Practice Free CWNA-109 Exam Online Questions
An 802.11-based network uses an AP and has several connecting clients. The clients include iPhones, iPads, laptops and one desktop.
What WLAN use case is represented?
- A . Ad-hoc
- B . WPAN
- C . BSS
- D . IBSS
C
Explanation:
A BSS (Basic Service Set) is a WLAN use case that represents an 802.11-based network that uses an AP (Access Point) and has several connecting clients. The AP acts as a central point of coordination and communication for the clients, which can include iPhones, iPads, laptops, desktops, or any other devices that have Wi-Fi capabilities. A BSS can be identified by a unique BSSID (Basic Service Set Identifier), which is usually the MAC address of the AP’s radio interface. A BSS can also be associated with an SSID (Service Set Identifier), which is a human-readable name that identifies the network.
Reference: Chapter 1, page 23; , Section 1.1
The guard interval is used as a buffer to compensate for what type of interference?
- A . Co-channel interference
- B . Adjacent cell interference
- C . RF interference
- D . HT interference
- E . Intersymbol interference
What type of security can be used to stop attackers from seeing the MAC addresses used by your legitimate 802.11 WLAN devices?
- A . MAC filtering
- B . CCMP/AES encryption
- C . MAC spoofing
- D . Rogue mitigation
- E . Rogue detection
- F . None of the above
Which of the following are QoS categories? (Choose all that apply.)
- A . AC_VO (access category voice)
- B . AC_DA (access category data)
- C . AC_VI (access category video)
- D . AC_BE (access category best effort)
- E . AC_BK (access category background)
Which of these encryption technologies have been cracked? (Choose all that apply.)
- A . 64-bit WEP
- B . TKIP/RC4
- C . CCMP/AES
- D . 128-bit WEP
- E . Wired Equivalent Privacy
Which of the following tools can be used in an indoor site survey? (Choose all that apply.)
- A . Measuring wheel
- B . GPS
- C . Ladder
- D . Battery pack
- E . Microwave oven
How are IPsec VPNs used to provide security in combination with 802.11 WLANs?
- A . Client-based security on public access WLANs
- B . Point-to-point wireless bridge links
- C . Connectivity across WAN links
- D . All of the above
Which of the following are true about beacon management frames? (Choose all that apply.)
- A . Beacons can be disabled to hide the network from intruders.
- B . Time-stamp information is used by the clients to synchronize their clocks.
- C . In a BSS, clients share the responsibility of transmitting the beacons.
- D . Beacons can contain vendor-proprietary information.
What CSMA/CA conditions must be met before an 802.11 radio can transmit? (Choose all that apply.)
- A . The NAV timer must be equal to zero.
- B . The random backoff timer must have expired.
- C . The CCA must be idle.
- D . The proper interframe space must have occurred.
- E . The access point must be in PCF mode.
The size of the Fresnel zone is controlled by what factors? (Choose all that apply.)
- A . Antenna beamwidth
- B . RF line of sight
- C . Distance
- D . Frequency