Free CWNP PW0-100 Exam Braindumps (page: 9)

Under the 802.11 standard, what modulation is used when transmitting data using FHSS?

  1. CCK
  2. GFSK
  3. BPSK
  4. QPSK

Answer(s): B

Explanation:

(DQPSK), and Gaussian Frequency Shift Keying (GFSK) are the types of modulation used by 802.11 and 802.11b products on the market today.Bluetooth and HomeRF are both FHSS technologies that use GFSK modulation technology in the 2.4 GHz ISM band.
Differential Quadrature Phase Shift Keying



Which of the following features are found in wireless Residential Gateways? (Choose all that apply)

  1. DHCP client
  2. 802.1q
  3. Spanning Tree Protocol (STP)
  4. Network Address Translation (NAT)
  5. PPPoE
  6. 802.1x
  7. 802.11c

Answer(s): A,D,E

Explanation:

Residential wireless gateways are now available with VPN technology, as well as NAT, DHCP, PPPoE, WEP, MAC filters, and perhaps even a built-in firewall.These devices are sufficient for small office or home office environments with few workstations and a shared connection to the Internet. Costs of these units vary greatly depending on their range of offered services. Some of the high-end units even boast static routing and RIPv2.



Which of these WLAN devices cause loss in the RF signal path? (Choose all that apply)

  1. Cable
  2. Connector
  3. Amplifier
  4. Attenuator
  5. Inducer
  6. Inductor

Answer(s): A,B,D

Explanation:

An RF attenuator is a device that causes precisely measured loss (in -dB) in an RF signal.
While an amplifier will increase the RF signal, an attenuator will decrease it.



Beacon frames are used for? (Choose two)

  1. Time synchronization.
  2. Passing channel selection information.
  3. Limiting data requests.
  4. Reserving the medium for QoS implementations.

Answer(s): A,B

Explanation:

According to the book, the beacon frames are used for time synchroniztion and channel information (for DSSS and FHSS).



Which one of the following is necessary as part of an RF Site Survey Report?

  1. Detailed RF coverage area map.
  2. Time sheet itemizing length of time to accomplish survey.
  3. Recommended implementation solution including at least two manufacturer's gear.
  4. Recommended wireless security solutions.

Answer(s): A

Explanation:

An RF site survey is a map to successfully implementing a wireless network. Site surveying involves analyzing a site from an RF perspective and discovering what kind of RF coverage a site needs in order to meet the business goals of the customer. During the site survey process, the surveyor will ask many questions about a variety of topics, which are covered in this chapter. These questions allow the surveyor to gather as much information as possible to make an informed recommendation about what the best options are for hardware, installation, and configuration of a wireless LAN. A site survey is an attempt to define the contours of RF coverage from an RF source (an access point or bridge) in a particular facility. Many issues can arise that prevent the RF signal from reaching certain parts of the facility. For example, if an access point were placed in the center of a medium-sized room, it would be assumed that there would be RF coverage throughout the room. This is not necessarily true due to phenomena such as multipath, near/far, and hidden node. There may be "holes" in the RF coverage pattern due to multipath or stations that cannot talk to the network due to near/far.



Which units of measure below are measurements of relative power (a change in power)? (Choose all that apply)

  1. dBm
  2. dBi
  3. dB
  4. mW

Answer(s): B,C

Explanation:

The units of relative power are db and dbi.



What does the acronym "Wi-Fi" stand for?

  1. Wireless Fiber.
  2. Wireless Interoperability Forum Institution.
  3. Wireless Frequency Industry.
  4. Wireless Fidelity.

Answer(s): D

Explanation:

The Wireless Ethernet Compatibility Alliance (WECA) provides testing of 802.11b compliant DSSS wireless LAN equipment to ensure that such equipment will operate in the presence of and interoperate with other 802.11b DSSS devices. The interoperability standard that WECA created and now uses is called Wireless Fidelity, or Wi-Fi, and those devices that pass the tests for interoperability are "Wi-Fi compliant" devices



By default, IEEE 802.11 devices are set to which type of WEP authentication?

  1. Shared Key Authentication.
  2. Open System Authentication.
  3. No Authentication.
  4. IEEE 802.11 does not specify use of WEP.

Answer(s): B

Explanation:

The IEEE 802.11 standard specifies two methods of authentication: Open System
authenticationand Shared Key authentication. The simpler and also the more secure of the two methods is Open System authentication.



Viewing page 9 of 77
Viewing questions 65 - 72 out of 477 questions



Post your Comments and Discuss CWNP PW0-100 exam prep with other Community members:

PW0-100 Exam Discussions & Posts