CWNA Wireless Network Administrator - Question List

Select how would you like to study

36. Which of the following statements is true if an RF signal is considered as a spread spectrum?
  1. The system sending the signal uses infrared technology.
  2. The power required to send information is significantly greater.
  3. The bandwidth used is much wider than that required to send information.
  4. The bandwidth used is much less than that used to send information.
37. An 802.11g network has the protected mode enabled. Which of the following provides the best throughput with the least likelihood of retransmissions?
  1. AP using RTS/CTS and stations using RTS/CTS
  2. AP using RTS/CTS and stations using CTS-to-Self
  3. AP using CTS-to-Self and stations using RTS/CTS
  4. AP using CTS-to-Self and stations using CTS-to-Self
38. Which of the following specifies why Shared Key authentication is considered a security risk?
  1. Access points transmit unencrypted challenge text and receive the same challenge text encrypted with the WEP key
  2. Keys are shared broadcasted to all network nodes
  3. A hacker can sniff the keys with a protocol analyzer
  4. All computers use identical WEP keys
39. When should you configure the Continuous Aware Mode on wireless LAN clients?
  1. When portable laptop station users need the ability to roam away from power sources
  2. When desktop stations are not frequently moved from their permanent location
  3. When PDAs have limited battery life
  4. When laptop computers do not remain connected to a power source
40. Which of the following is a disadvantage associated with using a number of access points in the Repeater Mode in a series?
  1. Throughput will be reduced to unacceptable levels
  2. All access points should be physically connected to the network.
  3. Users attached to the repeater access point will experience high latencies.
  4. Legacy serial devices will not be able to communicate with the root access point.

Select how would you like to study