CWNA Sample Test Questions

From Practice Tests Info
Jump to navigation Jump to search

Home | CWNA Exam Notes | CWNA Practice Test Providers | CWNA Sample Test Questions | CWNA FAQ

CWNA Home

CWNA Sample MCQs with Answers and Explanations:

1. Which statement is MOST TRUE regarding 802.11a and 802.11g standards?

a) They both operate in the 2.4 GHz frequency band. b) They both offer similar data rates and range. c) 802.11a uses 5 GHz band and offers higher data rates than 802.11g. d) 802.11g offers better compatibility with older devices than 802.11a.

Explanation: (c) is correct. 802.11a operates in the 5 GHz band with higher data rates compared to 802.11g which uses the 2.4 GHz band. Although less susceptible to interference, 802.11a had limited device compatibility initially, while 802.11g offered better backward compatibility with older devices using the same band.

2. What is the primary function of a WLAN access point (AP)?

a) To connect directly to the internet b) To provide wireless network access to clients c) To route data between wired and wireless networks d) To manage security authentication for wireless connections

Explanation: (b) is correct. The primary function of an AP is to act as a central hub, providing wireless connectivity to devices within its range and facilitating communication between wireless clients and the wired network.

3. What type of encryption offers the STRONGEST security for WLAN connections?

a) WEP (Wired Equivalent Privacy) b) WPA (Wi-Fi Protected Access) c) WPA2 (Wi-Fi Protected Access II) d) WPA3 (Wi-Fi Protected Access 3)

Explanation: (d) is correct. WPA3, the latest Wi-Fi security standard, offers improved security features compared to its predecessors, including stronger encryption algorithms, enhanced authentication protocols, and protection against brute-force attacks.

4. What is the purpose of performing a site survey when deploying a WLAN network?

a) To assign IP addresses to wireless clients b) To identify optimal placement of access points c) To configure security settings for the network d) To troubleshoot connectivity issues on client devices

Explanation: (b) is correct. A site survey helps assess factors like signal strength, coverage area, interference, and channel overlap to determine the optimal placement of access points for efficient network performance.

5. What type of antenna typically offers the WIDEST coverage area for a WLAN access point?

a) Omni-directional antenna b) Directional antenna c) Patch antenna d) Yagi antenna

Explanation: (a) is correct. Omni-directional antennas radiate signals in all directions, providing wider coverage compared to directional antennas that focus signals in a specific direction. However, omni-directional antennas might have lower signal strength at a distance.

6. What is the role of DHCP (Dynamic Host Configuration Protocol) in a WLAN network?

a) To secure wireless connections from unauthorized access b) To assign IP addresses and other network configuration settings to clients c) To route data packets between different network segments d) To manage and monitor wireless access point functionality

Explanation: (b) is correct. DHCP automatically assigns IP addresses, subnet masks, and other configuration details to devices connecting to the network, simplifying network management and avoiding manual configuration for each device.

7. Which factor MOST significantly affects the data transfer rate in a WLAN network?

a) The type of encryption used b) The distance between the client and access point c) The number of connected devices d) The bandwidth of the internet connection

Explanation: (b) is correct. The distance between the client and access point significantly impacts the signal strength and, consequently, the data transfer rate. As the distance increases, the signal weakens, leading to slower data speeds.

8. What is the main purpose of using VLANs (Virtual Local Area Networks) in a WLAN environment?

a) To increase the overall network coverage area b) To improve signal strength for individual devices c) To segment the network and improve security and efficiency d) To prioritize traffic for specific applications

Explanation: (c) is correct. VLANs logically segment a single physical network into multiple virtual networks, separating traffic based on department, device type, or other criteria. This enhances security, traffic management, and performance by limiting broadcast domains and potential security risks.

9.. What is the purpose of the Service Set Identifier (SSID) in a WLAN network?

a) To identify the manufacturer of the wireless access point b) To provide unique MAC addresses for connected devices c) To broadcast the network name and allow devices to join d) To encrypt data transmitted over the wireless network

Explanation: (c) is correct. The SSID is the network name broadcasted by the access point, allowing devices to identify and connect to the desired network.

10. What is the difference between open and closed authentication in WLAN networks?

a) Open authentication requires no password, while closed requires a pre-shared key. b) Open authentication offers stronger security than closed authentication. c) Closed authentication allows more devices to connect to the network. d) Open authentication is faster than closed authentication.

Explanation: (a) is correct. Open authentication allows any device to connect without requiring a password, while closed authentication requires a pre-shared key (PSK) or other credentials for access.

11. What is the function of the Beacon frame in a WLAN network?

a) To transmit data packets between devices b) To announce the presence of an access point and its capabilities c) To authenticate devices attempting to connect to the network d) To encrypt data traffic for secure communication

Explanation: (b) is correct. The Beacon frame is a periodic signal broadcasted by the access point containing information about the network SSID, supported data rates, security settings, and other details, allowing devices to discover and connect to the network.

12. What is the role of the MAC address in a WLAN network?

a) To identify the network name (SSID) of the connected device b) To provide a unique identifier for each device on the network c) To store the password (PSK) for network authentication d) To determine the data transfer rate for each device

Explanation: (b) is correct. The MAC address is a unique identifier assigned to each network interface card (NIC) and used to distinguish individual devices on the network for communication and addressing purposes.

13.. What is the maximum transmission unit (MTU) size typically used in WLAN networks?

a) 1500 bytes b) 2048 bytes c) 4096 bytes d) 8192 bytes

Explanation: (b) is correct. The standard MTU size for Ethernet networks, including WLANs, is 1500 bytes. However, some devices may support larger MTU sizes like 2048 bytes, but it requires configuration compatibility on both the sending and receiving devices.

14. What is the difference between channel bonding and channel aggregation in WLAN networks?

a) Channel bonding combines multiple non-overlapping channels for more bandwidth. b) Channel aggregation combines multiple overlapping channels for increased coverage. c) Channel bonding requires advanced access points, while channel aggregation is standard. d) Channel bonding improves performance, while channel aggregation enhances security.

Explanation: (a) is correct. Channel bonding uses multiple non-overlapping channels to increase the total available bandwidth for data transmission, improving network performance. Channel aggregation, on the other hand, combines overlapping channels, potentially increasing coverage but introducing interference and reducing overall performance.

15.. What is the primary purpose of using rogue access point (AP) detection in a WLAN network?

a) To improve signal strength for authorized devices b) To identify and disable unauthorized access points c) To optimize channel utilization for better performance d) To enforce specific security protocols on the network

Explanation: (b) is correct. Rogue AP detection helps identify and potentially disable unauthorized access points operating within the network, mitigating security risks and preventing unauthorized access to the network resources.

16. What is the difference between DFS (Dynamic Frequency Selection) and TPC (Transmit Power Control) in WLAN networks?

a) DFS dynamically changes channels to avoid interference, while TPC adjusts signal strength. b) TPC is used in 2.4 GHz bands, while DFS is used in 5 GHz bands. c) Both DFS and TPC are security features to prevent unauthorized access. d) Both DFS and TPC improve network performance but have different functionalities.

Explanation: (a) is correct. DFS allows access points to dynamically switch channels to avoid interference from other devices like radars operating in the same frequency band. TPC, on the other hand, adjusts the transmission power of the access point signal to optimize coverage and minimize interference.