Free CWNP PW0-100 Exam Braindumps (page: 6)

WEP keys are also known by what more generic name?

  1. Certificates
  2. Secure Tokens
  3. Shared Secrets
  4. SecureIDs

Answer(s): C

Explanation:

Shared secrets are strings of numbers or text that are commonly referred to as the WEP key. Certificates are another method of user identification used with wireless networks. Just as with WEP keys, certificates (which are authentication documents) are placed on



When considering erecting an outside antenna for use with a 2.4 GHz wireless LAN, which things are considered as you perform the site survey? (Choose two)

  1. Is the weather in this area volatile?
  2. Are there any FM radio stations nearby?
  3. Are telephone lines located in this area?
  4. Is there a possibility of future obstructions?

Answer(s): A,D



Insertion loss on wireless LAN splitters is measured in?

  1. db
  2. dBi
  3. dBm
  4. milliwatts

Answer(s): A

Explanation:

The insertion loss should be significantly low (perhaps around 0.1 dB) so as not to cause high RF signal amplitude loss as the signal passes through the arrestor. Low insertion loss (loss incurred by just introducing the item into the circuit) is necessary because simply putting the splitter in the RF circuit can cause a significant RF signal amplitude decrease. Insertion loss of 0.5 dB or less is considered good for an RF splitter.



The FCC determines which of the following in the United States? (Choose all that apply)

  1. RF Output power limits.
  2. Appropriate RF Frequency band use.
  3. IEEE standards.
  4. Licensing of frequency bands.
  5. Interoperability of license-free RF products
  6. Licensing fee for end-user use of ISM bands

Answer(s): A,B,D



Which weather conditions can cause damage to an outdoor spread spectrum wireless LAN? (Choose all that apply)

  1. Lightning
  2. Wind
  3. Rain
  4. Snow

Answer(s): A,B

Explanation:

Severely adverse weather conditions can affect the performance of a wireless LAN. In general, common weather occurrences like rain, hail, snow, or fog do not have an adverse affect on wireless LANs. However, extreme occurrences of wind, fog, and perhaps smog can cause degradation or even downtime of your wireless LAN. A radomecan be used to protect an antenna from the elements.
Wind
Wind does not affect radio waves or an RF signal, but it can affect the positioning of outdoor antennas. For example, consider a wireless point-to-point link that connects two buildings that are 12 miles apart. Taking into account the curvature of the Earth (Earth bulge), and having only a five-degree vertical and horizontal beam width on each antenna, the positioning of each antenna would have to be exact. A strong wind could Lightning can affect wireless LANs in two ways. First, lightning can strike either a wireless LAN component such as an antenna or it may strike a nearby object. Lightning strikes of nearby objects can damage your wireless LAN components as if these components are not protected by a lightning arrestor. A second way that lightning affects wireless LANs is by charging the air through which the RF waves must travel after striking an object lying between the transmitter and receiver. twoantennas. This effect is called "antenna wind loading",



Which of these are known methods of attacking a wireless LAN? (Choose two)

  1. Broadcast Monitoring.
  2. Rouge Access Points.
  3. Passive Probes.
  4. Excessive use of RTS/CTS protocol.

Answer(s): B,C

Explanation:

- method by which stations broadcast a probe frame, and all access points within range respond with a probe response frame; Similar to passive scanning, the station will keep track of the probe responses and make a decision on which access point to authenticate and associate with based on the probe responses having the strongest signal level



If two DSS access points are placed on the same channel in the same physical space, which of the following will take place?

  1. The available bandwidth to users will increase.
  2. The available bandwidth to users will decrease.
  3. The access points will interfere with each other.
  4. Users will be able to roam between the two access points.

Answer(s): C

Explanation:

One option, which is the easiest, is to use channels 1 and 11 with only 2 access points, as illustrated in Figure 9.11. Using only these two channels will ensure that you have no overlap between channels regardless of proximity between systems, and therefore, no detrimental effect on the throughput of each access point. By way of comparison, two access points operating at the maximum capacity of 5.5 Mbps (about the best that you can expect by any access point), give you a total capacity of 11 Mbps of aggregate throughput, whereas three access points operating at approximately 4 Mbps each (degraded from the maximum due to actual channel overlap) on average yields only 12 Mbps of aggregate throughput. For an additional 1 Mbps of throughput, an administrator would have to spend the extra money to buy another access point, the time and labor to install it, and the continued burden of managing it.



Where can MAC filters be implemented on a wireless LAN? (Choose all that apply) A.
Access Points

  1. WLAN USB client
  2. RADIUS servers
  3. WLAN SNMP agent
  4. Personal firewall software

Answer(s): A,C

Explanation:

A//
Wireless LANs can filter based on the MAC addresses of client stations. Almost all access points (even very inexpensive ones) have MAC filter functionality. The network administratorcan compile, distribute, and maintain a list of allowable MAC addresses andprogram them into each access point.If a PC card or other client with a MAC address that is not in the access point's MAC filter list tries to gain access to the wireless LAN, the MAC address filter functionality will not allow that client to associate with that access point.
Ref for C//Of course, programming every wireless client's MAC address into every access point across a large enterprise network would be impractical. MAC filters can be implemented onsome RADIUS servers instead of in each access point. This configuration makes MAC filters a much more scalable security solution. Simply entering each MAC address into RADIUS along with user identity information, which would have to be input anyway, is a good solution. RADIUS servers often point to another authentication source, so that other authentication source would need to support MAC filters.



Viewing page 6 of 77
Viewing questions 41 - 48 out of 477 questions



Post your Comments and Discuss CWNP PW0-100 exam prep with other Community members:

PW0-100 Exam Discussions & Posts