A natural disaster has occurred in a remote area that is approximately 40 miles from the response team headquarters. The response team must setup a local wireless network using 802.11 WLAN access points. What is the best method, of those listed, for implementation of a network backhaul for communications across the Internet in this scenario?
A. Temporary wired cable
B. 802.11 bridging
C. Cellular/LTE
D. Temporary wired DSL
What factor does not influence the distance at which an RF signal can be effectively received?
A. Free Space Path Loss
B. Receiving station's radio sensitivity
C. Transmitting station's output power
D. Receiving station's output power
In a WALN security, what authentication method always creates Layer2 dynamic encryption keys?
A. Shared Key
B. WEP
C. HTTPS captive portal
D. EAP-TLS
When replacing the antenna of a WLAN device with a similar antenna type that has a higher passive gain, what antenna characteristic will decrease?
A. Range
B. Beam width
C. Active gain
D. Receive sensitivity
A client STA must choose the best AP for connectivity. As part of the evaluation, it must verify compatible data rates. What can the client STA use to verify that an AP supports the same data rates that it supports?
A. Beacon frames transmitted by the AP
B. Data frames sent between the AP and current clients STAs
C. Authentication frames transmitted by the other client STAs
D. Probe request frames transmitted by other client STAs
You are attempting to explain RF shadow and how it can cause lack of coverage. What common building item frequently causes RF shadow and must be accounted for in coverage plans?
A. Wooden doors
B. Carpeted floors
C. Elevators
D. Cubicle partitions
You are troubleshooting an issue reported by several wireless users. The problem is contained to one cell (several users connected to the same AP). You manage the WLAN and no other network devices. After analysis it appears to be a switch problem. What action should be taken?
A. Create a plan of action and implement it
B. Escalate the problem to the network administration team
C. Document the results and close the case
D. Escalate the problem to the wireless vendor support staff
A string of characters and digits is entered into an AP and a client STA for WPA2 security. The string is 8 characters long. What is this string called?
A. MSK
B. WEP key
C. Passphrase
D. PSK
Which one of the following channels can be used for VHT transmissions?
A. 44
B. 1
C. 7
D. 13
In a mesh BSS (MBSS), according to the 802.11-2016 standard, what device connects the mesh to an Ethernet network?
A. Mesh Gate
B. Mesh Switch
C. Mesh Router
D. Mesh Portal
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CWNP exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your CWNA-108 exam preparations and CWNP certification application, do not hesitate to visit our Vcedump.com to find your solutions here.