Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = getmirror

Pass the CWNP CWNA CWNA-106 Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam CWNA-106 Premium Access

View all detail and faqs for the CWNA-106 exam


762 Students Passed

95% Average Score

90% Same Questions
Viewing page 2 out of 4 pages
Viewing questions 11-20 out of questions
Questions # 11:

In an 802.11n WLAN with a heterogeneous set of associated client devices including 802.11b, 11g, and 11n, what HT protection mode will the BSS use?

Options:

A.

Mode 0: No protection mode (Greenfield)

B.

Mode 1: Nonmember protection mode

C.

Mode 2: 20 MHz protection mode

D.

Mode 3: Non-HT mixed mode

Questions # 12:

A company has hired you to perform a pre-deployment site survey of their facility. During an interview, the network manager informs you that the new wireless network must use 5 GHz bands and OFDM, and VoWiFi handsets will be used extensively over the wireless network.

What items do you need to include in the RF site survey report? (Choose 2)

Options:

A.

A heat map demonstrating signal quality in areas where VoWiFi is supported.

B.

Codec types and sampling rates for each VoWiFi phone

C.

Security parameters and configuration steps for VoWiFi handsets.

D.

Test results from an active survey with a VoWiFi handset

E.

Results of OFDM versus ERP performance in each BSA

Questions # 13:

You are using a tool that allows you to see signal strength for all APs in the area with a visual representation. It shows you SSIDs available and the security settings for each SSID. It allows you to filter by frequency band to see only 2.4 GHz networks or only 5 GHz networks. No additional features are available. What kind of application is described?

Options:

A.

Site survey utility

B.

Wireless Network Management System

C.

Protocol analyzer

D.

Spectrum analyzer

E.

WLAN discovery tool

F.

Wireless Intrusion Protection System

Questions # 14:

You are the network administrator for ABC Company. Your manager has recently attended a wireless security seminar. The seminar speaker taught that a wireless network could be hidden from potential intruders if you disabled the broadcasting of the SSID in Beacons and configured the access points not to respond to Probe Request frames that have a null SSID field.

Your manager suggests implementing these security practices. What response should you give to this suggestion? (Choose 2)

Options:

A.

Any 802.11 protocol analyzer can see the SSID in clear text in frames other than Beacons and Probe Response frames. This negates any security benefit of trying to hide the SSID in Beacons and Probe Response frames.

B.

This security practice prevents manufacturers’ client utilities from detecting the SSID. As a result, the SSID cannot be obtained by attackers, except through social engineering, guessing, or use of a WIPS.

C.

Although it does not benefit the security posture, hiding the SSID in Beacons and Probe Response frames can be helpful for preventing some users (such as guests) from attempting to connect to the corporate network.

D.

Any tenants in the same building using advanced penetration testing tools will be able to obtain the SSID by exploiting WPA EAPOL-Key exchanges. This poses an additional risk of exposing the WPA key.

E.

To improve security by hiding the SSID, the AP and client stations must both be configured to remove the SSID from association request and response frames. Most WLAN products support this.

Questions # 15:

The IEEE 802.11a/n/ac physical layer technologies utilize the 5 GHz frequency band. What is true of the channels in this frequency spectrum?

Options:

A.

14 channels are available worldwide.

B.

11 channels are available worldwide.

C.

Regulatory domains worldwide require DFS and TPC in all these channels.

D.

DFS may be required in some regulatory domains on some channels.

E.

802.11 channels are separated by 5 Mhz

Questions # 16:

You have been sent as a consultant to a customer site that is experiencing problems with some 2.4 GHz clients on their 802.11a/g/n/ac network. After collecting information from the company about the problem, your initial troubleshooting step is to find a client device experiencing performance problems and observe its 802.11 frame exchanges in a protocol analyzer. The retransmission rate for that client is 65% instead of the company’s baseline, which is 9%.

Based on this information, what troubleshooting step should follow to isolate the problem?

Options:

A.

Check the frame decodes in the protocol analyzer and look for an excessive number of deauthentication frames.

B.

Evaluate the client’s operating frequency band with a spectrum analyzer, looking for a high noise floor or interference sources.

C.

Utilize a laptop-based site survey and planning tool to create a predictive model of the optimal AP placement in the customer’s facility.

D.

With a protocol analyzer, identify the client’s roaming threshold settings and reassociation behavior.

E.

Install Wi-Fi endpoint security and reporting software on the client device to monitor and log the retransmission behavior.

Questions # 17:

What HT technology requires MIMO support on both the transmitter and receiver?

Options:

A.

Spatial multiplexing

B.

Short guard intervals

C.

Maximal ratio combining

D.

Orthogonal Frequency Division Multiplexing

Questions # 18:

What factors are likely to cause the greatest impact on the application layer throughput of an 802.11n client station in a 2.4 GHz HT BSS? (Choose 3)

Options:

A.

Use of WEP or TKIP for encryption instead of CCMP

B.

Use of passphrase authentication instead of 802.1X/EAP authentication

C.

Increasing the beacon interval from 100 to 200 (TUs)

D.

RF interference from more than 10 nearby Bluetooth transmitters

E.

Increasing or decreasing the number of spatial streams in use by the client station and AP

Questions # 19:

As defined in the 802.11 specification, legacy Power Save requires an inefficient back-and-forth frame exchange process. Due to this inefficiency, many WLAN device implementations use a variation of 802.11 Power Save to accomplish the same function.

What non-standard power save behavior is used by most Wi-Fi devices in actual legacy Power Save implementations?

Options:

A.

Client devices ignore the TIM field and automatically send PS-Poll frames after every beacon.

B.

After each beacon, the AP attempts to empty its frame buffer by sending Wake-on-WLAN frames to wake each dozing client.

C.

Request-to-Send and Clear-to-Send frame exchanges are used to trigger the delivery of buffered data.

D.

The Beacon interval is changed from the default 100 time units to 10 or less time units.

E.

Clients send null data frames to the AP and switch the power management bit from 1 to 0 to receive queued data.

F.

Stations send a CTS-to-self frame to the AP with a very long duration period so they can receive all of their buffered data at once.

Questions # 20:

What is an advantage of using WPA2-Personal instead of WEP-128 as a security solution for 802.11 networks?

Options:

A.

WPA2-Personal uses 802.1X/EAP for authentication, and WEP-128 uses preshared keys.

B.

WPA2-Personal is based on IEEE 802.11 industry standards, but WEP is not.

C.

WPA2-Personal uses CCMP for encryption, and WEP-128 uses TKIP for encryption.

D.

WPA2-Personal uses dynamic encryption keys, and WEP-128 uses static keys.

E.

WPA2-Personal requires complex 64-character hex keys, whereas WEP-128 requires weak 26-character hex keys.

Viewing page 2 out of 4 pages
Viewing questions 11-20 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.