You are on page 1of 7

CWNA Practice questions (prior to 2010)

What IEEE standard or draft specifies seamless roaming between access points?
A. 802.11
B. i
C. a
D. e
E. f

Answer: E
Explanation: Page 316 CWNA Study Guide 3rd edition

Which of the following factors influence Wireless LAN throughput? Select two.
A. Number of simultaneous users using the Wireless LAN
B. Antenna height
C. Use of VPN tunnels across the wireless LAN
D. Roaming handoff speed

Wireless LAN antennas have radiation fields called lobes. Which of the following
are different types of lobes on Wireless LAN antennas? Select two.
A. Side lobes
B. Directional lobes
C. Cylindrical lobes
D. Main lobes
E. Top lobes
Answer: A, D

Which layers of the OSI model are specified as part of the 802.11 standard? Sele
ct two.
A. Physical
B. Data-Link
C. Network
D. Transport
Answer: A, B

Which of the following are goals of the Wi-Fi Interoperability Test Plan?
A. To finalize the IEEE 802.11b standard
B. To ensure interoperability among 802.11b, 802.11a, 802.11g and future IEEE st
andards devices
C. To finalize Wi-Fi standard
D. To promote the use of 802.11a technology
E. To ensure interoperability between HomeRF and 802.11 FHSS devices
Answer: B See CWNA Official Study Guide, 2nd Edition, Page 60 Not A, C. Old goal
s that have been met already.
Enterprise Wireless Gateways often use RADIUS to authenticate users. The RADIUS
server may query which of the following database types for authentication? Selec
t three.
A. CAM table
B. Novell Directory Service
C. ODBcompliant databases
D. LDAP-compliant databases
E. WINS
Answer: B, C, D

Which of the following criteria is used by wireless client devices to associate


with an access point? Select two.
A. Signal strength
B. Physical distance to the closest access point
C. Signal quality
D. Round trip time of a PING packet
Answer: A, C
Explanation: Page 337 CWNA Study Guide 3rd edition

What is the bandwidth of a single DSSS channel in the 2.4 GHz ISM band?
A. 20 MHz
B. 22 MHz
C. 24 MHz
D. 30 MHz
nswer: B
Explanation: Pg 76 in CWNA User Guide 2nd edition

Which of the following factors determine the diameter of a wireless LAN link Fre
snel Zone? Select two.
A. Height of the antennas
B. Size of the antennas dishes
C. Distance between the antennas
D. Frequency of the transmission
E. Transmission power
Answer: C, D
Explanation: Pg 38 in CWNA User Guide 2nd edition

Lightning arrestors protect wireless LANs from what type of power fluctuation?
A. Direct lightning strikes
B. High transient current
C. Severe voltage sag
D. RF Noise due to jamming
CWNP â ¢
PW0-100 Certified Wireless Network Administrator (CWNA)

Note 1: PW0-100 Exhibit and all related diagrams are not shown in demo questions
.
Note 2: PW0-100 Answers are not shown in demo questions.
Exhibits and Answers are only provided in the Full Version.
Demo Question 10.
Lightning arrestors protect wireless LANs from what type of power fluctuation?
A. Direct lightning strikes
B. High transient current
C. Severe voltage sag
D. RF Noise due to jamming
Answer: B

Assume that you are performing a site survey. The plan is to erect an outside to
wer on the ground for a 2.4 GHz wireless LAN antenna. Which of the following que
stions should you consider asking? Select two.
A. Are nearby buildings in my line-of-sight?
B. Are there cordless phones in use in nearby buildings?
C. Is grounding available?
D. How heavy is the antenna?
E. Are there any nearby radio stations using 2.4 GHz frequencies?
Answer: A, E
Explanation: For A see CWNA Official Study Guide, 3rd Edition, page 515. For E s
ee CWNA Official Study Guide, 3rd Edition, page 488.

A LOSS of 3 dB will yield what power ratio?


A. 1:3
B. 1:10
C. 2:1
D. 1:2
Answer: D
Explanation: Loss of 3 dB results in the halving of output power

How many 3.4 GHz ISM band DSSS channels are available for use in the United Stat
es according to the FCC?
A. 1
C. 2
D. 4
Answer: B
What is an appropriate use of an IEEE 802.11b wireless LAN?
A. Large peer-to-peer network that requires high throughput
B. Use with high-demand application servers
C. Last Mile connectivity to compete with Telco & Cable providers
D. Streaming video applications to the desktop
Answer: C
Explanation: See CWNA Official Study Guide, 3rd Edition, Page 11 (Last Mile Data
Delivery - Wireless ISP)

What component is concatenated with the WEP secret key to form a WEP key?
A. Plain text
B. IV
C. PRNG
D. ICV
E. Key stream
Answer: B

To what device can a wireless bridge (acting as a wireless bridge) connect wirel
essly?
A. A wireless bridge
B. An access point
C. An Ethernet wireless Gateway
D. An Ethernet converter
Answer: A

What options best describes a Network Layer device designed to provide Internet
or network connectivity to a small number of wireless nodes?
A. Residential Wireless Gateway
B. Wireless Workgroup Bridge
C. Wireless Bridge
D. Universal Access Point
Answer: A

Which of the following solutions can be applied to the "hidden node" problem wit
h wireless LAN? Select three.
A. Increase output power on clients
B. Remove interfering obstacles between clients
C. Move clients closer together
D. Increase output power on access points
E. Remove the access point from network
Answer: A, B, C

How many antennas are required to implement Antenna Diversity on a wireless LAN
device?
A. 1
B. 2
C. 3
D. 4
Answer: B

A transmitter that emits an 80 mW signal is connected to a cable with 6 dB loss.


If the cable is connected to an antenna with a 16dBi gain, what is the resultan
t power output in mW (EIRP) from the antenna?
A. 160mW
B. 320mW
C. 800mW
D. 1600mW
Answer: C
Explanation: Net Gain= -6 dB + 16 dBi = + 10 dBi which represents a tenfold incr
ease in power. Resultant output Power = 10 times input power= 10 X 80 mW = 800 m
W

Where can the frame fragmentation threshold setting be manually configured on a


wireless LAN? Select two.
A. On the wireless station by the end user
B. On the access point by the network administrator
C. The network layer protocol programming interface
D. On the enterprise wireless gateway
Answer: A, B
Explanation: Pg 299 in CWNA User Guide 2nd edition

Multipath can cause which of the following effects at the receiving antenna? Sel
ect two.
A. Increased signal amplitude
B. Decreased signal amplitude
C. Signal regeneration
D. Signal splitting
E. Signal purification
Answer: A, B

Which items are benefits of a wireless LAN? Select two.


A. Native and flexible QoS features
B. Mobility in the enterprise
C. Strong security by design
D. Reduced cost of ownership for portable networks
E. Moderate cost of licensing
Answer: B, D

By design, what 802.11 spread spectrum technology exhibits resistance to narrowb


and RF interference?
A. FHSS
B. DSSS
C. Point-to-point Infrared
D. Broadcast Infrared
Answer: A

In the IEEE 802.11 standard, which Radio Frequency spread spectrum technologies
are specified? Select two.
A. Infrared
B. Frequency Hopping
C. Direct Sequencing
D. Wide Band
Answer: B, C

Which of the following technologies are components used as part of security solu
tion in a wireless LAN? Select three.
A. MAC filters
B. WLIF
C. RADIUS server
D. WINS Servers
E. VPN server
F. Authenticated DNS
Answer: A, C, E

Before performing a site survey for a hospital, the network manager notifies you
that there are connection-oriented medical applications used across the hospita
l network. Because the application is connection-oriented, it will be sensitive
to service disruptions. For this reason, it is particularly important to locate
sources of RF interference and RF dead spots. Which of the following items put t
he application at risk of time-outs? Select three.
A. High population of patients
B. Long hallways
C. Fire doors
D. Metal blinds
E. Radiology departments
F. Mobile food carts
Answer: C, D, E

You are administering a network with wireless LAN components for EliteCertify.co
m. The wireless portion of the network is configured using statically assigned W
EP keys stored on each station's wireless PC Card. It has been reported to you t
hat one of the wireless client computers containing a wireless PC Card has been
stolen. What reasonable actions could be taken to restore the wireless LAN to th
e former level of security? Select two.
A. Install a wireless VPN that would base authentication on usernames and passwo
rd
B. Disable the wired port on each access point until the stolen PC Card could be
recovered
C. Install a wireless LAN encryption and authentication system that would implem
ent 802.1x/EAP and RADIUS
D. Connect each access point into a switch instead of into a hub
E. Switch all wireless client PC Cards to a different manufacturer to prevent fu
ture security breaches
Answer: A, C
Speeds of up to ______ Mbps are allowed within the IEEE 802.11a standard.
A. 36
B. 54
C. 72
D. 100
Answer: B

If two DSSS access points are placed on the same channel in the same physical sp
ace, which of the following results will occur? Select three.
A. The available bandwidth to users will increase
B. The available bandwidth to users will decrease
C. The access points will interfere with each other
D. One access point will automatically adjust its channel
E. All client computers will alternate connectivity between access points
F. Users will be able to roam between the two access points
Answer: B, C, E
Explanation: Co-channel interference results from two APs transmitting on the sa
me channel in the same area. In a typical 802.11 wireless network, APs continual
ly broadcast a signal, and any wireless client within range can lock onto that s
ignal to make a connection. But when APs are placed close enough together to pro
vide continuous coverage over a large area, it's possible (or even likely) that
some APs will generate signals that interfere with other APs. When this happens,
two or more APs transmit packets at the same time on the same channel, corrupti
ng packets and causing clients to experience transmission delays and lower perfo
rmance. In addition, clients located equidistant between two APs on the same cha
nnel may flip-flop, not knowing whether to access one or the other. Reference: h
ttp://wirelessreview.com/infrastructure/technology/wlan_power_architecture_04110
5/

You might also like