You are deploying a WLAN monitoring solution that utilizes distributed sensor devices. Where should sensors be deployed for best results? Choose the single best answer.
A. In switching closets
B. Every 5 meters and alongside each AP
C. In critical areas where WLAN performance must be high
D. Above the plenum on each floor
During a post-implementation survey, you have detected a non-802.11 wireless device transmitting in the area used by handheld 802.11g scanners. What is the most important factor in determining the impact of this non-802.11 device?
A. Receive sensitivity
B. Channel occupied
C. Airtime utilization
D. Protocols utilized
As an RF wave propagates through space, the wave front experiences natural expansion that reduces its signal strength in an area. What describes the rate at which this expansion happens?
A. Fresnel zone thinning
B. Ohm's law
C. Inverse square law
D. MU-MIMO
In an 802.11 2.4 GHz system, what 22 MHz channels are considered non-overlapping?
A. 7 and 11
B. 2 and 8
C. 1 and 5
D. 4 and 6
In an 802.11n (H T) 2.4 GHz BSS, what prevents each station from using all the airtime when other client stations are actively communicating in the same BSS?
A. 802.11 DOS prevention
B. OFDMA
C. CSMA/CD
D. CSMA/CA
A string of characters and digits is entered into an AP and a client STA for WPA2 security. The string is 8 characters long. What is this string called?
A. MSK
B. WEP key
C. Passphrase
D. PSK
An RF signal sometimes bends as it passes through a material rather than around an obstacle. What is the RF behavior that this statement best describes?
A. Diffraction
B. Refraction
C. Scattering
D. Reflection
What is always required to establish a high quality 2.4 GHz RF link at a distance of 3 miles (5 kilometers)?
A. Minimum output power level of 2 W
B. Grid antennas ateach endpoint
C. A minimum antenna gain of 11 dBi at both endpoints
D. A Fresnel Zone that is at least 60% clear of obstructions
What best describes WPA2 in relation to 802.11 wireless networks?
A. WPA2 is the standard that defines security for WLANs.
B. WPA2 is a certification created by the Wi-Fi Alliance that validates devices correctly implement CCMP/ AES.
C. WPA2 is the second version of WPA and it enhances security through the use of TKIP instead of WEP.
D. WPA2 is specified in the 802.11 standard as implementing CCMP/AES.
You have received a report of poor wireless connections on the third floor of a building under your administration. Three individuals have reported the problem. Apparently, the connections are reporting a strong signal, but the users cannot access the Internet. With the problem identified, what is the next logical step in the troubleshooting process?
A. Verify the solution
B. Discover the scale of the problem
C. Perform corrective actions
D. Create a plan of action or escalate the problem
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CWNP exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your CWNA-109 exam preparations and CWNP certification application, do not hesitate to visit our Vcedump.com to find your solutions here.