Black Friday Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Master the CWNP CWNA-107 Exam: Essential Study Tips and Strategies

Questions 31

What fact is true regarding controllers and Aps in a split-MAC architecture?

Options:

A.

Using centralized data forwarding, frames leaving the Aps are never tagged Ethernet frames with VLAN identifiers

B.

An IP tunnel is established between the AP and controller for AP management and control functions

C.

With 802.1X/EAP security, the AP acts as the supplicant and the controller acts as the authenticator

D.

Management and data frames must be processed locally by the AP, while control frames are sent to the controller

Buy Now
Questions 32

You are tasked with performing a throughput test on the WLAN. The manager asks that you use open source tools to reduce costs. What open source tool is designed to perform a throughput test?

Options:

A.

IxChariot

B.

Python

C.

PuTTy

D.

iPerf

Buy Now
Questions 33

In a mesh BSS (MBSS), according to the 802.11-2016 standard, what device connect the mesh to an Ethernet network?

Options:

A.

Mesh Gate

B.

Mesh Switch

C.

Mesh Router

D.

Mesh Portal

Buy Now
Questions 34

What non-standard WLAN solution attempts to give a longer transmission windows to devices with higher data rates than devices with lower data rates?

Options:

A.

AirTime Faimess

B.

Band Steering

C.

ARM

D.

RRM

Buy Now
Questions 35

When using an RF splitter to connect one transceiver to sector antennas loss is incurred. What is this loss called?

Options:

A.

Conversion loss

B.

Intentional loss

C.

Through loss

D.

Active loss

Buy Now
Questions 36

What can an impedance mismatch in the RF cables and connectors cause?

Options:

A.

Fewer MCS values in the MCS table

B.

Excessive VSWR

C.

Increased amplitude of the RF signal

D.

Increased range of the RF signal

Buy Now
Questions 37

What 802.11 PHY uses available space in very low frequency ranges that is not in use at the time by broadcast video signals?

Options:

A.

DMG

B.

SIG

C.

DSSS

D.

TVNT

Buy Now
Questions 38

In a WALN security, what authentication method always creates Layer2 dynamic encryption keys?

Options:

A.

Shared Key

B.

WEP

C.

HTTPS captive portal

D.

EAP-TLS

Buy Now
Questions 39

You recently purchased four laptops containing dual-band 802.11ac adapters. The laptops can connect to your 2.4 GHz network, but they cannot connect to the 5 GHz network. The laptops do not show the 5 GHz SSIDs, which are different than the 2.4 GHz SSIDs. Existing devices can connect to the 5 GHz SSIDs with no difficulty. What is the likely problem?

Options:

A.

Interference from non-Wi-Fi sources

B.

Faulty drivers

C.

DoS attack

D.

Interference from other WLANs

Buy Now
Questions 40

What security method is commonly used for VoIP handsets when the infrastructure does not support OKC or FT roaming?

Options:

A.

WPA2-Enterprise with EAP-TTLS

B.

WPA2-Enterprise with EAP-TLS

C.

WPA2-Enterprise with PEAP

D.

WPA2-Personal

Buy Now