Free CWNP PW0-100 Exam Braindumps (page: 11)

Ad Hoc mode cannot be used for which of the following? (Choose all that apply) A.
In an Extended Service Set.

  1. In an airport.
  2. In a Basic Service Set.
  3. In a hotel room.

Answer(s): A,C



How should the site survey engineer document the "dead spots" in the area to be covered by a WLAN?

  1. Showing the network administrator the spots in person.
  2. Marking the spots with markers or flags.
  3. Dead spots are not recorded in a site survey.
  4. Marking the locations of dead spots on a site blueprint or floor plan.

Answer(s): D



What are two methods specified by IEEE 802.11 to authenticate a user in a wireless LAN? (Choose two)

  1. Shared secrets
  2. Certificates
  3. Usernames
  4. Passwords

Answer(s): A,B

Explanation:

Use of PPTP with shared secrets is very simple to implement and provides a reasonable
level of security, especially when added to WEP encryption. Use of IPsec with shared secretsor certificates is generally the solution of choice among security professionals in this arena. When the VPN server is implemented in an enterprise gateway, the same process takes place except that, after the client associates to the access point, the VPN tunnel is established with the upstream gateway device instead of with the access point itself.



Choose the term that means "an amplitude reduction in the signal"

  1. Offset
  2. Amplification
  3. Attenuation
  4. Limiting

Answer(s): C

Explanation:

attenuation - a term used to describe decreasing the amplitude of an RF signal due to resistance of cables, connectors, splitters, or obstacles encountering the signal path



Which of the following are mechanisms defines by 802.11b for providing access control and privacy on a wireless LAN? (Choose two)

  1. RADIUS
  2. WEP
  3. AES
  4. SSID

Answer(s): B,D

Explanation:

REF FOR B //
Open System authentication is a very simple process. As the wireless LAN administrator, you have the option of using WEP (wired equivalent privacy) encryption with Open System authentication. If WEP is used with the Open System authentication process, there is still no verification of the WEP key on each side of the connection during authentication. Rather, the WEP key is used only for encrypting data once the client is authenticated and associated.
REF FOR D//: The service set identifier (SSID) is a unique, case sensitive, alphanumeric value from 2-32 characters long used by wireless LANs as a network name. This naming handle is used for segmenting networks, as a rudimentary security measure, and in the process of joining a network. The SSID value is sent in beacons, probe requests, probe responses, and other types of frames. A client station must be configured for the correct SSID in order to join a network. The administrator configures the SSID (sometimes called the ESSID) in each access point.Some stations have the ability to use any SSID value instead of only one manually specified by the administrator. If clients are to roam seamlessly among a group of access points, the clients and all access points must be configured with matching SSIDs. The most important point about an SSID is that it must match EXACTLY between access points and clients.



Which item(s) would NOT be beneficial for a network manager to provide to an engineer doing an indoor site survey?

  1. Blueprints of the facility.
  2. Available lifts for mounting access points.
  3. Access to network backbone routers.
  4. A list of RF systems already in use in the facility.
  5. Diagram of available AC power.
  6. Previous site survey reports.

Answer(s): B



Prior to August 31, 2000, the FCC required the use of how many channels with a 2.4 GHz FHSS system before repeating the pattern?

  1. 70
  2. 75
  3. 79
  4. 83

Answer(s): B

Explanation:

No overlapping frequencies are allowed under either rule. If the minimum 75 MHz of used bandwidth within the frequency spectrum were cut into pieces as wide as the carrier frequency bandwidth in use, they would have to sit side-by-side throughout the spectrum with no overlap. This regulation translates into 75 non-overlapping carrier frequencies under the pre- 8/31/00 rules and 15-74 non-overlapping carrier frequencies under the post- 8/31/00 rules.
The IEEE states in the 802.11 standard that FHSS systems will have at least 6 MHz of carrier frequency separation between hops. Therefore, a FHSS system transmitting on 2.410 GHz must hop to at least 2.404 if decreasing in frequency or 2.416 if increasing in frequency. This requirement was left unchanged by the IEEE after the FCC change on 8/31/00.



After August 31, 2000, the FCC allowed a maximum channel
bandwidth for FHSS of?

  1. 1 MHz
  2. 2 MHz
  3. 5 MHz
  4. 11 MHz

Answer(s): C

Explanation:

Certified Wireless Network Administrator Study Guide, page 54



Viewing page 11 of 77
Viewing questions 81 - 88 out of 477 questions



Post your Comments and Discuss CWNP PW0-100 exam prep with other Community members:

PW0-100 Exam Discussions & Posts