Practice Free CWNA-109 Exam Online Questions
In a guest firewall policy, which IP networks should be restricted? (Choose all that apply.)
- A . 172.16.0.0/12
- B . 20.0.0.0/8
- C . 192.16.0.0/16
- D . 172.10.0.0/24
- E . 10.0.0.0/8
What two ISM bands are used by microwave ovens, cordless home telephones, baby monitors, and wireless video cameras? (Choose two)
- A . 902 MHz
- B . 2.4 GHz
- C . 5.8 GHz
- D . 7.6 GHz
Which type of 802.11 frame is used during UL-OFDMA by Wi-Fi 6 clients to communicate to the AP about their transmit needs?
- A . BSR
- B . BSRP
- C . MU-RTS
- D . MU-BAR
- E . BQRP
__________ uses very little bandwidth to transmit the data that it is carrying.
- A . Multipath Interference
- B . Spread Spectrum
- C . Hopping Sequence
- D . Narrowband
The ACME Corporation has hired you to design a wireless network that will have data clients, VoWiFi phones, and access for guest users. The company wants the strongest security solution possible for the data clients and phones.
Which design best fits the customer’s requirements?
- A . Create one wireless VLAN. Segment the data clients, VoWiFi phones, and guest users from the wired network. Use an 802.1X/EAP authentication and CCMP/AES encryption for a wireless security solution.
- B . Create three separate VLANs. Segment the data clients, VoWiFi phones, and guest users into three distinct VLANs. Use an 802.1X/EAP authentication and TKIP encryption for security in the data VLAN. Use WPA2-Personal in the voice VLAN. The guest VLAN will have no security other than possibly a captive portal.
- C . Create three separate VLANs. Segment the data clients, VoWiFi phones, and guest users into three distinct VLANs. Use an 802.1X/EAP authentication with CCMP/AES encryption for security in the data VLAN. Use WPA2-Personal in the voice VLAN. The guest VLAN traffic will require a captive web portal and guest firewall policy for security.
- D . Create two separate VLANs. The data and voice clients will share one VLAN while the guest users will reside in another. Use an 802.1X/EAP authentication and CCMP/AES encryption for security in the data/voice VLAN. The guest VLAN will have no security other than possibly a captive portal.
Return Loss is the decrease of forward energy in a system when some of the power is being reflected back toward the transmitter.
What will cause high return loss in an RF transmission system, including the radio, cables, connectors and antenna?
- A . A Voltage Standing Wave Ratio (VSWR) of 1:1
- B . An impedance mismatch between components in the RF system
- C . Cross-polarization of the RF signal as it passes through the RF system
- D . The use of cables longer than one meter in the RF system
- E . High output power at the transmitter and use of a low-gain antenna
What WLAN client connectivity may be negatively impacted by client load balancing between access points?
- A . Capacity
- B . Range
- C . Roaming
- D . Throughput
- E . Security
MIMO radios use which mechanisms for transmit diversity? (Choose all that apply.)
- A . Maximum ratio combining (MRC)
- B . Spatial multiplexing (SM)
- C . Space-time block coding (STBC)
- D . Cyclic shift diversity (CSD)
- E . Multiple traffic ID block acknowledgment (MTBA)
Which of the following statements are true about free space path loss? (Choose all that apply.)
- A . RF signals will attenuate as they travel, despite the lack of attenuation caused by obstructions.
- B . Path loss occurs at a constant linear rate.
- C . Attenuation is caused by obstructions.
- D . Path loss occurs at a logarithmic rate.
You are deploying a WLAN monitoring solution that utilizes distributed sensor devices.
Where should sensors be deployed for best results? Choose the single best answer.
- A . In switching closets
- B . Every 5 meters and alongside each AP
- C . In critical areas where WLAN performance must be high
- D . Above the plenum on each floor
C
Explanation:
Sensors should be deployed in critical areas where WLAN performance must be high for best results when using a WLAN monitoring solution that utilizes distributed sensor devices. A WLAN monitoring solution is a system that collects, analyzes, and reports on the status and performance of a WLAN. A WLAN monitoring solution can use different methods to gather data from the WLAN, such as embedded software agents, external hardware probes, or distributed sensor devices. Distributed sensor devices are dedicated devices that are deployed throughout the WLAN coverage area to monitor the wireless traffic and environment. Distributed sensor devices can perform various functions, such as scanning the spectrum, capturing wireless frames, measuring signal quality, detecting rogue access points, testing connectivity, and generating alerts. Distributed sensor devices can provide more accurate and comprehensive data than other methods, but they also require more planning and deployment costs. Therefore, it is important to deploy sensors strategically in critical areas where WLAN performance must be high, such as high-density zones, high-priority applications, or high-security locations. By deploying sensors in critical areas, the WLAN monitoring solution can ensure optimal WLAN performance and reliability in those areas and identify and resolve any issues or problems that may arise. The other options are not the best places to deploy sensors for best results. Deploying sensors in switching closets is not effective because sensors need to be close to the wireless medium to monitor it properly. Deploying sensors every 5 meters and alongside each AP is not efficient because sensors may overlap or interfere with each other and cause unnecessary redundancy or complexity. Deploying sensors above the plenum on each floor is not practical because sensors may not capture the wireless traffic and environment accurately due to attenuation or reflection from the ceiling materials or objects.
Reference: CWNA-109 Study Guide, Chapter 14: Troubleshooting Wireless LANs, page 4831