Free CWNP PW0-100 Exam Braindumps (page: 8)

Which of the following is true of a 2.4 GHz RF link at a distance of 5 miles (8 kilometers).
(Choose all that apply)

  1. RF Line of Sight is required.
  2. Visual Line of Sight is required.
  3. Earth bulge must be factored into calculations.
  4. The Fresnel Zone must be at least 60% clear of obstructions.
  5. High gain omni-directional antenna.

Answer(s): A,D

Explanation:

From the study guide, Visual LOS is not required for a successful point-to-point connection. However RF LOS is required. Additionally, the Fresnel zone must be at least 60% clear of obstructions. Earth bulge is only factored in for greater then 7 mile links.



Which two RF spread spectrum technologies does IEEE specify in the 802.11 standard? (Choose two)

  1. Infrared
  2. Frequency Hopping
  3. Direct Sequencing
  4. Wide Band

Answer(s): B,C

Explanation:

REF FOR B: a typical 802.11 frequency hopping WLAN might be implemented as an enterprise wireless networking solution while HomeRF is only implemented in home environments due to lower output power restrictions by the FCC OR
Frequency agility refers to the radio's
ability to change transmission frequency abruptly within the usable RF frequency band. In the case of frequency hopping wireless LANs, the usable portion of the 2.4 GHz ISM band is 83.5 MHz, per FCC regulation and the IEEE 802.11 standard.
REF FOR C//
In the 2.4 GHz ISM band, the IEEE specifies the use of DSSS at a data rate of 1 or 2 Mbps under the 802.11 standard.Under the 802.11b standard-sometimes called highrate wireless-data rates of 5.5 and 11 Mbps are specified.



What are the two types of scanning used with wireless LANs? (Choose all that apply)

  1. Passive
  2. Beacon
  3. Probe
  4. Active

Answer(s): A,D

Explanation:

When you install, configure, and finally start up a wireless LAN client device such as a USB client or PCMCIA card, the client will automatically "listen" to see if there is a wireless LAN within range. The client is also discovering if it can associate with that wireless LAN. This process of listening is called scanning. Scanning occurs before any other process, since scanning is how the client finds the network. There are two kinds of scanning: passive scanning and active scanning. In finding an access point, client stations follow a trail of breadcrumbs left by the access point. These breadcrumbs are called service set identifiers (SSID) and beacons. These tools serve as a means for a client station to find any and all access points.



A wireless portal interconnects LANs conforming to what IEEE standards? (Choose two)

  1. 802.11 and 802.3
  2. 802.3 and 802.5
  3. 802.5 and 802.11
  4. 802.10 and 802.11
  5. 802.5 and 802.10

Answer(s): A,C

Explanation:

An access point is considered a portal because it allows client connectivity from an 802.11 network to 802.3 or 802.5 networks. Access points are available with many different hardware and software options. The most common of these options are:
? Fixed or Detachable Antennas
? Advanced Filtering Capabilities
? Removable (Modular) Radio Cards
? Variable Output Power
? Varied Types of Wired Connectivity



Choose the organization that creates wireless LAN standards.

  1. IEEE
  2. WLANA
  3. WECA
  4. Wi-Fi

Answer(s): A



Under 802.11 standard, what modulation types are used when transmitting data using DSSS? (Choose all that apply)

  1. CCK
  2. GFSK
  3. BPSK
  4. QPSK
  5. 64QAM

Answer(s): C,D

Explanation:

The high data rate of 802.11b-compliant devices is the result of using a different coding technique. Though the system is still a direct sequencing system, the way the chips are coded (CCK rather than Barker Code) along with the way the information is modulated (QPSK at 2, 5.5, & 11 Mbps and BPSK at 1 Mbps) allows for a greater amount of data to be transferred in the same time frame. 802.11b compliant products operate only in the 2.4 GHz ISM band between 2.4000 and 2.4835 GHz.



The ETS1 standard being developed to compete against 802.11a is known as?

  1. HomeRF
  2. OpenAir
  3. HiperLan/2
  4. Bluetooth

Answer(s): C

Explanation:

The standards ETSI has established, HiPerLAN/2 for example, directly compete against standards created by the IEEE such as 802.11A. There has been much discussion about IEEE and ETSI unifying on certain wireless technologies, but nothing has materialized as of this writing. This effort is referred to as the "5UP" initiative for "5 GHz Unified Protocol." The IEEE's attempt at interoperability with ETSI's HiperLAN/2 standard is the new forthcoming 802.11h standard.



WECA requires which of the following WEP security settings for Wi-Fi certification?

  1. Single 104-bit key.
  2. Dial 40-bit keys.
  3. Single 128-bit key.
  4. Single 40-bit key.

Answer(s): D

Explanation:

The 802.11 standard leaves WEP implementation up to wireless LAN manufacturers, so each vendor's implementation of WEP keys may or may not be the same, adding another weakness to WEP. Even WECA's Wi-Fi interoperability standard tests include only 40- bit WEP keys.
Among WECA's list of interoperability checks is the use of 40-bit WEP keys. Note that 40- and 64-bit keys are the same thing. A 40-bit "secret" key is concatenated with a 24- bit Initialization Vector (IV) to reach the 64-bits. In the same manner, 104- and 128-bit keys are the same. WECA does not specify interoperability of 128-bit keys; hence, no compatibility is to be expected between vendors displaying the Wi-Fi seal when using 128-bit WEP keys.



Viewing page 8 of 77
Viewing questions 57 - 64 out of 477 questions



Post your Comments and Discuss CWNP PW0-100 exam prep with other Community members:

PW0-100 Exam Discussions & Posts