Practice Free CWNA-109 Exam Online Questions
When a PoE network is installed, what is the maximum distance from the PSE to the PD, as defined in the standards? (Choose all that apply.)
- A . 90 meters
- B . 100 meters
- C . 300 feet
- D . 328 feet
- E . 328 meters
What are some recommendations when using 40 MHz channels in the 5 GHz band? (Choose all that apply.)
- A . Enable the DFS channels.
- B . Lower AP transmit power.
- C . Verify wall attenuation.
- D . All of the above
Which antenna types are commonly used by indoor Wi-Fi devices in a MIMO diversity implementation? (Choose 2)
- A . Dipole
- B . Patch
- C . Dish
- D . Grid
- E . Sector
In an 802.11n WLAN with a heterogeneous set of associated client devices including 802.11b, 11g, and 11n, what HT protection mode will the BSS use?
- A . Mode 0: No protection mode (Greenfield)
- B . Mode 1: Nonmember protection mode
- C . Mode 2: 20 MHz protection mode
- D . Mode 3: Non-HT mixed mode
The corporate IT administrators, Hunter, Rion, and Liam, are huddled together to try to solve an issue with the newly deployed VoWiFi phones. The chosen security solution is PEAPv0 (EAP-MSCHAPv2) for the voice SSID that also has Voice-Enterprise enabled on the access points.
The VoWiFi phones are authenticating flawlessly and voice calls are stable when the employees use the devices from their desks. However, there seem to be gaps in the audio and sometimes disconnects when the employees are talking on the VoWiFi phones and move to other areas of the building.
What are the possible causes of the interruption of service for the voice calls while the employees are mobile? (Choose all that apply.)
- A . VoWiFi phones should be configured only for PSK authentication when roaming is a requirement.
- B . VoWiFi phones are reauthenticating every time they roam to a new AP.
- C . VoWiFi phones do not use opportunistic key caching.
- D . VoWiFi phones do not support fast BSS transition.
The 802.11 standard defines which medium to be used in a distribution system (DS)?
- A . 802.3 Ethernet
- B . 802.15
- C . 802.5 token ring
- D . Star-bus topology
- E . None of the above
The basic architecture of any MDM solution consists of:
- A . Mobile Device
- B . AP and WLAN Controller
- C . MDM Server
- D . All of the above
Which unit of measurement is an absolute unit that is used to quantify power levels on a linear scale?
- A . dBm
- B . W
- C . dB
- D . mW
- E . VSWR
Which keying method is most susceptible to interference from noise?
- A . FSK
- B . ASK
- C . PSK
- D . DSK
Rebekah McAdams was hired to perform a wireless packet analysis of your network. While performing the analysis, she noticed that many of the data frames were preceded by an RTS frame followed by a CTS frame.
What could cause this to occur? (Choose all that apply.)
- A . AP automatically enabled RTS/CTS mechanisms as a response to co-channel interference.
- B . An AP was manually configured with a low RTS/CTS threshold.
- C . A nearby cell phone is causing some of the nodes to enable a protection mechanism.
- D . Legacy 802.11b clients are connected to an 802.11g/n AP.