CWNP CWNA-107 Certified Wireless Network Administrator Online Training
CWNP CWNA-107 Online Training
The questions for CWNA-107 were last updated at Apr 26,2025.
- Exam Code: CWNA-107
- Exam Name: Certified Wireless Network Administrator
- Certification Provider: CWNP
- Latest update: Apr 26,2025
You are the network administrator for ABC Company. Your manager has recently attended a wireless security seminar. The seminar speaker taught that a wireless network could be hidden from potential intruders if you disable the broadcasting of the SSID in Beacons and configured the access points not to respond to Probe Request frames that have a null SSID field.
Your manager suggests implementing these security practices.
What response should you give to this suggestion?
- A . Any tenants in the same building using advanced penetration testing tools will be able to obtain the SSID by exploiting WPA EAPOL-Key exchanges. This poses an additional risk of exposing the WPA key.
- B . Any 802.11 protocol analyzer can see the SSID in clear text in frames other than Beacons frames. This negates any security benefit of trying to hide the SSID in Beacons and Probe Response frames.
- C . To improve security by hiding the SSID, the AP and client stations must both be configured to remove the SSID from association request and response frames. Most VLAN products support this.
- D . This security practice prevents manufacturers’ client utilities from detecting the SSID. As a result, the SSID cannot be obtained by attackers, except through social engineering, guessing, or use of a WIPS.
What cipher suite is specified by the 802.11-2016 standard and is not deprecated?
- A . Temporal Key Integrity Protocol
- B . Extensible Authentication Protocol
- C . Counter Mode with CBC- MAC Protocol
- D . Wired Equivalent Privacy
To ease user complexity, your company has implemented a single SSID for all employees.
However, the network administrator needs a way to control the network resources that can be accessed by each employee based in their department.
What WLAN feature would allow the network administrator to accomplish this task?
- A . RBAC
- B . SNMP
- C . WIPS
- D . WPA2
ABC Company is planning a point-to-multipoint bridge deployment with standalone (autonomous) 802.11 bridge units. 802.1X/EAP will be used for bridge authentication. A Linux-based RADIUS server will be used for authentication.
What device in the bridge implementation acts as the 802.11X Authenticator?
- A . All non-root bridges
- B . The root bridge
- C . The Ethernet switch
- D . The RADIUS server
You are managing a wireless access point in autonomous mode using the Web based interface. You capture traffic during this management task and notice that you can see the HTML code of the Web pages for access point management.
What error in administration could be the cause of the security concern?
- A . A VPN with the AP is not established
- B . WPA2 is disabled on the WLAN
- C . HTTP is in use instead of HTTPS
- D . IPsec is not in use of the management connection as recommended
What is the most effective method of testing roaming in relation to 802.11 VoIP handsets?
- A . Use the built-in roaming monitor built into all VoIP handsets.
- B . Use a protocol analyzer to capture the traffic generated when a laptop roams.
- C . Place a call with the handset and move around the facility to test quality during roaming.
- D . Use a spectrum analyzer to monitor RF activity during a VoIP call.
You are performing a post-implementation validation survey.
What basic tool can be used to easily locate areas of high co-channel interference?
- A . Throughput tester
- B . Access point spectrum analyzer
- C . Laptop-based spectrum analyzer
- D . Wi-Fi scanner
During a post-implementation survey, you have detected a non-802.11 wireless device transmitting in the area used by handheld 802.11g scanners.
What is the most important factor in determining the impact of this non-802.11 device?
- A . Protocols utilized
- B . Channel occupied
- C . Receive sensitivity
- D . Airtime utilization