Exam4Training

CWNP CWT-101 CWNP Certified Wireless Technician (CWT) Online Training

Question #1

Which type of mount is commonly used for installing an 802.11 AP on a pole or mast?

  • A . Wall mount
  • B . Pole/mast mount
  • C . Ceiling mount
  • D . Floor mount

Reveal Solution Hide Solution

Correct Answer: B
Question #2

What is the maximum power that an 802.3at Power over Ethernet (PoE) injector can output in the Ethernet interface?

  • A . 30 W
  • B . 15.4 W
  • C . 12.95 W
  • D . 25.5 W

Reveal Solution Hide Solution

Correct Answer: D
Question #3

What kind of authentication is used by WPA2-Enterprise implementations?

  • A . WEP
  • B . Preshared key
  • C . Passphrase
  • D . 802.1X/EAP

Reveal Solution Hide Solution

Correct Answer: D
Question #4

Which security problem can occur if the network key used for authentication during the join process in a wireless network is incorrect?

  • A . Configuration errors
  • B . Incorrect passphrases
  • C . Incompatible EAP methods
  • D . Incorrect join keys

Reveal Solution Hide Solution

Correct Answer: D
Question #5

How many channels are available in the 2.4 GHz frequency band in all regulatory domains?  

  • A . 3
  • B . 14
  • C . 13
  • D . 11

Reveal Solution Hide Solution

Correct Answer: B
Question #6

Which device type is typically characterized by its larger size, stationary nature, and greater processing power?

  • A . Laptops
  • B . Tablets
  • C . Mobile phones
  • D . Desktops

Reveal Solution Hide Solution

Correct Answer: D
Question #7

What are some common causes of mobility problems in wireless networks?

  • A . Configuration errors
  • B . Improper network settings
  • C . Unsupported fast roaming methods
  • D . Non-implemented roaming features

Reveal Solution Hide Solution

Correct Answer: A
Question #8

Which location process in 802.11 wireless networks involves actively sending probe requests to discover available networks?

  • A . Passive scanning
  • B . Active scanning
  • C . Authentication
  • D . Association

Reveal Solution Hide Solution

Correct Answer: B
Question #9

What do antenna pattern charts represent?

  • A . Available channels by protocol
  • B . Co-Channel Interference (CCI) and Co-Channel Contention (CCC)
  • C . Antenna patterns and signal coverage areas
  • D . Regulatory constraints on channel selection

Reveal Solution Hide Solution

Correct Answer: C
Question #10

At what point is RF power typically stipulated in milliwatts?

  • A . At the receiver
  • B . Fifty feet from the transmitter
  • C . At the transmitter
  • D . One hundred feet from the transmitter

Reveal Solution Hide Solution

Correct Answer: C

Question #11

How can RF signal propagation be affected by obstacles or materials?

  • A . Gain and loss
  • B . Reflection
  • C . Refraction
  • D . Scattering

Reveal Solution Hide Solution

Correct Answer: D
Question #12

Which feature of an 802.11 AP determines the supported wireless frequency bands?

  • A . PHY and frequency band support
  • B . Single-band vs. dual-band
  • C . Output power control
  • D . Operational modes

Reveal Solution Hide Solution

Correct Answer: A
Question #13

What term is used to describe the phenomenon of an RF signal bouncing off a surface?

  • A . Gain and loss
  • B . Reflection
  • C . Refraction
  • D . Scattering

Reveal Solution Hide Solution

Correct Answer: B
Question #14

What are some common causes of performance problems in wireless networks?

  • A . Configuration errors
  • B . Interference
  • C . Low data rates
  • D . Co-channel interference (CCI)

Reveal Solution Hide Solution

Correct Answer: A
Question #15

Which one of the following is a non-deprecated security solution in the 802.11 standard?

  • A . WEP
  • B . CCMP/AES
  • C . TKIP/RC4
  • D . Shared Key Authentication

Reveal Solution Hide Solution

Correct Answer: B
Question #16

What protocol is sometimes used to access a network or user directory by a RADIUS server instead of using an internal user database?

  • A . DHCP
  • B . NTP
  • C . EAP
  • D . LDAP

Reveal Solution Hide Solution

Correct Answer: D
Question #17

How many non-overlapping 20 MHz channels are available in the 5 GHz frequency band assuming the regulatory domain allows them all?

  • A . 11
  • B . 25
  • C . 24
  • D . 14

Reveal Solution Hide Solution

Correct Answer: C
Question #18

Which factor determines the available channels for RF communication?

  • A . Regulatory constraints on channel selection
  • B . Best practices for channel selection
  • C . Antenna types
  • D . Protocol used

Reveal Solution Hide Solution

Correct Answer: D
Question #19

You have implemented an 802.11 security solution that requires certificates.

What are you using?

  • A . WEP
  • B . WPA2-Enterprise
  • C . WPA-Personal
  • D . WPA2-Personal

Reveal Solution Hide Solution

Correct Answer: B
Question #20

What is a common problem in specialty Wi-Fi devices?

  • A . The use of 802.11 VHT-only chipsets
  • B . The use of older, less capable 802.11 chipsets
  • C . The use of 802.11 DSSS-only chipsets
  • D . The use of newer, more capable 802.11 chipsets

Reveal Solution Hide Solution

Correct Answer: B

Question #21

When three APs are placed within ten meters of each other and use the same channel, but are not Single Channel Architecture (SCA) APs, what problem will be exaggerated?

  • A . Non-Wi-Fi interference
  • B . Antenna misalignment
  • C . ACI
  • D . CCI

Reveal Solution Hide Solution

Correct Answer: D
Question #22

What is the term used to describe the minimum signal strength required by a device to successfully receive wireless communication?

  • A . Supported channels
  • B . Channel widths
  • C . Transmit power
  • D . Receive sensitivity

Reveal Solution Hide Solution

Correct Answer: D
Question #23

What are the basic steps involved in the WLAN connection process for 802.11 wireless networks?

  • A . Authentication, Association, 802.1X/EAP authentication
  • B . Passive scanning, Active scanning, 4-way handshake
  • C . Authentication, Association, 4-way handshake
  • D . Passive scanning, Active scanning, 802.1X/EAP authentication

Reveal Solution Hide Solution

Correct Answer: C
Question #24

If the AP’s time is not automatically configured to match the rest of the network, what infrastructure service may be unreachable by the AP?

  • A . DNS
  • B . DHCP
  • C . NTP
  • D . FTP

Reveal Solution Hide Solution

Correct Answer: C
Question #25

What does output power control allow you to do in the configuration of an AP?

  • A . Increase or reduce the output power
  • B . Change the channel
  • C . Implement Dynamic Frequency Selection (DFS)
  • D . Increase or reduce the antenna gain

Reveal Solution Hide Solution

Correct Answer: D
Question #26

Which security measure is often mistakenly believed to provide network invisibility, but offers no actual security benefit?

  • A . WEP
  • B . Shared Key Authentication
  • C . Hidden SSIDs
  • D . MAC filtering

Reveal Solution Hide Solution

Correct Answer: C
Question #27

Which operating system is commonly used on Google’s Chromebook devices?

  • A . Windows
  • B . macOS
  • C . Chrome OS
  • D . Linux

Reveal Solution Hide Solution

Correct Answer: C
Question #28

When configuring a standalone AP with a web-based interface, what should be changed to protect the HTTP interface used to manage the AP?

  • A . Admin account password
  • B . WPA2 passphrase
  • C . SSID
  • D . WPA passphrase

Reveal Solution Hide Solution

Correct Answer: A
Question #29

What is the term used to describe the decrease in signal strength as an RF signal propagates through space?

  • A . Gain and loss
  • B . Reflection
  • C . Refraction
  • D . Free space path loss

Reveal Solution Hide Solution

Correct Answer: D
Question #30

What EAP method is supported on most operating systems without additional installation requirements?

  • A . EAP-GTC
  • B . EAP-FAST
  • C . EAP-TLS
  • D . LEAP

Reveal Solution Hide Solution

Correct Answer: B

Question #31

What is the term used to describe the interference caused when multiple devices compete for the same channel in RF communication?

  • A . Antenna cables and connectors
  • B . Co-Channel Interference (CCI)
  • C . Co-Channel Contention (CCC)
  • D . Antenna pattern charts

Reveal Solution Hide Solution

Correct Answer: C
Question #32

Which characteristic of an RF signal is related to the distance between successive peaks?

  • A . Frequency
  • B . Amplitude
  • C . Phase
  • D . Wavelength

Reveal Solution Hide Solution

Correct Answer: D
Question #33

What is the maximum channel width recommended in the 2.4 GHz frequency band for 802.11n devices?

  • A . 80 MHz
  • B . 20 MHz
  • C . 40 MHz
  • D . 10 MHz

Reveal Solution Hide Solution

Correct Answer: B
Question #34

Which of the following is not a commonly used EAP method in wireless networks?

  • A . EAP-TLS
  • B . EAP-PEAP
  • C . EAP-WPA3
  • D . EAP-LEAP

Reveal Solution Hide Solution

Correct Answer: D
Question #35

What 802.11 process must always occur before 802.11 association?

  • A . Time synchronization
  • B . Authentication
  • C . Confidentiality
  • D . Encryption

Reveal Solution Hide Solution

Correct Answer: B
Question #36

What antenna would be best for a long distance (more than 5 kilometers) bridge link?

  • A . Panel
  • B . Parabolic dish
  • C . Patch
  • D . Omnidirectional

Reveal Solution Hide Solution

Correct Answer: B
Question #37

What can occur when two copies of a signal wave arrive at the receiver at the same time, but 180 degrees out of phase which each other?

  • A . Signal nulling or cancellation
  • B . Bits may be added to the total count
  • C . Increased signal strength
  • D . Increased signal amplitude

Reveal Solution Hide Solution

Correct Answer: A
Question #38

What tool is provided in most operating systems and in many APs or WLAN routers that can verify proper IP operations?

  • A . IFCONFIG
  • B . PING
  • C . IWCONFIG
  • D . NETSH

Reveal Solution Hide Solution

Correct Answer: B
Question #39

What kind of antenna chart shows the radiation pattern of an antenna from the side view of that antenna?

  • A . Top-down
  • B . Azimuth
  • C . Horizontal
  • D . Elevation

Reveal Solution Hide Solution

Correct Answer: B
Question #40

You use 802.1X/EAP for all WLAN authentication in your network. You have several VoIP handsets that work well until they have to roam from one AP to another.

When they roam, calls are often dropped or call quality is significantly diminished.

What is the most likely cause of this problem?

  • A . Wrong passphrase entered on the VoIP handsets
  • B . Non-implemented roaming features on the APs
  • C . Wrong SSID used by the VoIP handsets
  • D . Wrong certificate installed on the VoIP handsets

Reveal Solution Hide Solution

Correct Answer: B

Question #41

You are receiving reports from several users that their clients connect with very low data rates. All reports are confined to a particular area in the facility and the users report that the problem does not occur with the same devices in other areas.

What is most likely problem in that area?

  • A . High SNR
  • B . Improper AP security configuration
  • C . Poor signal strength
  • D . Improper client security configuration

Reveal Solution Hide Solution

Correct Answer: C
Question #42

Some APs come with a captive portal available within the AP, controller or cloud interface. For what would this captive portal most likely be used?

  • A . Guest access
  • B . Employee access
  • C . Executive management access
  • D . Long-term contractor access

Reveal Solution Hide Solution

Correct Answer: A
Question #43

What best describes passive scanning used to locate WLANs?

  • A . Listening for beacon frames from the APs
  • B . Scanning in only on frequency band
  • C . Sending probe requests and listening for probe responses
  • D . Scanning on only one channel

Reveal Solution Hide Solution

Correct Answer: A
Question #44

An AP has two Ethernet ports on the back and another port that looks similar to an Ethernet port.

For most enterprise APs, how many of these ports can be used for Power over Ethernet (PoE)?

  • A . 1
  • B . 3
  • C . 0
  • D . 2

Reveal Solution Hide Solution

Correct Answer: A
Question #45

What is defined as the bending of an RF wave as it passes through a medium?

  • A . Reflection
  • B . Refraction
  • C . Absorption
  • D . Scattering

Reveal Solution Hide Solution

Correct Answer: B
Question #46

What is one possible cause of mobility problems in a wireless network if the fast roaming method used by the client is not supported by the access point?

  • A . Configuration errors
  • B . Improper network settings
  • C . Unsupported fast roaming methods
  • D . Non-implemented roaming features

Reveal Solution Hide Solution

Correct Answer: C
Question #47

How can a device report the strength of the RF signal it is receiving?

  • A . Wireless scanner tools
  • B . Client signal strength reports
  • C . RSSI vs. dBm
  • D . Output power vs. received signal strength

Reveal Solution Hide Solution

Correct Answer: B
Question #48

Which factor can negatively impact wireless signal strength and cause connectivity issues?

  • A . Configuration errors
  • B . Interference
  • C . Supplicant issues
  • D . Co-channel interference (CCI)

Reveal Solution Hide Solution

Correct Answer: B
Question #49

Which process in the WLAN connection sequence establishes the encryption keys between the client device and the access point?

  • A . Authentication
  • B . Association
  • C . 802.1X/EAP authentication
  • D . 4-way handshake

Reveal Solution Hide Solution

Correct Answer: D
Question #50

What is one possible cause of security problems in a wireless network if the EAP method used by the client is not supported by the access point?

  • A . Configuration errors
  • B . Incorrect passphrases
  • C . Incompatible EAP methods
  • D . Incorrect network keys

Reveal Solution Hide Solution

Correct Answer: C
Exit mobile version