Pass the CWNP CWNA CWNA-107 Questions and answers with CertsForce

Viewing page 4 out of 5 pages
Viewing questions 31-40 out of questions
Questions # 31:

A WLAN is implemented using wireless controllers. The APs must locate the controllers when powered on and connected to the network. Which one of the following methods is commonly used to locate the controllers by the APs?

Options:

A.

DHCP


B.

GRE


C.

NTP


D.

SNMP


Expert Solution
Questions # 32:

You are deploying a WLAN monitoring solution that utilizes distributed sensor devices. Where should sensors be deployed for best results?

Options:

A.

Every 20 feet and alongside each AP


B.

Closer to the APs


C.

Closer to the client devices


D.

In critical areas where WLAN performance must be high


Expert Solution
Questions # 33:

What primary metric of scanning can stations use to select the best AP for connectivity to the desired BSS?

Options:

A.

Signal strength of AP beacons received.


B.

PING latency when testing against an Internet server.


C.

FCS errors in frames transmitted to and from the AP.


D.

Throughput speed in Mbps.


Expert Solution
Questions # 34:

You are troubleshooting a WLAN problem and you suspect hidden node as the cause. What should you look for in a protocol analyzers?

Options:

A.

Frames with the HN bit set to 1


B.

Frames with the retry bit set to 0


C.

Frames transmitted from the AP without acknowledgement


D.

Retransmitted frames from multiple STAs at higher rates than other STAs


Expert Solution
Questions # 35:

A natural disaster has occurred in a remote area that is approximately 40 miles from the response team headquarters. The response team must setup a local wireless network using 802.11 WLAN access points. What is the best method, of those listed, for implementation of a network backhaul for communications across the Internet in this scenario?

Options:

A.

Temporary wired cable


B.

802.11 bridging


C.

Cellular/LTE


D.

Temporary wired DSL


Expert Solution
Questions # 36:

When antenna gain is reported in dBI, the gain of the antenna is compared to what theoretical antenna?

Options:

A.

Yagi


B.

Dipole


C.

Rubber ducky


D.

Isotropic radiator


Expert Solution
Questions # 37:

What statement about 802.11 WLAN performance is true?

Options:

A.

In modern networks, both centralized and distributed data forwarding work well for most standard office deployments


B.

In most WLANs, no special skill or tuning is required to get peak performance


C.

WLANs perform better as more wireless clients connect with each AP


D.

To get the best performance out of an AP, you should disable data rates of 72 Mbps and lower


Expert Solution
Questions # 38:

You administer a small WLAN with nine access points. As a small business, you do not run a RADIUS server and use WPA2-Personal for security. Recently, you changed the passphrase for WPA2-Personal in all APs and clients. Several users are now reporting the inability to connect to the network at times and it is constrained to one area of the building. When using a WLAN scanner, you see that the AP covering that area is online and has a strong signal. No other changes have been made to the environment and all access points are the same model. What is the likely problem?

Options:

A.

The AP that covers the problem area requires a firmware update


B.

The clients are improperly configured


C.

The AP that covers the problem area has failed


D.

The AP that covers the problem area is improperly configured


Expert Solution
Questions # 39:

What statement about 802.11 WLAN performance is true?

Options:

A.

In modem networks, both centralized and distributed data forwarding work well for most standard office deployments


B.

In most WLANs, no special skill or tuning is required to get peak performance


C.

WLANs perform better as more wireless clients connect with each AP


D.

To get the best performance out of an AP, you should disable data rates of 72 Mbps and lower


Expert Solution
Questions # 40:

What cipher suite is specified by the 802.11-2016 standard and is not deprecated?

Options:

A.

Temporal Key Integrity Protocol


B.

Extensible Authentication Protocol


C.

Counter Mode with CBC- MAC Protocol


D.

Wired Equivalent Privacy


Expert Solution
Viewing page 4 out of 5 pages
Viewing questions 31-40 out of questions