power and all cable and connector losses
The power output from the antenna
The power received by the receiving antenna
The power output from the radio into the RF cable
The power provided to the antenna including radio output power and all cable and connector losses
What multi-antenna technology used at the transmitter to improve the signal received at the receiver was first introduced in 802.11n and standardized on a single option in 802.11ac?
Diversity
MRC
STBC
Transmit beamforming
Transmit beamforming
What new transmission technology was introduced in 802.11ac that allows for an AP to transmit to more than one client STA concurrently?
MRC
MIMO
TxBF
MU-MIMO
MU-MIMO
When installing an omni-directional SISO antenna for outdoor coverage, what kind of mount is commonly used that includes u-brackets?
Pole/mast mount
Ceiling mount
Desktop mount
Wall mount
Pole/mast mount
What organization certifies equipment to interoperate with other 802.11-based equipment?
IETF
FCC
Wi-Fi Alliance
IEEE
Wi-Fi Alliance
When a new PHY is to be created for the 802.11 standard, what is formed first?
Draft
Proposals
Ratified amendment
Working group
Working group
What PHY operates in 2.4 GHz and is capable of a maximum of 11 Mbps?
HT
HR/DSSS
DSSS
ERP
HR/DSSS
In addition to modulation, guard interval, channel width, and the number of spatial streams, what impacts the data rate according to the 802.11-2016 MCS tables?
Coding
RSSI
Noise floor
Signal strength
Coding
What 2.4 GHz channels are available worldwide in all regulatory domains?
1 through 13
1 through 12
1 through 11
1 through 14
1 through 11
When multiple APs are used with a shared distribution system, such as Ethernet, what kind of WLAN service set is in use?
IBSS
ESS
Mesh BSS
Ad-hoc
ESS (Extended Service Set)
What is typically mapped to the MAC address of the AP when only a single BSS is implemented by the AP?
DSM
BSSID
ESSID
SSID
BSSID
What kind of roaming may take place and include Layer 1 roaming?
Roaming from Wi-Fi to Token Ring
Roaming from Wi-Fi to Ethernet
Band roaming from 2.4 GHz to 5 GHz
No roaming involves Layer 1
Band roaming from 2.4 GHz to 5 GHz
When is an authentication response frame used?
When a probe request frame is received
The 802.11 standard only specifies an authentication frame and not request and response frames for authentication
When an authentication request frame has been received
When a client accidentally disconnects from the AP
The 802.11 standard only specifies an authentication frame and not request and response frames for authentication
What is required before a Block Acknowledgement can be used?
802.11i must be implemented in the BSS
A sounding exchange must take place
802.11g must be the active PHY
A block acknowledgement request exchange must take place
A block acknowledgement request exchange must take place
A client STA is sending Probe Request frames on several channels. What kind of WLAN scanning is in use?
Channel pruning
Passive scanning
Active scanning
Port scanning
Active scanning
What is the basic process of Open System authentication?
Authentication request, Probe response, Association request, Probe response
Authentication request, Authentication response, Association request, and Association response
Authentication request, ID request, ID response, Authentication response, Association request, and Association response
Authentication request, Association response
Authentication request, Authentication response, Association request, and Association response
What defines data rates for HT and VHT devices?
They are fixed at 1, 2, 5.5 and 11 Mbps
They are fixed at 150, 180 and 240 Mbps
MCS tables
PHY parameter tables
MCS tables (The Modulation and Coding Scheme)
What is in HT and VHT PHY preambles that allows for the synchronization of the receiving radio?
Training fields
Data rate specification
Length field
Duration field
Training fields
What interframe space is used before an Ack frame?
EIFS
SIFS
DIFS
AIFS
SIFS
What is used to determine the number of slot times used in the formula to calculate an AIFS duration when EDCA is used?
The AIFS duration is fixed for each PHY
AIFS number (AIFSN)
Data rate
Frame duration
AIFS number (AIFSN)
What kind of WLAN management solution does not include centralized 802.11 MAC processing of any kind, but does include centralized configuration of the APs without the use of the Internet?
Cloud-based
Controller-based
Virtual controller-based
WNMS-based
WNMS-based
A push-to-talk device has similar requirements most alike to what other common WLAN client device?
802.11 video cameras
Laptop with standard data applications
VoIP handset
Handheld scanners
VoIP handset
When implementing a WLAN for corporate data access, you are planning for WPA2 implementation. What issue related to planning corporate data access are you considering?
Ensure availability
Ensure sufficient coverage
Ensure sufficient security
Ensure sufficient throughput
Ensure sufficient security
When implementing a WLAN bridge link, you must ensure 60% clearance of what defined zone?
Antenna height zone
PoE zone
Fresnel zone
BSA zone
Fresnel zone
You are deploying an RTLS solution. What is an important requirement of most RTLS implementations?
Use of at least two sensors for every AP
Sensors placed around the facility perimeter
Implementation of VPN connectivity from the sensors to the monitoring server
Use of at least one sensor for every STA
Sensors placed around the facility perimeter
You have implemented a feature on the APs that temporarily ignores 2.4 GHz probe requests in order to direct more client STAs to 5 GHz channels. What is this feature?
Band Steering
RRM
AirTime Fairness
Passpoint
Band Steering
What can you do to help mitigate DHCP pool depletion issues without requiring user configuration actions?
Use DHCP for wired clients only and ask guests to manually configure IP settings
Implement shorter lease durations
Implement longer lease durations
Implement smaller scopes
Implement shorter lease durations
In addition to mapping IP addresses to host names for client devices, what may DNS be used for in a controller-based environment?
Synchronizing time clocks
Configuring IP settings in client devices
Encrypting Internet communications
Location of controllers by APs
Location of controllers by APs
When implementing SSIDs in APs, to what are they typically mapped for better control of access to resources on the LAN?
User profiles
VLANs
MAC addresses
IP addresses
VLANs
What may force an organization to implement a PKI for practical application in a WLAN?
The use of PEAP
The use of frame aggregation
The use of EAP-TLS
The use of WPA2-Personal
The use of EAP-TLS
What feature of WLAN APs may provide for automatic negotiation of AP channel and power settings among the APs or within the controllers?
Load balancing
RRM
AirTime Fairness
Band Steering
RRM (Radio Resource Management)
What common feature of MDM solutions can be used to prevent users from causing data leaks by taking photos of sensitive documents?
Over-the-air registration
Onboarding
Self-registration
Feature management
Feature management
Why is it unlikely that an 802.11ac wave 2 AP with four spatial streams will exceed the capacity of a 1 Gbps Ethernet link?
Because users just don’t use Wi-Fi that much
Because the AP will compress data sent onto the wired network
Because the 1 Gbps Ethernet link can actually transmit 2 Gbps of data when the downlink and uplink wire pairs are both used for uplink transmission
Because 802.11 network operations consume significant airtime and clients connect at varying data rates resulting in much lower useful data throughput than the maximum data rate of 802.11ac 4 stream APs
Because 802.11 network operations consume significant airtime and clients connect at varying data rates resulting in much lower useful data throughput than the maximum data rate of 802.11ac 4 stream APs
You have connected a controller-based AP to the LAN. The controller is located using DNS and you have verified that the proper host records are in DNS and that DHCP is properly configuring the AP. This is the only AP on the subnet in question. The AP cannot reach the controller, but it can reach other devices on the same subnet. It has an IP address of 192.168.12.37 based on the DHCP logs. What should you check among the listed items in an attempt to resolve the issue?
Connect a laptop to the same Ethernet cable and validate DHCP operations
Make sure the Ethernet cable is plugged into the AP
Connect a laptop to the same Ethernet cable and verify DNS with NSLOOKUP
Check the ACLs in the router connected to the subnet
Check the ACLs in the router connected to the subnet
What feature of APs is often thought to be a security solution, but provides no real security because of simple spoofing methods?
WEP
Shared Key Authentication
SSID hiding
MAC filtering
MAC filtering
What organization defines the EAP protocol used in enterprise WLAN security?
FCC
Wi-Fi Alliance
IETF
IEEE
IETF
What is a primary benefit of EAP-TLS, EAP-TTLS, and PEAP that is not available in WEP and Shared Key Authentication?
Dynamic encryption keys
Authentication
Encryption
No certificate requirements
Dynamic encryption keys
What encryption solution is provided in the 802.11 standard and is not deprecated?
RC5
RC4
SHA1
AES
AES
What is needed, in addition to the RADIUS server IP address and ports, to configure an AP to use a given RADIUS server?
RADIUS server MAC address
VPN type used to connect to the RADIUS server
Shared secret
RADIUS server host name
Shared secret
You wish to administer an AP over the wired network using the CLI. What protocol should you use to prevent eavesdropping on the administrative tasks?
SNMPv3
HTTP
SSH2
Telnet
SSH2
A manager has asked you to place the APs above the ceiling in a WLAN deployment. He has requested this for aesthetic reasons. You know this is not the best decision, what do you tell the manager in an attempt to influence him to make a better decision?
It is always against regulations to place APs above the ceiling.
Placing the APs above the ceiling will prevent any possible configuration that would allow for client access.
Placing the APs above the ceiling will alter the requirements for the WLAN and may require more APs than would be otherwise needed.
It is impossible to power APs placed above the ceiling.
Placing the APs above the ceiling will alter the requirements for the WLAN and may require more APs than would be otherwise needed.
You are using an 802.11 VoIP handset and walking around the facility frome end-to-end while on a call. What might you be testing in a newly deployed WLAN?
Battery life of the VoIP handset
Security capabilities
Audio noise from RF energy
Roaming capabilities
Roaming capabilities
You are attempting to locate the cause of a performance problem in two WLAN cells in a mostly overlapping coverage area. You note that one AP is on channel 1 and the other is on channel 1 as well. When you document your findings, what term do you use to describe the problem in this configuration?
ZigBee interference
ACI
CCI
Non-Wi-Fi interference
CCI
In addition to capacity analysis results, what should be included in a site survey report to ensure WLAN users are provided with connectivity?
Coverage analysis results
Application Layer protocol availability analysis results
WAN interface analysis results
Layer 4 protocol availability analysis results
Coverage analysis results
An organization is planning to implement a new WLAN. They will install 20 APs and place them all on the same IP subnet so no IP roaming will be required for WLAN clients. The DHCP server will use the subnet of 192.168.10.0/24. They expect an average of 18 client STAs per AP. What is your immediate concern with this plan?
The DHCP pool is not large enough
WLANs must use the 10.x.x.x networks
APs cannot handle more than 15 STAs per AP
IP roaming occurs even when all APs are on the same IP subnet
The DHCP pool is not large enough
When is a three-dimensional RF channel plan always required?
When the WLAN is near an airport or military base
When the WLAN exists in an industrial environment
When a multi-floor WLAN is implemented
When the Fresnel zone is 80% blocked
When a multi-floor WLAN is implemented
What step comes after “Define the possible causes” when considering the CWNP troubleshooting methodology?
Narrow to the most likely cause
Create a plan of action and implement it
Document the results and close the case
Escalate the problem to the wireless vendor support staff
Narrow to the most likely cause
You are passing random UDP data across the WLAN and measuring results with iPerf. What kind of test is most likely being performed?
Signal strength monitoring
Throughput test
Interference location
Black box testing
Throughput test
Which one of these is not a good use of a spectrum analyzer?
Determining retry rates on the WLAN
Locating sources of RF interference
Evaluating RF airtime utilization in a channel
Viewing historical RF activity in a channel
Determining retry rates on the WLAN
In what band do many USB 3 devices cause significant localized (within 3-5 meters) RF interference?
2.4 GHz
60 GHz
5 GHz
Sub-1 GHz
2.4 GHz
You are reporting on the RF environment in your facility. The manager asks you do describe the SNR noted in the report. Which of the following is the best explanation?
SNR is the difference between the SOM and the Fade Margin
SNR is the simple noise reduction algorithm used on filters on 802.11 adapters
SNR is the difference between the noise in the environment and the RF signal strength
SNR is the interference caused by USB 3.0 devices
SNR is the difference between the noise in the environment and the RF signal strength
What common building component is likely to cause coverage holes in a WLAN deployment if not considered and resolved in the WLAN design?
Windows
Elevators
Cubicle partitions
Tile floors
Elevators
An AP that uses PoE powers up, but upon inspection you notice that only one radio (the 2.4 GHz radio) is active. You verify that the configuration has both the 2.4 GHz and 5 GHz radios enabled. When you connect the AP to wall power, both radios work as expected. What is a likely cause of this problem?
The AP firmware is faulty
Insufficient PoE power
WPA is enabled on the 5 GHz radio, causing it to be disabled
The external antennas for the 5 GHz radio are not connected
Insufficient PoE power
You recently configured five laptops for access to the corporate wireless network. Four of them work as expected and the fifth one stopped working yesterday. When you talk to the users, you discover that the four working laptops have suspended and resumed several times but never rebooted. The fifth non-working laptop has been rebooted. The non-connecting computer is unable to connect regardless of location. Everything else works as expected on the fifth computer. What may be causing the problem?
Interference from non-Wi-Fi sources
Firmware updates on the fifth computer
Faulty new drivers on the fifth computer
Poor signal strength
Faulty new drivers on the fifth computer
You administer a WLAN that offers a guest SSID of CORPGUEST. Users connect to the CORPGUEST SSID, but report that they cannot access Internet web sites. The devices indicate no Internet connection. What common problem causes this scenario?
DNS failure
IP routing issues
NTP issues
Hardware issues
DNS failure