CWNP PW0-100 Exam Questions
PW0-100 Wireless LAN Administration, Certified Wireless Network Administrator (CWNA) (Page 16 )

Updated On: 21-Feb-2026

RTS/CTS is an extension to the implementation of which of the following?

  1. CSMA/CD
  2. CSMA/CA
  3. PCF
  4. SIFS

Answer(s): B

Explanation:

Request-to-Send/Clear-to-Send (RTS/CTS) - an extension to CSMA/CA, in which
clients enter into a 4-way handshake with an access point to send data. (1) Client sends RTS packet to request use of the medium, (2) if the medium is free, access point sends the CTS packet to the client, (3) client sends the DATA to the receiving client, (4) receiving client sends the ACK packet to acknowledge receipt of the DATA. 4-way
handshake = RTS-CTS-DATA-ACK



The WEP protocol is intended to support which of these security goals? (Choose all that apply)

  1. Confidentiality
  2. Controlled Access
  3. Longevity
  4. Data Integrity
  5. Impenetrable security
  6. Authentication by certificate
  7. Encryption tunneling

Answer(s): A,B,D



Ad Hoc mode cannot be used for which of the following? (Choose all that apply) A.
In an Extended Service Set.

  1. In an airport.
  2. In a Basic Service Set.
  3. In a hotel room.

Answer(s): A,C



How should the site survey engineer document the "dead spots" in the area to be covered by a WLAN?

  1. Showing the network administrator the spots in person.
  2. Marking the spots with markers or flags.
  3. Dead spots are not recorded in a site survey.
  4. Marking the locations of dead spots on a site blueprint or floor plan.

Answer(s): D



What are two methods specified by IEEE 802.11 to authenticate a user in a wireless LAN? (Choose two)

  1. Shared secrets
  2. Certificates
  3. Usernames
  4. Passwords

Answer(s): A,B

Explanation:

Use of PPTP with shared secrets is very simple to implement and provides a reasonable
level of security, especially when added to WEP encryption. Use of IPsec with shared secretsor certificates is generally the solution of choice among security professionals in this arena. When the VPN server is implemented in an enterprise gateway, the same process takes place except that, after the client associates to the access point, the VPN tunnel is established with the upstream gateway device instead of with the access point itself.






Post your Comments and Discuss CWNP PW0-100 exam dumps with other Community members:

Join the PW0-100 Discussion