Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: s2p65

Easiest Solution 2 Pass Your Certification Exams

CWNA-106 CWNP Certified Wireless Network Administrator Free Practice Exam Questions (2025 Updated)

Prepare effectively for your CWNP CWNA-106 Certified Wireless Network Administrator certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 1 / 2
Total 120 questions

What WLAN system feature is required to produce a scenario with the following configuration on a single access point? (Choose 2)

1. SSID = Guest / BSSID = AA:AA:AA:AA:AA:AA /

VLAN = 22 / Subnet = 192.168.22.0 / RF Channel = 6

2. SSID = Corporate / BSSID = BB:BB:BB:BB:BB:BB /

VLAN = 33 / Subnet = 192.168.33.0 / RF Channel = 6 / User Type A

3. SSID = Corporate / BSSID = BB:BB:BB:BB:BB:BB /

VLAN = 44 / Subnet = 192.168.44.0 / RF Channel = 6 / User Type B

A.

Multiple WLAN Profiles

B.

Call Admission Control

C.

Virtual Cell with SCA

D.

Access Categories

E.

User-based authentication

F.

Dual-radio AP hardware

G.

Integrated DHCP server

What problems may occur when there are hidden nodes in the BSS?

A.

Increase in downlink (transmitted by AP) frame retries

B.

High retransmission count for a subset of client stations

C.

Use of frame fragmentation with fragment bursts

D.

Excessive use of null data frames

E.

Duration values vary widely in each data frame

What HT technology requires MIMO support on both the transmitter and receiver?

A.

Spatial multiplexing

B.

Short guard intervals

C.

Maximal ratio combining

D.

Orthogonal Frequency Division Multiplexing

What answers correctly complete the following sentence?

____________ and ____________ carrier sense functions are used to determine if the wireless medium is busy. (Choose 2)

A.

Backoff

B.

Pseudo-random

C.

Virtual

D.

Active

E.

Physical

F.

Interframe

G.

Vector

When using an RF splitter to connect one transceiver to sector antennas loss is incurred. What is this loss called?

A.

Conversion loss

B.

Through loss

C.

Active loss

D.

Intentional loss

What advantages does using predictive site survey modeling software offer over performing a manual site survey? (Choose 2)

A.

Predictive modeling software can predict the ideal access point location 100% of the time, whereas the results from manual surveying are less reliable.

B.

Predictive modeling software makes it simple to assess multiple different AP locations and then adjust and display the AP’s expected coverage pattern in almost real-time.

C.

Predictive modeling software provides more reliable data than manual surveys when fine-tuning and validating access point placement after the installation.

D.

The exact impact of interference sources from external networks can be more accurately measured when using predictive modeling software than with manual surveys.

E.

It takes less time to create an initial site survey for a large facility when using predictive modeling software than when performing a manual survey.

Which features are incorporated in the 802.11-2012 specification and are recommend for robust WLAN client security? (Choose 2)

A.

SSID hiding

B.

CAPWAP with DTLS

C.

802.1X/EAP

D.

CCMP cipher suite

E.

IPSec VPN

F.

MAC address white lists

The IEEE 802.11a/n/ac physical layer technologies utilize the 5 GHz frequency band. What is true of the channels in this frequency spectrum?

A.

14 channels are available worldwide.

B.

11 channels are available worldwide.

C.

Regulatory domains worldwide require DFS and TPC in all these channels.

D.

DFS may be required in some regulatory domains on some channels.

E.

802.11 channels are separated by 5 Mhz

A WLAN transmitter that emits a 200 mW signal is connected to a cable with 3 dB loss.

If the cable is connected to an antenna with 10 dBi gain, what is the EIRP at the antenna element?

A.

10 dBm

B.

13 dBm

C.

20 dBm

D.

26 dBm

E.

30 dBm

In an 802.11 2.4 GHz system, what 22 MHz channels are considered non-overlapping? (Choose 2)

A.

Channels 5 and 10

B.

Channels 1 and 5

C.

Channels 3 and 7

D.

Channels 2 and 8

E.

Channels 8 and 11

F.

Channels 10 and 13

What term describes the effect of increasing the intensity of an RF wave with an antenna by focusing the energy in a specific direction?

A.

Distributed Radiation

B.

Active Amplification

C.

Beam Compression

D.

Passive Gain

E.

RF Flooding

Why is it recommended for a wireless network administrator to disable 1 Mbps and 2 Mbps data rates on the WLAN infrastructure? (Choose 2)

A.

To improve capacity in the BSS

B.

To reduce the size of the AP’s effective service area

C.

To prevent 802.11b devices from associating

D.

To maximize the range of the highest data rates

E.

To prevent VoWiFi multicast frames

F.

To enable support for long preambles

ABC Company has a 2.4 and 5 GHz WLAN deployment. DFS functionality is enabled as required by the regulatory domain and APs use DFS channels as long as radar is not detected. Band steering is also enabled to encourage dual-band clients to use frequency bands with more capacity.

Your performance analysis shows that many dual-band VoWiFi client devices will move back and forth between 2.4 and 5 GHz as the users roam throughout the building. All APs have 2.4 and 5 GHz radios enabled with transmit power adjusted to accommodate relatively similar cell sizes.

This “band hopping” behavior is viewed by network staff to be undesirable. What is the most likely cause of the unpredictable client band selection behavior?

A.

Interference from 5 GHz radar sources has increased frame corruption and retries on channels 36-48.

B.

5 GHz frequencies offer better RF penetration than 2.4 GHz, but 2.4 GHz offers more voice call capacity and lower latency than 5 GHz.

C.

The voice client does not support DFS, and therefore experiences some 5 GHz coverage holes as it moves through the network.

D.

The client’s band selection algorithm prefers 5 GHz, but band steering behavior usually steers 75-85% of client devices to 2.4 GHz.

When a client moves to a new BSS within an ESS, what steps are part of the 802.11 reassociation process? (Choose 2)

A.

The client station transmits a Reassociation Request frame to its current access point.

B.

The current access point informs the IP gateway of the reassociation.

C.

The current access point triggers the client’s reassociation service.

D.

The new access point transmits a Reassociation Response to the client station with a status value.

E.

The client and new access point create unicast encryption keys.

F.

The client station transmits a deauthentication frame to the current access point.

What distinguishes an independent basic service set (IBSS) from an infrastructure basic service set (BSS)?

A.

An IBSS does not have a distribution system (DS), but a BSS does.

B.

An IBSS does not require beacon frames, but a BSS does.

C.

An IBSS does not support 802.11 authentication or association, but a BSS does.

D.

An IBSS does not support any 802.11ac enhancements, but a BSS does.

When compared with legacy Power Save mode, how does VHT TXOP power save improve battery life for devices on a WLAN?

A.

VHT TXOP power save allows stations to enter sleep mode and legacy Power Save does not.

B.

VHT TXOP power save uses the partial AID in the preamble to allow clients to identify frames targeted for them.

C.

Legacy Power Save mode was removed in the 802.11ac amendment.

D.

VHT TXOP power save allows the WLAN transceiver to disable more components when in a low power state.

In WLAN security, which authentication methods always create Layer 2 dynamic encryption keys? (Choose 2)

A.

HTTPS Captive Portal

B.

WEP

C.

WPA2-PSK

D.

EAP-TLS

E.

Shared Key

F.

TKIP

ABC Company is planning a point-to-multipoint outdoor bridge deployment with standalone (autonomous) 802.11 bridge units. 802.1X/EAP will be used for bridge authentication. A Linux-based RADIUS server will be used for authentication. What device in the bridge implementation acts as the 802.1X Authenticator?

A.

The RADIUS server

B.

All non-root bridges

C.

A designated non-root bridge

D.

The root bridge

E.

The Ethernet switch

When designing a WLAN infrastructure implementation for high client density at a public venue such as a conference or stadium, what are common best practices? (Choose 2)

A.

Use high-gain omnidirectional antennas to improve SNR

B.

Use directional antennas to isolate the RF propagation

C.

Configure APs to transmit at or near their maximum power setting

D.

Use WPA2-Personal security for ease of deployment

E.

Disable 802.11ac MCS rates to prevent high overhead protection mechanisms

F.

Implement a band steering feature for dual-band clients

What statements describe industry practices for communication protocols between WLAN controllers and controller-based APs? (Choose 2)

A.

All vendors use the same protocol so that APs will interoperate with WLAN controllers from other vendors.

B.

Some vendors use proprietary protocols, and some vendors use protocols based on public standards like RFCs.

C.

For most vendors, the controller-based APs maintain data and control tunnels with at least two controllers for immediate failover and redundancy.

D.

All vendors support at least one L2 or L3 broadcast protocol for controller discovery by controller-based APs.

E.

All vendors recommend using L2 (instead of L3) controller discovery and tunneling protocols in large enterprises.

Page: 1 / 2
Total 120 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved