Updated CWNP CWNA-107 Study Guide PDF Free Download

CWNA® Certified Wireless Network Administrator is the base certification for Enterprise Wi-Fi within the CWNP family of certifications and a springboard toward earning your security, design, analysis and network expert certifications. It requires you pass CWNA-107 exam for CWNA certification. When preparing for CWNA-107 exam, please come to get updated CWNA-107 study guide. New CWNA-107 study guide is updated on 3/19/2019, which is the latest version for passing CWNA® Certified Wireless Network Administrator CWNA-107 exam.

Come to free download the updated CWNP CWNA-107 study guide pdf

1. An RF signal sometimes bends as it passes through some material other than free space.

What is the term that describes this behavior?

2. What can an impedance mismatch in the RF cables and connectors cause?

3. What factor does not influence the distance at which an RF signal can be effectively received?

4. A WLAN transmitter that emits a 50 mW signal is connected to a cable with 3 dB loss.

If the cable is connected to an antenna with 9dBi gain, what is the EIRP at the antenna element?

5. In a long-distance RF link, which statement about Fade Margin is true?

6. What wireless networking term describes the increase of RF energy in an intentional direction with the use of an antenna?

7. Which directional antenna types are commonly used by indoor Wi-Fi devices in a MIMO multiple spatial stream implementation?

8. What statement about the beamwidth of an RF antenna is true?

9. Which one of the following is not a factor considered when calculating the Link Budget for an outdoor point­to-point WLAN bridge link?

10. What best describes WPA2 in relation to 802.11 wireless networks?

11. An IEEE 802.11 amendment is in the daft state.

What impact does this draft amendment have on the 802.11 standard?

12. You are implementing a VHT-capable AP.

Which one of the following channels is available in the 802.11­2016 standard that was not available before the ratification of 802.11 ac?

13. What statement is true concerning the use of Orthogonal Frequency Division Multiplexing (OFDM) modulation method in IEEE 802.11 WLANs?

14. Which IEEE 802.11 physical layer (PHY) specification includes support for and compatibility with both ERP and HR/DSSS?

15. An 802.11-based network uses an AP and has several connecting clients. The clients include iPhones, iPads, laptops and one desktop.

What WLAN use case is represented?

16. What factor is likely to cause the least impact on the application layer throughput of an 802.11n client station in a 2.4 GHz HT BSS?

17. What ID is typically mapped to an AP’s MAC address if a single BSS is implemented?

18. What is appended to the end of each 802.11 data frame after the payload?

19. When an ACK frame is not received by the transmitting STA, what is assumed?

20. When a client station sends a broadcast probe request frame with a wildcard SSID, how do APs respond?

21. What security solution is deprecated in the 802.11 standard and should never be used in any modern WLAN deployment?

22. You are reconfiguring an AP to use the short guard interval.

How long will the new guard interval duration be after the change?

23. What statement about the IEEE 802.11-2016 QoS facility is true?

24. You manage a WLAN with 100 802.11ac access points. All access points are configured to use 80 MHz channels. In a particular BSS, only 40 MHz communications are seen.

What is the likely cause of this behavior?

25. When compared with legacy Power Save mode, how does VHT TXOP power save improve battery life for devices on a WLAN?

26. What 802.11 network configuration would result in multiple stations broadcasting Beacon frames with the same BSSID but with different source addresses?

27. What primary metric of scanning can stations use to select the best AP for connectivity to the desired BSS?

28. Lynne runs a small hotel, and as a value added for his customers he has implemented a Wi-Fi hotspot. Lynne has read news articles about how hackers wait at hotspots trying to take advantage of unsuspecting users. He wants to avoid this problem at his hotel.

What is an efficient and practical step that Lynne can take to decrease the likelihood of active attacks on his customers’ wireless computers?

29. You have been tasked with creating a wireless link between two buildings on a single campus. The link must support at least 150 Mbps data rates.

What kind of WLAN technology role should you deploy?

30. When implementing PoE, what role is played by a switch?

31. A dual-band 802.11ac AP must be powered by PoE.

As a class 4 device, what power level should be received at the AP?

32. A WLAN is implemented using wireless controllers. The APs must locate the controllers when powered on and connected to the network.

Which one of the following methods is commonly used to locate the controllers by the APs?

33. You are implementing a multi-AP WLAN and fast secure roaming is essential.

Which one of the following methods is an IEEE 802.11 standard method for fast roaming?

34. In an 802.11 2.4 GHz system, what 22 MHz channels are considered non-overlapping?

35. The center frequency of channel 1 in the 2.4 GHz band is 2.412 GHz (2412 MHz).

What is the center frequency of channel 4?

36. The requirements for a WLAN you are installing state that it must support unidirectional delays of less than 150 ms and the signal strength at all receivers can be no lower than -67 dBm.

What application is likely used that demands these requirements?

37. You are deploying a WLAN with the access points configured for 10 mW of output power on the 2.4 GHz radios and 20mW of output power on the 5GHz radios. Some semi-directional antennas are also in use.

What kind of deployment is described?

38. Option 43 must be configured to allow access points to locate controllers. In what network service should this option be configured?

39. What statement about 802.3, Clause 33 Power over Ethernet is true?

40. What statement describes the authorization component of a AAA implementation?

41. You are the network administrator for ABC Company. Your manager has recently attended a wireless security seminar. The seminar speaker taught that a wireless network could be hidden from potential intruders if you disable the broadcasting of the SSID in Beacons and configured the access points not to respond to Probe Request frames that have a null SSID field.

Your manager suggests implementing these security practices.

What response should you give to this suggestion?

42. What cipher suite is specified by the 802.11-2016 standard and is not deprecated?

43. To ease user complexity, your company has implemented a single SSID for all employees.

However, the network administrator needs a way to control the network resources that can be accessed by each employee based in their department.

What WLAN feature would allow the network administrator to accomplish this task?

44. ABC Company is planning a point-to-multipoint bridge deployment with standalone (autonomous) 802.11 bridge units. 802.1X/EAP will be used for bridge authentication. A Linux-based RADIUS server will be used for authentication.

What device in the bridge implementation acts as the 802.11X Authenticator?

45. You are managing a wireless access point in autonomous mode using the Web based interface. You capture traffic during this management task and notice that you can see the HTML code of the Web pages for access point management.

What error in administration could be the cause of the security concern?

46. What is the most effective method of testing roaming in relation to 802.11 VoIP handsets?

47. You are performing a post-implementation validation survey.

What basic tool can be used to easily locate areas of high co-channel interference?


 

CWT Certified Wireless Technician CWT-100 Practice Test
Real CWNP CWS-100 Exam Dumps