Free CWNA-109 Exam Braindumps (page: 7)

Page 7 of 32

When compared with legacy Power Save mode, how does VHT TXOP power save improve battery life for devices on a WLAN?

  1. Legacy Power Save mode was removed in the 802.11ac amendment.
  2. VHT TXOP power save allows the WLAN transceiver to disable more components when in a low power state.
  3. VHT TXOP power save uses the partial AID in the preamble to allow clients to identify frames targeted for them.
  4. VHT TXOP power save allows stations to enter sleep mode and legacy Power Save does not.

Answer(s): B

Explanation:

VHT TXOP (Very High Throughput Transmit Opportunity) power save is a feature introduced with the 802.11ac amendment, which is designed to improve the power efficiency of devices connected to a WLAN. This feature enhances battery life in several ways, compared to the legacy Power Save mode:
Enhanced Power Saving: VHT TXOP power save allows devices to disable more components of the WLAN transceiver when they are in a low power state. This reduces the power consumption during periods when the device is not actively transmitting or receiving data. Intelligent Wake-Up Mechanisms: It employs more sophisticated mechanisms for devices to determine when they need to wake up and listen to the channel, further reducing unnecessary power usage.
Optimized Operation: This power save mode is optimized for the high-throughput environment of 802.11ac networks, allowing devices to efficiently manage power while maintaining high performance.
Legacy Power Save mode, introduced in earlier versions of the 802.11 standards, does not provide the same level of component disablement or the intelligent wake-up mechanisms found in VHT TXOP power save, making option B the correct answer.


Reference:

IEEE 802.11ac-2013 Amendment: Enhancements for Very High Throughput for Operation in Bands below 6 GHz.
CWNA Certified Wireless Network Administrator Official Study Guide: Exam CWNA-109, by David D.
Coleman and David A. Westcott.



What 802.11 network configuration would result in multiple stations broadcasting Beacon frames with the same BSSID but with different source addresses?

  1. Multiple APs have been loaded with the same configuration from an image file.
  2. A single AP supports multiple BSSs with different SSIDs.
  3. An IBSS is used instead of a BSS.
  4. An SCA network is in use.

Answer(s): C

Explanation:

An IBSS is used instead of a BSS is a network configuration that would result in multiple stations broadcasting Beacon frames with the same BSSID but with different source addresses. An IBSS

(Independent Basic Service Set) is a type of WLAN that does not use an AP but rather allows stations to communicate directly with each other in a peer-to-peer manner. An IBSS is also known as an ad- hoc network or a peer-to-peer network. In an IBSS, each station generates its own Beacon frames to announce its presence and capabilities to other stations within range. The Beacon frames have the same BSSID, which is randomly generated by one of the stations when creating the IBSS, but they have different source addresses, which are the MAC addresses of each station's radio interface. The BSSID is used to identify the IBSS and prevent stations from joining other IBSSs with different BSSIDs.


Reference:

, Chapter 1, page 25; , Section 1.1



What primary metric of scanning can stations use to select the best AP for connectivity to the desired BSS?

  1. Signal strength of AP beacons received.
  2. PING latency when testing against an Internet server.
  3. Throughput speed in Mbps.
  4. FCS errors in frames transmitted to and from the AP.

Answer(s): A

Explanation:

When a station scans for available wireless networks, it listens for beacon frames sent by APs. A beacon frame contains information about the BSS, such as SSID, supported rates, channel, security, etc. The station also measures the signal strength of the beacon frames, which indicates how well the station can communicate with the AP. The signal strength is usually expressed in dBm or RSSI units. The higher the signal strength, the better the connection quality and performance. Therefore, the station can use the signal strength of AP beacons as the primary metric to select the best AP for connectivity to the desired BSS12.


Reference:

CWNA-109 Study Guide, Chapter 6: Wireless LAN Devices and Topologies, page 249; CWNA-109 Study Guide, Chapter 6: Wireless LAN Devices and Topologies, page 243.



Lynne runs a small hotel, and as a value added service for his customers he has implemented a Wi-Fi hot-spot. Lynne has read news articles about how hackers wait at hot-spots trying to take advantage of unsuspecting users. He wants to avoid this problem at his hotel.

What is an efficient and practical step that Lynne can take to decrease the likelihood of active attacks on his customers' wireless computers?

  1. Enable station-to-station traffic blocking by the access points in the hotel.
  2. Implement Network Access Control (NAC) and require antivirus and firewall software along with OS patches.
  3. Implement an SSL VPN in the WLAN controller that initiates after HTTPS login.
  4. Require EAP-FAST authentication and provide customers with a username/password on their receipt.

Answer(s): A

Explanation:

In a public Wi-Fi hotspot, like the one Lynne runs in his hotel, ensuring customer security against active attacks is crucial. Active attacks involve unauthorized access, eavesdropping, or manipulation of the network traffic. To mitigate such threats, an effective and practical step is:
Station-to-Station Traffic Blocking: Also known as client isolation, this feature prevents direct communication between devices connected to the Wi-Fi network. By enabling this on the access points, Lynne can significantly decrease the likelihood of active attacks like man-in-the-middle

(MITM) attacks, where an attacker intercepts and possibly alters the communication between two parties.
The other options, while beneficial for network security, might not be as straightforward or practical for Lynne's situation:
Network Access Control (NAC) requires a more complex infrastructure and management, which might not be ideal for a small hotel setup.
Implementing an SSL VPN adds an extra layer of security but might complicate the login process for users, potentially affecting the user experience.
Requiring EAP-FAST authentication provides secure authentication but may not be feasible for transient customers who expect quick and easy network access. Therefore, enabling station-to-station traffic blocking is a practical and efficient measure that Lynne can implement to enhance customer security on the Wi-Fi network.


Reference:

CWNA Certified Wireless Network Administrator Official Study Guide: Exam CWNA-109, by David D.
Coleman and David A. Westcott.
Best practices for securing a wireless network in a public hotspot environment.



Page 7 of 32



Post your Comments and Discuss CWNP CWNA-109 exam with other Community members:

Quentin commented on November 14, 2024
I noticed that some comments were related to answers not being 100% correct. But for me as long as questions are real and same as the actual exam I was okay.
Mexico
upvote