Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Certified Wireless Network Administrator

Last Update 20 hours ago Total Questions : 156

The Certified Wireless Network Administrator content is now fully updated, with all current exam questions added 20 hours ago. Deciding to include CWNA-107 practice exam questions in your study plan goes far beyond basic test preparation.

You'll find that our CWNA-107 exam questions frequently feature detailed scenarios and practical problem-solving exercises that directly mirror industry challenges. Engaging with these CWNA-107 sample sets allows you to effectively manage your time and pace yourself, giving you the ability to finish any Certified Wireless Network Administrator practice test comfortably within the allotted time.

Question # 31

You are the network administrator for ABC Company. Your manager has recently attended a wireless security seminar. The seminar speaker taught that a wireless network could be hidden from potential intruders if you disable the broadcasting of the SSID in Beacons and configured the access points not to respond to Probe Request frames that have a null SSID field.

Your manager suggests implementing these security practices. What response should you give to this suggestion?

A.

Any tenants in the same building using advanced penetration testing tools will be able to obtain the SSID by exploiting WPA EAPOL-Key exchanges. This poses an additional risk of exposing the WPA key.

B.

Any 802.11 protocol analyzer can see the SSID in clear text in frames other than Beacons frames. This negates any security benefit of trying to hide the SSID in Beacons and Probe Response frames.

C.

To improve security by hiding the SSID, the AP and client stations must both be configured to remove the SSID from association request and response frames. Most VLAN products support this.

D.

This security practice prevents manufacturers’ client utilities from detecting the SSID. As a result, the SSID cannot be obtained by attackers, except through social engineering, guessing, or use of a WIPS.

Question # 32

A WLAN is implemented using wireless controllers. The APs must locate the controllers when powered on and connected to the network. Which one of the following methods is commonly used to locate the controllers by the APs?

A.

DHCP

B.

GRE

C.

NTP

D.

SNMP

Question # 33

Which directional antenna types are commonly used by indoor Wi-Fi devices in a MIMO multiple spatial stream implementation?

A.

Dish and grid

B.

Dipole and yagi

C.

Grid and sector

D.

Patch and panel

Question # 34

You are attempting to locate the cause of a performance problem in two WLAN cells in a mostly overlapping coverage area. You note that one AP is on channel 1 and the other is on channel 2. When you document your findings, what term do you use to describe the problem in this configuration?

A.

Bluetooth interference

B.

Non-Wi-Fi interference

C.

CCI

D.

ACI

Question # 35

XYZ Company has decided to install an 802.11 WLAN system that will support 1000 wireless users, but they are concerned about network security. XYZ is interested in deploying standardized security features. In addition to WPA2-Enterprise with PEAP and role-based access control, XYZ would like to support management frame protection as well as a fast secure roaming protocol for future mobile handsets.

As XYZ Company selects a product to deploy, what two IEEE amendments, which are included in 802.11-2016, should be supported to provide the management frame protection and fast secure roaming security features?

A.

802.11j and 802.11k

B.

802.11r and 802.11k

C.

802.11z and 802.11w

D.

802.11r and 802.11w

Question # 36

When a client station sends a broadcast probe request frame with a wildcard SSID, how do APs respond?

A.

For each probe request frame, only one AP may reply with a probe response.

B.

Each AP responds in turn after preparing a probe response and winning contention.

C.

Each AP checks with the DHCP server to see if it can respond and then acts accordingly.

D.

After waiting a SIFS, all APs reply at the same time with a probe response.

Question # 37

A string of characters and digits is entered into an AP and a client STA for WPA2 security. The string is 8 characters long. What is this string called?

A.

MSK

B.

WEP key

C.

Passphrase

D.

PSK

Question # 38

What 802.11 PHY uses available space in very low frequency ranges that is not in use at the time by broadcast video signals?

A.

DMG

B.

SIG

C.

DSSS

D.

TVHT

Question # 39

In a long-distance RF link, which statement about Fade Margin is true?

A.

The Fade Margin is a measurement of signal loss through free space and is a function of frequency and distance.

B.

The Fade Margin of a long-distance radio link should be equivalent to the receiver’s low noise filter gain.

C.

A Fade Margin is unnecessary on a long-distance RF link if more than 80% of

D.

Fade Margin is an additional pad of signal strength designed into the RF system to compensate for unpredictable signal fading.

Question # 40

When an ACK frame is not received by the transmitting STA, what is assumed?

A.

The frame was correctly delivered

B.

The frame was not delivered and must be retransmitted

C.

The receiver is offline

D.

The receiver processed the frame, but did not respond with an ACK frame because 802.11w is enabled

Go to page: