Free CWNP PW0-100 Exam Braindumps (page: 7)

Which of the following steps should be taken in the process creating a security solution for a
wireless LAN network? (Choose all that apply)

  1. Making backups of WEP keys in the event of a system failure.
  2. Implementing VPN tunneling protocols such as IPSec or PPTP where possible. C.
    Using four WEP keys in every access point.
  3. Implementing wireless LAN connectivity in a DMZ area.
  4. Place all wireless LAN users directly on the Internet segment of the network.

Answer(s): B,C,D

Explanation:

From the study guide, there are a number of measures that may be taken to secure a WLAN. Specifically, using multiple WEP keys (in-case of a compromise) and implementing VPN tunneling are both helpful in effectively securing a wireless LAN. Additionally, implementing the Wireless network in a DMZ area is much more worthwhile in a corporate environment for example. This effectively separates the un-trusted portion of the network from the core of the network with the help of a firewall. Therefore, the answer should be B, C, D.



A sequence of hops in a Frequency Hopping Spread Spectrum system is referred to as?

  1. Pattern
  2. List
  3. Channel
  4. Array

Answer(s): A

Explanation:

A frequency hopping system will operate using a specified hop pattern. See CWNA Official Study Guide, 3rd Edition, Page 181 (FHSS Hop Sequences and Channels)



A LOSS of -10dB yields a power ratio of?

  1. 1:3
  2. 1:10
  3. 2:1
  4. 10:1

Answer(s): B

Explanation:

Power gain and loss are measured in decibels, not in watts, because gain and loss are relative concepts and a decibel is a relative measurement. Gain or loss in an RF system may be referred to by absolute power measurement (e.g. ten watts of power) or by a relative power measurement (e.g. half of its power). Losing half of the power in a system corresponds to losing 3 decibels. If a system loses half of its power (-3 dB), then loses half again (another -3 dB), then the total system loss is 3/4 of the original power - 1/2 first, then 1/4 (1/2 of 1/2). Clearly, no absolute measurement of watts can quantify this asymmetrical loss in a meaningful way, but decibels do just that. As a quick and easy reference, there are some numbers related to gain and loss that an administrator should be familiar with. These numbers are:
-3 dB = half the power in mW
+3 dB = double the power in mW
-10 dB = one tenth the power in mW
We refer to these quick references as the 10's and 3's of RF math. When calculating power gain and loss, one can almost always divide an amount of gain or loss by 10 or 3 or both. These values give the administrator the ability to quickly and easily calculate RF loss and gain with a fair amount of accuracy without the use of a calculator.
If an access point were
connectedto a cable whose loss was -2 dB and then a connector whose loss was -1 dB, thenthese loss measurements would be additive and yield a total of -3 dB of loss. We willwalk through some RF calculations in the coming sections to give you a better idea ofhow to relate these numbers to actual scenarios.



All access points transmit what at a fixed interval?

  1. Association request management frame.
  2. Probe request management frame.
  3. Infrastructure beacon packet.
  4. Beacon management frame.

Answer(s): D

Explanation:

Beacons (short for beacon management frame) are short frames that are sent from the accesspoint to stations (infrastructure mode) or station-to-station (ad hoc mode) in order toorganize and synchronize wireless communication on the wireless LAN. Beacons serve several functions, including the following.
Beacons synchronize clients by way of a time-stamp at the exact moment of transmission. When the client receives the beacon, it changes its own clock to reflect the clock of the access point. Once this change is made, the two clocks are synchronized.



Seamless roaming is specified in what IEEE standard?

  1. 802.11
  2. 802.11b
  3. 802.11a
  4. All of the above.
  5. None of the above.

Answer(s): E

Explanation:

Seamless roaming is specified in the 802.11F standard.
In situations where seamless roaming is required, a technique called channel reuse is used inorderto alleviate adjacent and co-channel interference while allowing users to roam throughadjacent cells. Channel reuse is the side-by-side locating of non-overlapping cells to form a mesh of coverage where no cell on a given channel touches another cell on that channel
After a wireless LAN is installed, it might not work exactly as planned, although it may be close. Spot-checking by a site surveyor after installation is complete is most helpful in avoiding troubleshooting situations during production use of the network. Items that should be checked are:
? Coverage in perimeter areas
? Overlapping coverage for seamless roaming
? Co-channel and adjacent channel interference in all areas



Identify all true statements below.

  1. FHSS is inherently more secure than DSSS.
  2. FHSS uses frequently agility to enhance security.
  3. The FHSS hopset can be determined by listening to traffic on each of the hopping channels.
  4. Both FHSS and DSSS rely on user authentication and data encryption for security.

Answer(s): C

Explanation:

A frequency hopping system will operate using a specified hop pattern called a channel. Frequency hopping systems typically use the FCC's 26 standard hop patterns or a subset thereof. Some frequency hopping systems will allow custom hop patterns to be created, and others even allow synchronization between systems to completely eliminate collisions in a co-located environment.


Though it is possible to have as many as 79 synchronized, co-located access points, with this many systems, each frequency hopping radio would require precise synchronization with all of the others in order not to interfere with (transmit on the same frequency as) another frequency hopping radio in the area. The cost of such a set of systems is prohibitive and is generally not considered an option. If synchronized radios are used, the expense tends to dictate 12 co-located systems as the maximum. In frequency hopping systems, the carrier changes frequency, or hops, according to a pseudorandomsequence. The pseudorandom sequence is a list of several frequencies to whichthe carrier will hop at specified time intervals before repeating the pattern. The transmitteruses this hop sequence to select its transmission frequencies. The carrier will remainat a certain frequency for a specified time (known as the dwell time), and then use asmall amount of time to hop to the next frequency (hop time). When the list of frequencieshas been exhausted, the transmitter will repeat the sequence.
In order for a frequency hopping system to be 802.11 or
OpenAir compliant, it must operate in the 2.4 GHz ISM band (which is defined by the FCC as being from 2.4000 GHz to 2.5000 GHz). Both standards allow operation in the range of 2.4000 GHz to 2.4835 GHz.



What is a disadvantage of having a short dwell time when using a FHSS system?

  1. Decreased range.
  2. Decreased data throughput.
  3. Decreased security.
  4. Decreased resistance to narrowband interference.

Answer(s): B

Explanation:

When a frequency hopping radio jumps from frequency A to frequency B, it must change the transmit frequency in one of two ways. It either must switch to a different circuit tuned to the new frequency, or it must change some element of the current circuit in order to tune to the new frequency. In either case, the process of changing to the new frequency must be complete before transmission can resume, and this change takes time due to electrical latencies inherent in the circuitry. There is a small amount of time during this frequency change in which the radio is not transmitting called the hop time. The hop time is measured in microseconds (µs) and with relatively long dwell times of around 100-200 ms, the hop time is not significant. A typical 802.11 FHSS system hops between channels in 200-300 µs.
With very short dwell times of 500 - 600µs, like those being used in some frequency hoppingsystems such as Bluetooth, hop time can become very significant. If we look at theeffect of hop time in terms of data throughput, we discover that the longer the hop timein relation to the dwell time, the slower the data rate of bits being transmitted. This translates roughly to longer dwell time = greater throughput.



What does the PRNG acronym stand for in regards to the WEP protocol?

  1. Passive Request Next Generation.
  2. Pseudorandom Number Generator.
  3. Protected Result Null Group.
  4. Persistent Routing Network Gateway.

Answer(s): B

Explanation:

The IEEE 802.11 standard specifies the use of WEP.
WEP is a simple algorithm that utilizes a pseudo-random number generator (PRNG) and theRC4 stream ciphe r



Viewing page 7 of 77
Viewing questions 49 - 56 out of 477 questions



Post your Comments and Discuss CWNP PW0-100 exam prep with other Community members:

PW0-100 Exam Discussions & Posts