Free CWNP PW0-100 Exam Braindumps (page: 4)

Identify which of the following are appropriate uses of an IEEE 802.11 wireless LAN.
(Choose all that apply)

  1. Mobile access into the company network from a PD
  2. "Core" role in an enterprise network.
  3. Building-to-building bridging as a MAN solution.
  4. Delivering data from applications that require full-duplex communications between nodes.

Answer(s): A,C

Explanation:

A: The most common component on any wireless network is the PCMCIA card. More commonly known as "PC cards", these devices are used in notebook (laptop) computers and PDAs.
C: In addition to wireless LANs (WLANs), wireless personal area networks (WPANs), wireless metropolitan area networks (WMANs), and wireless wide area networks (WWANs) are also taking advantage of spread spectrum technologies. WPANs use Bluetooth technology to take advantage of very low power requirements to allow wireless networking within a very short range. WWANs and WMANs can use highly directional, high gain antennas to establish long-distance, high-speed RF links with relatively low power.



The anomaly that occurs when RF signals propagate from a transmitter bounce off objects and then cause problems at the receiver is known as:

  1. Fresnel Zoning
  2. Multipath
  3. Microwave interference
  4. Diffraction

Answer(s): B

Explanation:



Which two functions can be configured on a WLAN client computer as part of the WLAN client utility software? (Choose two)

  1. RADIUS username and password.
  2. Connection speed.
  3. Continuous Aware Mode.
  4. Spanning Tree Protocol.
  5. Bit ordering

Answer(s): B,C

Explanation:

B: Link status monitor utilities allow the user to view packet errors, successful transmissions, connection speed, link viability, and many other valuable parameters. There is usually a utility for doing real-time link connectivity tests so that, for example, an administrator would be able to see how stable a wireless link is while in the presence of heavy RF interference or signal blockage.
C: Wireless clients operate in one of two power management modes specified by the IEEE 802.11 standard. These power management modes are active mode, which is commonly called continuous aware mode (CAM) and power save, which is commonly called power save polling (PSP) mode



Part of the roaming process involves? (Choose all that apply)

  1. Implementing Mobile IP
  2. Active Beacons.
  3. Active Scanning.
  4. Passive Scanning.

Answer(s): A,C,D

Explanation:

A: The layer 2 connection is still maintained by the access points, but since the IP subnet has changed while roaming, the connection to servers, for example, will be broken. Without subnet-roaming capability (such as with using a Mobile IP solution or using DHCP), wireless LAN access points must all be connected to a single subnet (a.k.a. "a flat network"). This work-around can be done at a loss of network management flexibility, but customers may be willing to incur this cost if they perceive that the value of the end system is high enough.
C D: The 802.11 standard does not define how roaming should be performed, but does define the basic building blocks. These building blocks include active & passive scanning and a reassociation process. The reassociation process occurs when a wireless station roams from one access point to another, becoming associated with the new access point. The 802.11 standard allows a client to roam among multiple access points operating on the same or separate channels. For example, every 100 ms, an access point might transmit a beacon signal that includes a time stamp for client synchronization, a traffic indication map, an indication of supported data rates, and other parameters. Roaming clients use the beacon to gauge the strength of their existing connection to the access point. If the connection is weak, the roaming station can attempt to associate itself with a new access point.



The maximum aggregate capacity for an 802.11 DSSS system in a co-located environment is?

  1. 2 Mbps
  2. 6 Mbps
  3. 22 Mbps
  4. 24 Mbps

Answer(s): B

Explanation:

This question is slightly confusing.However, if read closely, it states that the system is in a "co-located" environment. From our previous discussion, since DSSS systems support a maximum of 3 APs in a co-located environment and given that the 802.11 standard allows speeds upto 2 Mbps, therefore, that would make the answer 2(x3) = 6Mpbs. Therefore, the answer should be B.



After August 31, 2000, the FCC mandated that FHSS systems using fewer than 75 hops must have a maximum power output of?

  1. 100mW
  2. 125mW
  3. 500MW
  4. 1W

Answer(s): B

Explanation:

- a part of the 802.15 standard for WPANs (Wireless Personal Area Networks). Bluetooth is a close-range networking protocol primarily used for mobile devices, utilizing FHSS in the 2.4 GHz ISM band at around 1600 hops/second. Because of the high hop rate, Bluetooth devices will greatly interfere with other devices operating in the 2.4 GHz band.



Which of the following us TRUE when using Bluetooth in an 802.11b environment?

  1. Interference can be avoided by selecting different DSSS sub-channels
  2. Interference can be avoided by allowing Bluetooth to use a proprietary hopping pattern.
  3. Interference increases as distance between the two systems decreases.
  4. Bluetooth does not interfere with DSSS.

Answer(s): C

Explanation:

Less than 75 hops enforces the Post August 31, 2000 rule for FHSS systems in which max. power is 125 mW and max. carrier frequency is 5 Mhz (See page 73 of the CWNA study Guide (2nd edition))



Before going into a low-power state (sleep), what function must a wireless station operating in a BSS perform?

  1. Notify the access point of its intention to sleep.
  2. Notify other wireless stations of its intention to sleep.
  3. Broadcast an ATIM on the network.
  4. Send an RTS to the access point.

Answer(s): A

Explanation:

Traffic Indication Map (TIM) - transmitted by the access point to indicate to sleeping stations the presence of buffered transmissions for a particular station Traffic Indication Map (TIM)
The TIM is used an as indicator of which sleeping stations have packets queued at the access point. This information is passed in each beacon to all associated stations. While sleeping, synchronized stations power up their receivers, listen for the beacon, check the TIM to see if they are listed, then, if they are not listed, they power down their receivers and continue sleeping.



Viewing page 4 of 77
Viewing questions 25 - 32 out of 477 questions



Post your Comments and Discuss CWNP PW0-100 exam prep with other Community members:

PW0-100 Exam Discussions & Posts