CWNP CWNA-109 Übungsprüfungen
Zuletzt aktualisiert am 12.05.2025- Prüfungscode: CWNA-109
- Prüfungsname: Certified Wireless Network Administrator
- Zertifizierungsanbieter: CWNP
- Zuletzt aktualisiert am: 12.05.2025
You are deploying a WLAN monitoring solution that utilizes distributed sensor devices.
Where should sensors be deployed for best results? Choose the single best answer.
- A . In switching closets
- B . Every 5 meters and alongside each AP
- C . In critical areas where WLAN performance must be high
- D . Above the plenum on each floor
A network administrator replaced some coaxial cabling used in an outdoor bridge deployment after water damaged the cabling.
After replacing the cabling, the network administrator noticed that the EIRP increased drastically and is possibly violating the maximum EIRP power regulation mandate.
What are the possible causes of the increased amplitude? (Choose all that apply.)
- A . The administrator installed a shorter cable.
- B . The administrator installed a lower-grade cable.
- C . The administrator installed a higher-grade cable.
- D . The administrator installed a longer cable.
- E . The administrator used a different-color cable.
Antenna manufacturers create ________ charts and elevation charts, commonly known as radiation patterns, for their antennas.
- A . Azimuth
- B . Relation
- C . Kizmit
- D . Distance
Which of the following encryption methods use symmetric ciphers? (Choose all that apply.)
- A . WEP
- B . TKIP
- C . Public-key cryptography
- D . CCMP
Which of the following tools can be used in an indoor site survey? (Choose all that apply.)
- A . Measuring wheel
- B . GPS
- C . Ladder
- D . Battery pack
- E . Microwave oven
A WLAN transmitter that emits a 50 mW signal is connected to a cable with 3 dB loss. If the cable is connected to an antenna with 9dBi gain, what is the EIRP at the antenna element?
- A . 23 dBm
- B . 26 dBm
- C . 13 dBm
- D . 10 dBm
802.11 technology is typically deployed at which fundamental layer of network architecture?
- A . Core
- B . Distribution
- C . Access
- D . Network
Which WLAN security mechanisms require that each WLAN user have unique authentication credentials? (Choose all that apply.)
- A . Open System
- B . WPA-Personal
- C . WPA2-Personal
- D . WPA2-Enterprise
- E . WPA3-Personal
- F . WPA3-Enterprise
Name a potential source of RF interference in the 5 GHz U-NII band.
- A . Cordless phones
- B . AM radio
- C . FM radio
- D . Microwave ovens
- E . Bluetooth
At which layer of the OSI model do most networking problems occur?
- A . Physical
- B . Data-Link
- C . Network
- D . Transport
- E . Session
- F . Presentation
- G . Application