Certified Wireless Network Administrator v1.0

Page:    1 / 8   
Exam contains 119 questions

You are using a tool that allows you to see signal strength for all APs in the area with a visual representation. It shows you SSIDs available and the security settings for each SSID. It allows you to filter by frequency band to see only 2.4 GHz networks or only 5 GHz networks. No additional features are available. What kind of application is described?

  • A. WLAN Scanner
  • B. Site Survey Software
  • C. Protocol Analyzer
  • D. Spectrum Analyzer


Answer : A

You are troubleshooting a WLAN problem and you suspect hidden node as the cause. What should you look for in a protocol analyzer?

  • A. Frames with the retry bit set to 0
  • B. Frames transmitted from the AP without acknowledgement
  • C. Frames with the HN bit set to 1
  • D. Retransmitted frames from multiple STAs with higher retry counts than other STAs


Answer : D

What phrase defines Equivalent Isotropically Radiated Power (EIRP)?

  • A. The power output from the radio after cable losses
  • B. The highest RF signal strength that is transmitted from a given antenna
  • C. Power supplied from the transmission line to the antenna input
  • D. The power output from the radio into the RF cable


Answer : B

What statement about 802.11 WLAN bridges is true?

  • A. WLAN bridges must be implemented such that no interference occurs on the channel anywhere in the physical space between the two endpoints used to establish the bridge
  • B. WLAN bridges may support MIMO communications, but only if used in the 5 GHz frequency band
  • C. WLAN bridges only work in the 2.4 GHz frequency band and they support only SISO communications
  • D. WLAN bridges must use a channel with acceptable SNR at both transceivers to maintain the desired data rate bi-directionally


Answer : D

What authentication method is referenced in the 802.11-2016 and 802.11-2020 specifications and is recommended for robust WLAN client security?

  • A. WEP
  • B. SSL
  • C. 802.1X/EAP
  • D. IPSec


Answer : C

What frame type is used in the process of reserving the wireless medium for the transmission of high data rate frames that may not be understood by all clients connected to the BSS?

  • A. PS-Poll
  • B. Beacon
  • C. Authentication
  • D. RTS


Answer : D

When antenna gain is reported in dBi, the gain of the antenna is compared to what theoretical radiator?

  • A. Anthropomorphic radiator
  • B. Dipole radiator
  • C. Isotropic radiator
  • D. End-fire radiator


Answer : C

When replacing the antenna of a WLAN device with a similar antenna type that has a higher passive gain, what antenna characteristic will decrease?

  • A. Range
  • B. Beamwidth
  • C. Active gain
  • D. Receive sensitivity


Answer : B

You are installing an AP to be used by 27 laptops. All laptops will connect on the 5 GHz frequency band. A neighbor network uses channels 1 and 6 only. No other networks are seen. Given this information, what channel should be used for this AP and these 27 laptops and why?

  • A. Channel 1, because it is best to use the channel with the lowest frequency
  • B. Channel 6, because it is always best to use this channel as it resides near the middle of the band
  • C. Any 5 GHz channel, because channels 1 and 6 are 2.4 GHz channels they have no impact on the decision
  • D. Channel 11, because channels 2 and 6 are in use nearby


Answer : C

XYZ Company has decided to install an 802.11 WLAN system that will support 1083 wireless users, but they are concerned about network security. XYZ is interested in deploying standardized security features. In addition to WPA2-Enterprise with PEAP and role-based access control, XYZ would like to support management frame protection as well as a fast secure roaming protocol for future mobile handsets.
As XYZ Company selects a product to deploy, what two IEEE amendments, which are included in 802.11-2020, should be supported to provide the management frame protection and fast secure roaming security features?

  • A. 802.11k and 802.11v
  • B. 802.11j and 802.11k
  • C. 802.11r and 802.11w
  • D. 802.11j and 802.11z


Answer : C

What 802.11 PHY uses available space in very low frequency ranges that is not in use at the time by broadcast video signals?

  • A. DSSS
  • B. TVHT
  • C. DMG
  • D. S1G


Answer : B

What security option for 802.11 networks supports SAE and requires protected management frames?

  • A. WPA2
  • B. WPA3
  • C. OWE
  • D. WPA


Answer : B

What common feature of MDM solutions can be used to protect enterprise data stored on mobile devices if those devices are stolen?

  • A. Self-registration
  • B. Over-the-air registration
  • C. Wi-Fi encryption
  • D. Containerization


Answer : D

You are evaluating a connection that states the data rate is 150 Mbps. What is the expected throughput of this connection?

  • A. 54 Mbps because that is the actual maximum throughput of an 802.11 connection
  • B. Less than 150 Mbps because of 802.11 overhead and contention
  • C. More than 150 Mbps because of compression
  • D. 150 Mbps because the data rate is equal to the throughput


Answer : B

You are configuring an access point to use channel 128. What important fact should be considered about this channel?

  • A. It is a 2.4 GHz frequency band 40 MHz channel, so it should not be used
  • B. It is a channel that may require DFS when used
  • C. It is a 22 MHz channel so it will overlap with the channels above and below it
  • D. It is a channel that is unsupported by all access points in all regulatory domains


Answer : B

Page:    1 / 8   
Exam contains 119 questions

Talk to us!


Have any questions or issues ? Please dont hesitate to contact us

Certlibrary.com is owned by MBS Tech Limited: Room 1905 Nam Wo Hong Building, 148 Wing Lok Street, Sheung Wan, Hong Kong. Company registration number: 2310926
Certlibrary doesn't offer Real Microsoft Exam Questions. Certlibrary Materials do not contain actual questions and answers from Cisco's Certification Exams.
CFA Institute does not endorse, promote or warrant the accuracy or quality of Certlibrary. CFA® and Chartered Financial Analyst® are registered trademarks owned by CFA Institute.
Terms & Conditions | Privacy Policy