CWNP CWNA-106 - Certified Wireless Network Administrator
What statements describe industry practices for communication protocols between WLAN controllers and controller-based APs? (Choose 2)
ABC Company has thousands of Wi-Fi users accessing their network on a daily basis. Their WLAN consists of 700 access points, 6 WLAN controllers, and a wireless network management system.
What network functions are performed by the enterprise-class WNMS? (Choose 3)
The 802.11 protocol specifies a fundamental channel access method that is required for all stations and is used in all IBSS and BSS networks.
What is this fundamental channel access method called?
What terms accurately complete the following sentence?
The IEEE 802.11-2012 standard specifies mandatory support of the ___________ cipher suite for Robust Security Network Associations, and optional use of the ___________ cipher suite, which is designed for use with pre-RSNA hardware.
What factors will have the most significant impact on the amount of wireless bandwidth available to each station within a BSS? (Choose 2)
In an infrastructure Basic Service Set (BSS), how does the passive scanning process occur?
What term correctly completes the following sentence?
In an IEEE 802.11 frame, the IP packet is considered by the MAC layer to be a(n) _________.
ABC Company performs government contract work that requires disabling WLANs and has recently purchased an 802.11 Wireless Intrusion Prevention System (WIPS) to enforce their “NO WIRELESS†network security policy.
What attack type cannot be recognized by the WIPS?
What term describes the effect of increasing the intensity of an RF wave with an antenna by focusing the energy in a specific direction?
The network administrator at XYZ Company recently attended a training class on wireless security and realized that he should update the corporate security policy to address WLAN technology. The network administrator is listing the items that should be addressed in the security policy update, and has asked for your input.
What WLAN topics should be addressed by a company security policy? (Choose 3)
