New Year Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

CWNP CWNA-107 - Certified Wireless Network Administrator

Page: 3 / 5
Total 156 questions

To ease user complexity, your company has implemented a single SSID for all employees. However, the network administrator needs a way to control the network resources that can be accessed by each employee based in their department.

A.

RBAC

B.

SNMP

C.

WIPS

D.

WPA2

What 802.11 PHY uses available space in very low frequency ranges that is not in use at the time by broadcast video signals?

A.

DMG

B.

SIG

C.

DSSS

D.

TVHT

You are tasked with performing a throughput test on the WLAN. The manager asks that you use open source tools to reduce costs. What open source tool is designed to perform a throughput test?

A.

IxChariot

B.

Python

C.

PuTTy

D.

iPerf

You are the network administrator for ABC Company. Your manager has recently attended a wireless security seminar. The seminar speaker taught that a wireless network could be hidden from potential intruders if you disable the broadcasting of the SSID in Beacons and configured the access points not to respond to Probe Request frames that have a null SSID field.

Your manager suggests implementing these security practices. What response should you give to this suggestion?

A.

Any tenants in the same building using advanced penetration testing tools will be able to obtain the SSID by exploiting WPA EAPOL-Key exchanges. This poses an additional risk of exposing the WPA key.

B.

Any 802.11 protocol analyzer can see the SSID in clear text in frames other than Beacons frames. This negates any security benefit of trying to hide the SSID in Beacons and Probe Response frames.

C.

To improve security by hiding the SSID, the AP and client stations must both be configured to remove the SSID from association request and response frames. Most VLAN products support this.

D.

This security practice prevents manufacturers’ client utilities from detecting the SSID. As a result, the SSID cannot be obtained by attackers, except through social engineering, guessing, or use of a WIPS.

A WLAN is implemented using wireless controllers. The APs must locate the controllers when powered on and connected to the network. Which one of the following methods is commonly used to locate the controllers by the APs?

A.

DHCP

B.

GRE

C.

NTP

D.

SNMP

A client STA must choose the best AP for connectivity. As part of the evaluation, it must verify compatible data rates. What can the client STA use to verify that an AP supports the same data rates that it supports?

A.

Beacon frames transmitted by the AP

B.

Data frames sent between the AP and current client STAs

C.

Authentication frames transmitted by the other client STAs

D.

Probe request frames transmitted by other client STAs

You are reporting on the RF environment in your facility. The manager asks you do describe the noise floor noted on the report. Which of the following is the best explanation?

A.

The energy radiated by flooring materials that causes interference in the 2.4 GHz and 5 GHz bands.

B.

The noise caused by elevators, microwave ovens, and video transmitters.

C.

The RF energy that exists in the environment from intentional and unintentional RF radiators that forms the baseline above which the Intentional signal of your WLAN must exist.

D.

The extra energy radiated by access points and client devices beyond that intended for the signal.

What statement about 802.11 WLAN bridges is true?

A.

WLAN bridges only work in the 2.4 GHz frequency band and they support only SISO communications

B.

WLAN bridges must use a channel with acceptable SNR at both transceivers to maintain the desired data rate bi-directionally

C.

WLAN bridges may support MIMO communications, but only if used in the 5 GHz frequency band

D.

WLAN bridges must be implemented such that no interference occurs on the channel anywhere between the two endpoints used to establish the bridge

When a client station sends a broadcast probe request frame with a wildcard SSID, how do APs respond?

A.

For each probe request frame, only one AP may reply with a probe response.

B.

Each AP responds in turn after preparing a probe response and winning contention.

C.

Each AP checks with the DHCP server to see if it can respond and then acts accordingly.

D.

After waiting a SIFS, all APs reply at the same time with a probe response.

What is the final step in an effective troubleshooting process?

A.

Document the results

B.

Disable the WLAN

C.

Notify the users of problem resolution

D.

Verify the solution