New Year Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

CWNP CWNA-106 - Certified Wireless Network Administrator

Page: 2 / 4
Total 120 questions

What statements describe industry practices for communication protocols between WLAN controllers and controller-based APs? (Choose 2)

A.

All vendors use the same protocol so that APs will interoperate with WLAN controllers from other vendors.

B.

Some vendors use proprietary protocols, and some vendors use protocols based on public standards like RFCs.

C.

For most vendors, the controller-based APs maintain data and control tunnels with at least two controllers for immediate failover and redundancy.

D.

All vendors support at least one L2 or L3 broadcast protocol for controller discovery by controller-based APs.

E.

All vendors recommend using L2 (instead of L3) controller discovery and tunneling protocols in large enterprises.

ABC Company has thousands of Wi-Fi users accessing their network on a daily basis. Their WLAN consists of 700 access points, 6 WLAN controllers, and a wireless network management system.

What network functions are performed by the enterprise-class WNMS? (Choose 3)

A.

RF pre-deployment planning and post-deployment reporting of access point locations on a floor plan

B.

Performance and security monitoring of WLAN controllers with alarms and notifications for administrative staff

C.

Radio management, fast roaming, key caching, and other centralized control plane operations

D.

Centralized bridging of guest data traffic and application of firewall and QoS policies to data

E.

Management of WLAN controller configuration and provisioning of firmware updates

F.

Generating, encrypting, and decrypting 802.11 frames and collecting RF radio data.

The 802.11 protocol specifies a fundamental channel access method that is required for all stations and is used in all IBSS and BSS networks.

What is this fundamental channel access method called?

A.

DCF

B.

PCF

C.

HCF

D.

EDCAF

E.

HCCA

F.

PCF/CA

What terms accurately complete the following sentence?

The IEEE 802.11-2012 standard specifies mandatory support of the ___________ cipher suite for Robust Security Network Associations, and optional use of the ___________ cipher suite, which is designed for use with pre-RSNA hardware.

A.

CCMP, TKIP

B.

802.1X/EAP, WEP

C.

TLS, SSL

D.

CCKM, WEP

E.

RC5, RC4

What factors will have the most significant impact on the amount of wireless bandwidth available to each station within a BSS? (Choose 2)

A.

The number of client stations associated to the BSS

B.

The power management settings in the access point’s beacons

C.

The presence of co-located (10m away) access points on non-overlapping channels

D.

The data rates at which nearby client stations are transmitting and receiving data

E.

The layer 3 protocol used by each station to transmit data over the wireless link

In an infrastructure Basic Service Set (BSS), how does the passive scanning process occur?

A.

Access points broadcast Beacons on all channels of each radio within the regulatory domain. Nearby client stations record information found in the Beacons for use in the association process.

B.

Client stations broadcast Probe Request frames on all supported channels in the regulatory domain. Nearby access points respond with Probe Response frames. Client stations record information in the Probe Response frames for use in the association process.

C.

Client stations broadcast Probe Request frames on the single channel for which they are programmed. Nearby access points respond on that channel with Probe Response frames. Client stations record information found in the Probe Response frames for use in the association process.

D.

Access points broadcast Beacons on a single channel for which they are programmed. Nearby client stations listen for Beacon frames and record information found in the Beacons for use in the association process.

What term correctly completes the following sentence?

In an IEEE 802.11 frame, the IP packet is considered by the MAC layer to be a(n) _________.

A.

MAC Service Data Unit (MSDU)

B.

MAC Protocol Data Unit (MPDU)

C.

IP datagram

D.

PLCP Service Data Unit (PSDU)

E.

PLCP Protocol Data Unit (PPDU)

ABC Company performs government contract work that requires disabling WLANs and has recently purchased an 802.11 Wireless Intrusion Prevention System (WIPS) to enforce their “NO WIRELESS” network security policy.

What attack type cannot be recognized by the WIPS?

A.

Deauthentication

B.

Rogue APs installation

C.

Layer 3 DoS

D.

Packet capturing

E.

RF jamming

What term describes the effect of increasing the intensity of an RF wave with an antenna by focusing the energy in a specific direction?

A.

Distributed Radiation

B.

Active Amplification

C.

Beam Compression

D.

Passive Gain

E.

RF Flooding

The network administrator at XYZ Company recently attended a training class on wireless security and realized that he should update the corporate security policy to address WLAN technology. The network administrator is listing the items that should be addressed in the security policy update, and has asked for your input.

What WLAN topics should be addressed by a company security policy? (Choose 3)

A.

Theft prevention and data security of WLAN infrastructure devices

B.

Wireless intrusion monitoring and response procedures

C.

WLAN performance analysis baseline documentation

D.

Wired network performance analysis and baseline documentation

E.

Training of the IT staff on WLAN operational security

F.

User density planning and AP client association thresholds