Which communication methods may be used between access points? Select all that apply.
Answer(s): A,B
Root Mode is used when the access point is connected to a wired backbone through its wired (usually Ethernet) interface. Most access points that support modes other than root mode come configured in root mode by default.
CWNA Official Study Guide, Page 103A is correct as well. See CWNA Official Study Guide, 2nd Edition, Page 299
Which of the following items are sometimes used in an indoor site survey?
Answer(s): B
What is a cause of the "hidden node" problem?
Answer(s): A
Hidden node is a situation encountered with wireless LANs in which at least one node is unableto hear (detect) one or more of the other nodes connected to the wireless LAN. In thissituation, a node can see the access point, but cannot see that there are other clients alsoconnected to the same access point due to some obstacle or a large amount of distancebetween the nodes. This situation causes a problem in medium access sharing, causingcollisions between node transmissions.vm00760,I,il,I,li,il,l5
CWNA Official Study Guide, Page 136
Which common network protocols are supported in access points for configuration? Select all that apply.
HTTP if there is a built-in web server in the AP pg 231 in CWNA User Guide 3rd edition
Post your Comments and Discuss CWNP PW0-100 exam with other Community members:
willianzd@terra.com.br commented on October 16, 2014 Preciso do desconto para EW0-300, Cisco CCNA, Huawei HCNA. ITIL entre outros... UNITED STATES upvote
Ridhi commented on June 22, 2013 Myfeedback about HP0-064. EXCELLENT... I pass. Very Excellent GTA upvote
Taylor G commented on June 22, 2013 The good news is I passed the exam! Dijon upvote
Ridhi commented on April 20, 2009 Myfeedback about HP0-064. EXCELLENT... I pass. Very Excellent GTA upvote
Taylor G commented on April 18, 2009 The good news is I passed the exam! Dijon upvote
Our website is free, but we have to fight against bots and content theft. We're sorry for the inconvenience caused by these security measures. You can access the rest of the PW0-100 content, but please register or login to continue.