CWNP CWNA-109 Übungsprüfungen
Zuletzt aktualisiert am 27.04.2025- Prüfungscode: CWNA-109
- Prüfungsname: Certified Wireless Network Administrator
- Zertifizierungsanbieter: CWNP
- Zuletzt aktualisiert am: 27.04.2025
Billy must connect building A via a WLAN bridge link to building C, which is 30 miles away. He cannot make a direct connection of that distance because of regulatory power restrictions in his country. Building B sits between the two remote buildings.
What is the best way for Billy to link the two buildings together using WLAN bridges?
- A . Place a root bridge on building A with a highly directional antenna, a nonroot bridge on building B with an omnidirectional antenna, and a root bridge on building C with a highly directional antenna.
- B . Place a root bridge on building A with a highly directional antenna, a repeater bridge on building B with an omnidirectional antenna, and a root bridge on building C with a highly directional antenna.
- C . Place a nonroot bridge on building A with a highly directional antenna, a root bridge on building B with an omnidirectional antenna, and a nonroot bridge on building C with a highly directional antenna.
- D . Place a root bridge on building A with a highly directional antenna and a nonroot bridge on building B with a highly directional antenna. Set up another root bridge on building B with a highly directional antenna and a nonroot bridge on building C with a highly directional antenna. Connect the two bridges on building B via a switch or router.
- E . None of the above.
What is an advantage of using WPA3-Personal instead of WPA2-Personal as a security solution for 802.11 networks?
- A . WPA3-Personal, also called WPA3-SAE, uses an authentication exchange and WPA2-Personal does not
- B . WPA3-Personal, also called WPA3-SAE, uses a stronger authentication exchange to better secure the network
- C . WPA3-Personal, also called WPA3-SAE, uses AES for encryption and WPA2-Personal does not
- D . WPA3-Personal, also called WPA3-SAE, uses a better encryption algorithm than WPA2-Personal
What are some questions that should be considered during WLAN client capacity planning?
- A . How many users and devices need access currently?
- B . How many users and devices will need access in the future?
- C . Where are the users and devices located?
- D . What are the MIMO capabilities of the client devices?
- E . What type of applications will be used for the WLAN?
- F . All of the above
Which of these 802.11 technologies can operate in the 2.4 GHz frequency band? (Choose all that apply.)
- A . 802.11a (OFDM radios)
- B . 802.11b (HR-DSSS radios)
- C . 802.11g (ERP radios)
- D . 802.11n (HT radios)
- E . 802.11ac (VHT radios)
- F . 802.11ax (HE radios)
Which of the following is another form of a public hotspot network? (Choose all that apply.)
- A . Law enforcement network
- B . First-responder network
- C . Transportation network
- D . Municipal network
Which of these attacks are considered denial-of-service attacks? (Choose all that apply.)
- A . Man-in-the-middle
- B . Jamming
- C . Deauthentication spoofing
- D . MAC spoofing
- E . Peer-to-peer
A WLAN transmitter that emits a 400 mW signal is connected to a cable with a 9 dB loss. If the cable is connected to an antenna with 19 dBi of gain, what is the EIRP?
- A . 4 W
- B . 3,000 mW
- C . 3,500 mW
- D . 2 W
Which logical plane of network operation is typically defined by protocols and intelligence?
- A . User plane
- B . Data plane
- C . Network plane
- D . Control plane
- E . Management plane
Which 802.11ax technology will result in higher data rates as opposed to enhanced efficiency?
- A . OFDMA
- B . TWT
- C . 1024-QAM
- D . BSS color
- E . SRO
Which of these solutions would be considered strong WLAN security?
- A . SSID cloaking
- B . MAC filtering
- C . WEP
- D . Shared Key authentication
- E . CCMP/AES