Package deal
CWNA BUNDLED EXAMS 2023 WITH 100% CORRECT ANSWERS
CWNA EXAM 2023 WITH 100% CORRECT ANSWERS CWNA Chapter 1 EXAM 2023 WITH 100% CORRECT ANSWERS
[Show more]CWNA EXAM 2023 WITH 100% CORRECT ANSWERS CWNA Chapter 1 EXAM 2023 WITH 100% CORRECT ANSWERS
[Show more]Which organization is responsible for enforcing maximum transmit power rules in an unlicensed frequency band? correct answersNone 
 
Q. 2 WLAN vendors use RSSI thresholds to trigger which radio card behaviors? (Choose all that apply.) 
 
A. Receive sensitivity 
 
B. Roaming 
 
C. Retransmissions 
 
...
Preview 2 out of 10 pages
Add to cartWhich organization is responsible for enforcing maximum transmit power rules in an unlicensed frequency band? correct answersNone 
 
Q. 2 WLAN vendors use RSSI thresholds to trigger which radio card behaviors? (Choose all that apply.) 
 
A. Receive sensitivity 
 
B. Roaming 
 
C. Retransmissions 
 
...
Fourth Generation correct answers4G. A cellular wireless data network with download speeds of 4Mbps 
 
backhaul connection correct answersAn organization's internal infrastructure connection between two or more remote locations 
 
Bluetooth correct answersA WPAN Technology that uses short range tra...
Preview 2 out of 11 pages
Add to cartFourth Generation correct answers4G. A cellular wireless data network with download speeds of 4Mbps 
 
backhaul connection correct answersAn organization's internal infrastructure connection between two or more remote locations 
 
Bluetooth correct answersA WPAN Technology that uses short range tra...
802.11b is backward compatible with 802.11a correct answersFalse 
 
802.11n supports which frequency bands? correct answers2.4 GHz and 5.0 GHz 
 
Which statement best describes the 802.11i standard? correct answersIt is the current standard for wireless security in 802.11 a/b/g/n networks. It define...
Preview 2 out of 9 pages
Add to cart802.11b is backward compatible with 802.11a correct answersFalse 
 
802.11n supports which frequency bands? correct answers2.4 GHz and 5.0 GHz 
 
Which statement best describes the 802.11i standard? correct answersIt is the current standard for wireless security in 802.11 a/b/g/n networks. It define...
802.11 tech is typically deployed at which network layer? 
Core, Distribution, Access, Network correct answersAccess 
 
Which org is responsible for enforcing max TxPwr rules in an unlicensed freq band? 
IEEE, Wi-Fi Alliance, ISO, IETF, None correct answersNone 
 
802.11 wireless bridge links are us...
Preview 2 out of 5 pages
Add to cart802.11 tech is typically deployed at which network layer? 
Core, Distribution, Access, Network correct answersAccess 
 
Which org is responsible for enforcing max TxPwr rules in an unlicensed freq band? 
IEEE, Wi-Fi Alliance, ISO, IETF, None correct answersNone 
 
802.11 wireless bridge links are us...
A slow last mile connection constitutes a ____ because high-speed traffic must be throttled back to the slower last-mile connection speed. correct answersbottleneck 
 
WLAN speeds typically range up to which of the following? correct answers600 Mbps 
 
What aspect of RF may produce biological damage...
Preview 2 out of 6 pages
Add to cartA slow last mile connection constitutes a ____ because high-speed traffic must be throttled back to the slower last-mile connection speed. correct answersbottleneck 
 
WLAN speeds typically range up to which of the following? correct answers600 Mbps 
 
What aspect of RF may produce biological damage...
6 dB rule correct answersDoubling the distance between a transmitter and receiver will decrease the received signal by 6 dB. Halving the distance between a transmitter and receiver will increase the received signal by 6 dB 
 
fade margin correct answersA level of desired signal above what is require...
Preview 4 out of 33 pages
Add to cart6 dB rule correct answersDoubling the distance between a transmitter and receiver will decrease the received signal by 6 dB. Halving the distance between a transmitter and receiver will increase the received signal by 6 dB 
 
fade margin correct answersA level of desired signal above what is require...
Q. what word describes the bending of an RF signal as it passes through a medium of a varying density from that of free space correct answersRefraction 
 
Q. What can cause an excessively high VSWR (voltage standing wave ratio)in a WLAN RF transmission line? correct answersAn impedance mismatch in t...
Preview 3 out of 20 pages
Add to cartQ. what word describes the bending of an RF signal as it passes through a medium of a varying density from that of free space correct answersRefraction 
 
Q. What can cause an excessively high VSWR (voltage standing wave ratio)in a WLAN RF transmission line? correct answersAn impedance mismatch in t...
What statement about the beamwidth of an RF antenna is true? 
 
A. The horizontal and vertical beamwidth are measured where the 
main lobe loses 6 dB of power. 
 
B. Beamwidth has no impact on the propagation pattern. 
 
C. Horizontal beamwidth is displayed on the Elevation chart. 
 
D. As the gain ...
Preview 4 out of 44 pages
Add to cartWhat statement about the beamwidth of an RF antenna is true? 
 
A. The horizontal and vertical beamwidth are measured where the 
main lobe loses 6 dB of power. 
 
B. Beamwidth has no impact on the propagation pattern. 
 
C. Horizontal beamwidth is displayed on the Elevation chart. 
 
D. As the gain ...
802.11 technology is typically deployed at which fundamental layer of network 
architecture? 
 
A. Core 
B. Distribution 
C. Access 
D. Network correct answersC. Access 
 
Which organization is responsible for enforcing maximum transmit power rules in an 
unlicensed frequency band? 
 
A. IEEE 
B. Wi...
Preview 2 out of 7 pages
Add to cart802.11 technology is typically deployed at which fundamental layer of network 
architecture? 
 
A. Core 
B. Distribution 
C. Access 
D. Network correct answersC. Access 
 
Which organization is responsible for enforcing maximum transmit power rules in an 
unlicensed frequency band? 
 
A. IEEE 
B. Wi...
DSSS uses only DBPSK for modulation. correct answersFalse 
 
(DSSS uses DBPSK at 1 Mbps but uses DQPSK at 2 Mbps) 
 
Because of the relatively high speeds achieved with FHSS, it is widely implemented in WLAN systems. correct answersFalse 
 
How many adjacent non-overlapping channels may be used in t...
Preview 2 out of 5 pages
Add to cartDSSS uses only DBPSK for modulation. correct answersFalse 
 
(DSSS uses DBPSK at 1 Mbps but uses DQPSK at 2 Mbps) 
 
Because of the relatively high speeds achieved with FHSS, it is widely implemented in WLAN systems. correct answersFalse 
 
How many adjacent non-overlapping channels may be used in t...
Which one of the following organizations performs compatibility testing of 802.11 hardware? 
 
a. IETF 
b. Wi-Fi Alliance 
c. FCC 
d. MIC correct answersB is correct. The Wi-Fi Alliance performs compatibility testing against 802.11 wireless devices based on 802.11 standards or subsets of those s...
Preview 4 out of 36 pages
Add to cartWhich one of the following organizations performs compatibility testing of 802.11 hardware? 
 
a. IETF 
b. Wi-Fi Alliance 
c. FCC 
d. MIC correct answersB is correct. The Wi-Fi Alliance performs compatibility testing against 802.11 wireless devices based on 802.11 standards or subsets of those s...
What WLAN security mechanism requires that each WLAN user have unique authentication credentials? correct answers802.1X/EAP 
 
Which wireless security standards and certifications call for the use of CCMP/AES encryption? (Choose all that apply.) correct answers802.11-2007 
WPA2 
 
128-bit WEP encryp...
Preview 1 out of 3 pages
Add to cartWhat WLAN security mechanism requires that each WLAN user have unique authentication credentials? correct answers802.1X/EAP 
 
Which wireless security standards and certifications call for the use of CCMP/AES encryption? (Choose all that apply.) correct answers802.11-2007 
WPA2 
 
128-bit WEP encryp...
Which communication tool allows real-time collaboration? 
 
a. wiki 
b. e-mail 
c. weblog 
d. instant messaging correct answersinstant messaging 
 
A host is accessing a Web server on a remote network. Which three functions are performed by intermediary network devices during this conversation? (...
Preview 4 out of 53 pages
Add to cartWhich communication tool allows real-time collaboration? 
 
a. wiki 
b. e-mail 
c. weblog 
d. instant messaging correct answersinstant messaging 
 
A host is accessing a Web server on a remote network. Which three functions are performed by intermediary network devices during this conversation? (...
True statements about the operation of a full-duplex Ethernet network correct answersThere are no collisions in full-duplex mode. 
A dedicated switch port is required for each full-duplex node. 
The host network card and the switch port must be capable of operating in full-duplex mode. 
 
Which OSI ...
Preview 1 out of 3 pages
Add to cartTrue statements about the operation of a full-duplex Ethernet network correct answersThere are no collisions in full-duplex mode. 
A dedicated switch port is required for each full-duplex node. 
The host network card and the switch port must be capable of operating in full-duplex mode. 
 
Which OSI ...
Which communication tool allows real-time collaboration? correct answersinstant messaging 
 
A host is accessing a Web server on a remote network. Which three functions are performed by intermediary network devices during this conversation? (Choose three.) correct answersregenerating data signals 
 ...
Preview 2 out of 8 pages
Add to cartWhich communication tool allows real-time collaboration? correct answersinstant messaging 
 
A host is accessing a Web server on a remote network. Which three functions are performed by intermediary network devices during this conversation? (Choose three.) correct answersregenerating data signals 
 ...
What is the default subnet mask for an IP address of 64.100.19.14? correct answers255.0.0.0 
 
A network administrator has been notified that users have experienced problems gaining access to network resources. What utility could be used to directly query a name server for information on a destinati...
Preview 2 out of 5 pages
Add to cartWhat is the default subnet mask for an IP address of 64.100.19.14? correct answers255.0.0.0 
 
A network administrator has been notified that users have experienced problems gaining access to network resources. What utility could be used to directly query a name server for information on a destinati...
Which term refers to a network that provides secure access to the corporate office by suppliers, customers, and collaborators? correct answersExtranet 
 
A small business user is looking for an ISP connection that provides high speed digital transmission over regular phone lines. What ISP connection...
Preview 2 out of 8 pages
Add to cartWhich term refers to a network that provides secure access to the corporate office by suppliers, customers, and collaborators? correct answersExtranet 
 
A small business user is looking for an ISP connection that provides high speed digital transmission over regular phone lines. What ISP connection...
What is the IEEE of Bluetooth? correct answers802.15 WPAN 
 
What is WiMAX and it IEEE? correct answers-Worldwide Interoperability for Microwave Access 
-IEEE 802.16 WWAN 
 
In cellular broadband there are two types of cellular networks, what are they? correct answersGlobal System for Mobile (GSM) a...
Preview 4 out of 49 pages
Add to cartWhat is the IEEE of Bluetooth? correct answers802.15 WPAN 
 
What is WiMAX and it IEEE? correct answers-Worldwide Interoperability for Microwave Access 
-IEEE 802.16 WWAN 
 
In cellular broadband there are two types of cellular networks, what are they? correct answersGlobal System for Mobile (GSM) a...
Which of the following are the address ranges of the private IP addresses? (Choose three.) correct answers10.0.0.0 to 10.255.255.255 ; 
172.16.0.0 to 172.31.255.255; 
192.168.0.0 to 192.168.255.255 
 
Which two functions of the OSI model occur at layer two? (Choose two.) correct answersphysical addr...
Preview 2 out of 10 pages
Add to cartWhich of the following are the address ranges of the private IP addresses? (Choose three.) correct answers10.0.0.0 to 10.255.255.255 ; 
172.16.0.0 to 172.31.255.255; 
192.168.0.0 to 192.168.255.255 
 
Which two functions of the OSI model occur at layer two? (Choose two.) correct answersphysical addr...
What is a characteristic of a fault tolerant network? correct answersa network that recovers quickly when a failure occurs and depends on redundancy to limit the impact of a failure* 
 
Three bank employees are using the corporate network. The first employee uses a web browser to view a company web ...
Preview 2 out of 14 pages
Add to cartWhat is a characteristic of a fault tolerant network? correct answersa network that recovers quickly when a failure occurs and depends on redundancy to limit the impact of a failure* 
 
Three bank employees are using the corporate network. The first employee uses a web browser to view a company web ...
Match the situation with the appropriate use of network media. 
 
- backbone cabling in an enterprise, guest access in a coffee shop, horizontal cabling structure, waiting rooms in a hospital, desktop PCs in an enterprise office, long-haul networks 
 
- copper cables, fiber optic, wireless correct a...
Preview 3 out of 22 pages
Add to cartMatch the situation with the appropriate use of network media. 
 
- backbone cabling in an enterprise, guest access in a coffee shop, horizontal cabling structure, waiting rooms in a hospital, desktop PCs in an enterprise office, long-haul networks 
 
- copper cables, fiber optic, wireless correct a...
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Stuvia is a marketplace, so you are not buying this document from us, but from seller QUILLSKY. Stuvia facilitates payment to the seller.
No, you only buy these notes for $38.99. You're not tied to anything after your purchase.
4.6 stars on Google & Trustpilot (+1000 reviews)
72042 documents were sold in the last 30 days
Founded in 2010, the go-to place to buy study notes for 14 years now