Pass the CWNP CWAP Wi-Fi Analysis CWAP-405 Questions and answers with CertsForce

Viewing page 3 out of 4 pages
Viewing questions 21-30 out of questions
Questions # 21:

Which one of the following is not an 802.11 Management frame?

Options:

A.

PS-Poll


B.

Action


C.

Beacon


D.

Authentication


Questions # 22:

As a wireless network consultant you have been called in to troubleshoot a high-priority issue for one of your customers. The customer's office is based on two floors within a multi-tenant office block. On one of these floors (floor 5) users cannot connect to the wireless network. During their own testing the customer has discovered that users can connect on floor 6 but not when they move to the floor 5. This issue is affecting all users on floor 5 and having a negative effect on productivity.

To troubleshoot this issue, you perform both Spectrum and Protocol Analysis. The Spectrum Analysis shows the presence of Bluetooth signals which you have identified as coming from wireless mice. In the protocol analyzer you see the top frame on the network is Deauthentication frames. On closer investigation you see that the Deauthentication frames' source addresses match the BSSIDs of your customers APs and the destination address is FF:FF:FF:FF:FF:FF:FF.

What do you conclude from this troubleshooting exercise?

Options:

A.

The customer should replace all their Bluetooth wireless mice as they are stopping the users on floor 5 from connecting to the wireless network


B.

The users on floor 5 are being subjected to a denial of service attack, as this is happening across the entire floor it is likely to be a misconfigured WIPS solution belonging to the tenants on the floor below


C.

The customers APs are misbehaving and a technical support case should be open with the vendor


D.

The CCI from the APs on the floor 4 is the problem and you need to ask the tenant below to turn down their APs Tx power


Questions # 23:

You are tasked with describing the various frames used in 802.11 communications.

What frame is used for spectrum management, fast BSS transition and some other actions taken within a BSA?

Options:

A.

BlockAck


B.

CTS


C.

PS Poll


D.

Action


Questions # 24:

What action is taken automatically by 802.11 APs and client STAs as the signal strength of the link weakens in order to improve the quality of the RF communications overall?

Options:

A.

Output power is increased


B.

RSSI is increased


C.

Data rates are reduced


D.

Antenna gain is increased


Questions # 25:

You have implemented an AP at a remote office. It is a single-band AP supporting 802.11ac. Several users complain that their laptops cannot connect to the WLAN. These laptops are from multiple vendors and range in age from 2 to 4 years. The SSID and security profile settings are correct. All default settings were used on the AP with the exception of the SSID and security settings.

What is the most likely issue preventing these STAs from connecting to the AP?

Options:

A.

They do not support VHI and only support OFDM


B.

They are 5 GHz-only devices


C.

They are 2.4 GHz-only devices


D.

They do not support the basic data rates


Questions # 26:

A client is operating in an unstable RF environment. Out of five data frames transmitted to the client it only receives four. The client sends a Block Ack to acknowledge the receipt of these four frames but due to frame corruption the Block Ack is not received by the AP. Which frames will be retransmitted'

Options:

A.

All data frames


B.

Both the corrupted data and Block Ack


C.

Only the data frame which was corrupted


D.

Only the Block Ack


Questions # 27:

You are troubleshooting VoIP WLAN issues. When performing a PING to a remote device that would be involved in a call link, you see that the time value averages 220 milliseconds.

How much extra delay beyond that recommend for VoIP links is in this link?

Options:

A.

There is not enough information because the PING command give round-trip-times


B.

There is 70 milliseconds more delay than recommended


C.

There is 80 milliseconds more delay than recommended


D.

There is no extra delay beyond that recommended, instead there is 80 milliseconds less


Questions # 28:

You are analyzing a packet decode of a Probe Request and notice the SSID element has a length of zero. What do you conclude about the transmitting STA?

Options:

A.

The WLAN adaptor is configured in promiscuous mode


B.

The STA is operating in Ad-Hoc mode


C.

The STA's WLAN adaptor is disabled


D.

The STA is discovering a list of available BSSs


Questions # 29:

During an initial install of a controller-based WLAN, the APs are not locating the WLAN controller. The controller is two router hops away from the nearest AP. DHCP is not used. When performing a packet trace, you see a DNS response code of 3 targeted at one of the APs.

What is the problem?

Options:

A.

The DNS server is not authoritative for the domain


B.

The router is not forwarding packets to the DNS server


C.

The controller host record has not been created in the DNS server


D.

The authentication to the DNS server failed


Questions # 30:

Recently, three rogue APs have been connected to the network and later discovered. You want to prevent future rogue AP installations as much as possible.

What is the first step to eliminating or reducing rogue APs on the network?

Options:

A.

Use IPSec between every AP and the network infrastructure


B.

Define a direct policy that stipulates the ramifications of installing unauthorized devices


C.

Create a hash of the MAC addresses of all authorized devices and continually scan for non-matching hashes


D.

Enable rogue detection in the existing authorized APs


Viewing page 3 out of 4 pages
Viewing questions 21-30 out of questions