Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

CWNA Certification CWNA-109 Exam Dumps, Exams of Advanced Education

With the latest CWNA Certification CWNA-109 Exam Dumps, exclusively cracked by the expert team at Passcert, you can now enhance your chances of acing the exam with ease.

Typology: Exams

2023/2024

Uploaded on 03/14/2024

victoria-meisel
victoria-meisel 🇺🇸

4

(5)

46 documents

1 / 6

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
Download the latest CWNA-109 Exam Dumps For Best Preparation
1/6
Exam :CWNA-109
Title :
https://www.passcert.com/CWNA-109.html
Certified Wireless Network
Administrator
pf3
pf4
pf5

Partial preview of the text

Download CWNA Certification CWNA-109 Exam Dumps and more Exams Advanced Education in PDF only on Docsity!

Exam : CWNA-

Title :

https://www.passcert.com/CWNA-109.html

Certified Wireless Network

Administrator

1.You are onsite with a client to perform a post-deployment site survey. When verifying a multiple channel VoWiFi deployment using a VoWiFi handset, which aspect is most important? A. Performing protocol analysis with a single wireless adapter that is scanning all channels in use B. Testing a constant conversation or handset tone while roaming from area to area, or performing an active survey C. Configuring DSCP-to-802.11e QoS maps on the handset for each access category. D. Verifying the VHT functionality to handle the call volume incurred by a single VoIP phone call. Answer: B 2.Which protocols can be used to tunnel 802.11 user traffic from access points to WLAN controllers or other centralized network servers? (Choose all that apply.) A. IPsec B. GRE C. CAPWAP D. DTLS E. VRRP Answer: ABC 3.What is the traditional data-forwarding model for 802.11 user traffic when WLAN controllers are deployed? A. Distributed data forwarding B. Autonomous forwarding C. Proxy data forwarding D. Centralized data forwarding E. All of the above Answer: D 4.You were previously onsite at XYZ's facility to conduct a pre-deployment RF site survey. The WLAN has been deployed according to your recommendations and you are onsite again to perform, a post-deployment validation survey. When performing this type of post-deployment RF site survey voice over Wi-Fi, what is an action that must be performed? A. Spectrum analysis to locate and identify RF interference sources. B. Frequency-band hopping analysis to detect improper RF channel implementations. C. Protocol analysis to discover channel use on neighboring APs. D. Application analysis with an active phone call on an VoWiFi handset. Answer: D 5.In a long-distance RF link, what statement about Fade Margin is true? A. Fade Margin is an additional pad of signal strength designed into the RF system to compensate for unpredictable signal fading. B. The Fade Margin of a long-distance radio link should be equivalent to the receiver’s antenna gain. C. A Fade Margin is unnecessary on a long-distance RF link if more than 80% of the first Fresnel zone is clear of obstructions.

Answer: ABCE 11.Which of the following statements are true? (Choose all that apply.) A. When upfade occurs, the final received signal will be stronger than the original transmitted signal. B. When downfade occurs, the final received signal will never be stronger than the original transmitted signal. C. When upfade occurs, the final received signal will never be stronger than the original transmitted signal. D. When downfade occurs, the final received signal will be stronger than the original transmitted signal. Answer: BC 12.What is the difference between association frames and reassociation frames? A. Association frames are management frames, whereas reassociation frames are control frames. B. Association frames are used exclusively for roaming. C. Reassociation frames contain the BSSID of the original AP. D. Only association frames are used to join a BSS. Answer: D 13.Which of the following are good uses for portable networks? (Choose all that apply.) A. Military maneuvers B. Disaster relief C. Construction sites D. Manufacturing plants Answer: ABC 14.The basic architecture of any MDM solution consists of: A. Mobile Device B. AP and WLAN Controller C. MDM Server D. All of the above Answer: D 15.What problems may exist for a multiple channel architecture (MCA) WLAN when its APs are all operating at full power (typically 100mW)? (Choose 2) A. Wi-Fi enabled voice handsets with low transmit power can experience asynchronous downlink and uplink performance. B. WLAN client stations can experience the hidden node problem when located near each other within the same cell. C. The mismatched power between WLAN client stations and APs violates regulatory and IEEE signal quality requirements. D. Cell size may be too large, causing co-channel interference to adjacent cells and reducing system capacity. E. APs operating in the 2.4 GHz band would prevent microwave ovens and analog video cameras from functioning.

Answer: AD 16.Which ESS design scenario is required by the IEEE 802.11-2020 standard? A. Two or more access points with overlapping coverage cells B. Two or more access points with overlapping disjointed coverage cells C. One access point with a single BSA D. Two basic service sets interconnected by a distribution system medium (DSM) E. None of the above Answer: E 17.The IEEE 802.11-2012 standard defines communication mechanisms at which layers of the OSI model? (Choose all that apply.) A. Network B. Physical C. Transport D. Application E. Data-Link F. Session Answer: BE 18.What wireless networking term describes the increase of RF energy in an intentional direction with the use of an antenna? A. Directed Radiation B. Active Amplification C. Passive Gain D. Beam Digression Answer: C 19.When using a WLAN hotspot, company employees should do which of the following to ensure security back to your corporate network? A. Enable WEP. B. Enable 802.1X/EAP. C. Use an IPsec VPN. D. Security cannot be provided because you do not control the access point. Answer: C 20.Which of the following information is included in a probe response frame? (Choose all that apply.) A. Time stamp B. Supported data rates C. Service set capabilities D. SSID E. Traffic indication map Answer: ABCD