Practice Free CWNA-109 Exam Online Questions
A WLAN transmitter that emits a 100 mW signal is connected to a cable with a 3 dB loss. If the cable is connected to an antenna with 7 dBi of gain, what is the EIRP at the antenna element?
- A . 200 mW
- B . 250 mW
- C . 300 mW
- D . 400 mW
What type of interference is a result of APs on the same channel or clients on the same channel hearing each other despite being members of different basic service sets?
- A . Intersymbol interference
- B . Adjacent channel interference
- C . All-band interference
- D . Co-channel interference
- E . Narrowband interference
Which frequency bands are defined for High Efficiency (HE) wireless communications? (Choose all that apply.)
- A . 1 GHz
- B . 2.4 GHz
- C . 5 GHz
- D . 6 GHz
- E . 60 GHz
WLAN vendors have begun to offer the capability for guest users to log in to a guest WLAN with preexisting social media credentials, such as Facebook or Twitter usernames and passwords.
What authorization framework can be used for social media login to WLAN guest networks?
- A . Kerberos
- B . RADIUS
- C . 802.1X/EAP
- D . OAuth
- E . TACACS
What features were introduced in the IEEE 802.11h amendment in order to uphold regulatory requirements for 5 GHz operation? (Choose 2)
- A . 256-QAM
- B . Distributed Coordination Function (DCF)
- C . Phase Shift Keying (PSK)
- D . Transmit Power Control (TPC)
- E . Radio Resource Management (RRM)
- F . Dynamic Frequency Selection (DFS)
Which WLAN security mechanisms require that each WLAN user have unique authentication credentials? (Choose all that apply.)
- A . Open System
- B . WPA-Personal
- C . WPA2-Personal
- D . WPA2-Enterprise
- E . WPA3-Personal
- F . WPA3-Enterprise
Which two components of the pseudo-random backoff algorithm are used to create the pseudo-random backoff timer?
- A . Contention window
- B . Network allocation vector
- C . Duration/ID
- D . Slot time
Which technology will be needed in the U-NII-5 and U-NII-6 bands to prevent APs from interfering with incumbents in 6 GHz?
- A . DFS
- B . AFC
- C . TPC
- D . QAM
What answers correctly complete the following sentence? ____________ and ____________ carrier sense functions are used to determine if the wireless medium is busy. (Choose 2)
- A . Backoff
- B . Pseudo-random
- C . Virtual
- D . Active
- E . Physical
- F . Interframe
- G . Vector
ABC Company performs government contract work that requires disabling WLANs and has recently purchased an 802.11 Wireless Intrusion Prevention System (WIPS) to enforce their “NO WIRELESS” network security policy.
What attack type cannot be recognized by the WIPS?
- A . Deauthentication
- B . Rogue APs installation
- C . Layer 3 DoS
- D . Packet capturing
- E . RF jamming