PW0-070 Certified Wireless Technology Specialist Exam Set 5

Which of the following standards defines FHSS and DSSS RF technologies and operates at 1 or 2 Mbps?


Options are :

  • 802.11g
  • Original 802.11
  • 802.11a
  • 802.11b

Answer : Original 802.11

PW0-204 Certified Wireless Security Expert (CWSP) Exam Set 5

You are responsible for technical support at a company. One of the employees complains that his new laptop cannot connect to the company wireless network. You have verified that he is entering a valid password/passkey. What is the most likely problem?


Options are :

  • MAC filtering is blocking him.
  • His operating system is incompatible.
  • His laptop is incompatible.
  • A firewall is blocking him.

Answer : MAC filtering is blocking him.

Which of the following RF characteristics affects the range of a 2.4 GHz signal the most?


Options are :

  • Amplitude
  • Frequency
  • Wavelength
  • Phase

Answer : Wavelength

Which of the following standards of IEEE defines security of Wireless LAN (WLAN)?


Options are :

  • 802.11g
  • 802.11i
  • 802.11a
  • 802.11b

Answer : 802.11i

PW0-070 Certified Wireless Technology Specialist Exam Set 5

Which of the following provides security by implementing authentication and encryption on Wireless LAN (WLAN)?


Options are :

  • L2TP
  • WEP
  • IPSec
  • WAP

Answer : WEP

Mark works as a Network Administrator for Infonet Inc. The company has a Windows 2000 Active Directory domain-based network. The domain contains one hundred Windows XP Professional client computers. Mark is deploying an 802.11 wireless LAN on the network. The wireless LAN will use Wired Equivalent Privacy (WEP) for all the connections. According to the company's security policy, the client computers must be able to automatically connect to the wireless LAN. However, the unauthorized computers must not be allowed to connect to the wireless LAN and view the wireless network. Mark wants to configure all the wireless access points and client computers to act in accordance with the company's security policy. What will he do to accomplish this? Each correct answer represents a part of the solution. Choose three.


Options are :

  • Broadcast SSID to connect to the access point (AP).
  • Install a firewall software on each wireless access point.
  • Configure the authentication type for the wireless LAN to Shared Key.
  • On each client computer, add the SSID for the wireless LAN as the preferred network.
  • Configure the authentication type for the wireless LAN to Open system.
  • Disable SSID Broadcast and enable MAC address filtering on all wireless access points.

Answer : Configure the authentication type for the wireless LAN to Shared Key. On each client computer, add the SSID for the wireless LAN as the preferred network. Disable SSID Broadcast and enable MAC address filtering on all wireless access points.

You are concerned about rogue wireless access points being connected to your network. What is the best way to detect and prevent these?


Options are :

  • Network anti-spyware software
  • Network anti-virus software
  • Protocol analyzers
  • Site surveys

Answer : Site surveys

PW0-204 Certified Wireless Security Expert (CWSP) Exam Set 5

John works as a Network Administrator for Web Perfect Inc. The company has a wireless LAN network. John has configured shared key authentication on a client. The client and the AP start exchanging the frames to enable authentication. Which of the following vulnerabilities may occur while the client and the AP exchange the challenge text over the wireless link?


Options are :

  • Man-in-the-middle attack
  • DoS attack
  • Vulnerability attack
  • Land attack

Answer : Man-in-the-middle attack

Which of the following statements is true about PIN-based wireless LAN security?


Options are :

  • It is best used in enterprise wireless networks.
  • It is addressed in the Wi-Fi Protected Setup certification.
  • It is a multifactor authentication mechanism for WLANs.
  • It is required by the 802.11i amendment.

Answer : It is addressed in the Wi-Fi Protected Setup certification.

You work as a Network Administrator for ABC LTD. You are configuring a wireless network for your company. The management of the company wants that the data transfer rate supported by the wireless LAN should not be less than 40Mbps. Which of the following IEEE wireless standards will you choose?


Options are :

  • 802.11o
  • 802.11b
  • 802.11g
  • 802.11

Answer : 802.11g

PW0-070 Certified Wireless Technology Specialist Exam Set 5

You work as a Network Administrator for Web Inc. The company deploys a Wireless LAN network but there is some problem due to the interference of signals. Which of the following tools should you use to determine signal strength, noise level, and potential sources of nterference? Each correct answer represents a complete solution. Choose three.


Options are :

  • RSSI
  • Link Budget
  • SNR
  • EIRP

Answer : RSSI Link Budget SNR

You work as a technician for Blue Well Inc. Rick, a Sales Manager, wants to configure a new printer on his computer. He asks you to set up the printer so that he can get the fastest data transfer rate. Which of the following will you suggest that he use to connect his computer to the printer?


Options are :

  • IEEE 1394b
  • USB 1.1
  • IEEE 1394
  • USB 2.0

Answer : IEEE 1394b

Which of the following statements about ExpressCard are true?Each correct answer represents a complete solution. Choose three.


Options are :

  • It comes in two sizes. one is 34 mm wide (ExpressCard/34) and the other is 54 mm wide (ExpressCard/54).
  • It comes in two sizes. one is 20 mm wide (ExpressCard/20) and the other is 40 mm wide (ExpressCard/40).
  • The performance of ExpressCard varies with module size.
  • The performance of ExpressCard does not vary with module size.
  • ExpressCard modules use either Universal Serial Bus (USB) 2.0 or the PCI Express (PCIe) bus.

Answer : It comes in two sizes. one is 34 mm wide (ExpressCard/34) and the other is 54 mm wide (ExpressCard/54). The performance of ExpressCard does not vary with module size. ExpressCard modules use either Universal Serial Bus (USB) 2.0 or the PCI Express (PCIe) bus.

PW0-070 Certified Wireless Technology Specialist Exam Set 7

Which of the following organizations is responsible for the regulation of unlicensed frequency band in Europe?


Options are :

  • IEEE
  • Wi-Fi Alliance
  • FCC
  • ETSI

Answer : ETSI

Which of the following PCMCIA configuration directives is used to configure the NIC's network address?


Options are :

  • NETADDR
  • DOMAIN
  • NETMASK
  • NETWORK

Answer : NETWORK

Which of the following is an Institute of Electrical and Electronics Engineering (IEEE) specification that defines standards for Ethernet?


Options are :

  • 802.3
  • 802.12
  • 802.5
  • 802.4

Answer : 802.3

PW0-204 Certified Wireless Security Expert (CWSP) Exam Set 1

What is the maximum data transfer rate supported by the IEEE 802.11b WLAN standard?


Options are :

  • 1Mbps
  • 11Mbps
  • 54Mbps
  • 2Mbps

Answer : 11Mbps

Which of the following devices is used to shunt transient current to the ground in the event of an indirect lightning strike?


Options are :

  • Lightning conductor
  • Lightning rod
  • Grounding rod
  • Lightning arrestor

Answer : Lightning arrestor

Which of the following wireless standards is also known as wireless metropolitan area network (WirelessMAN) standard?


Options are :

  • 802.16
  • 802.11b
  • 802.11i
  • 802.11a

Answer : 802.16

PW0-204 Certified Wireless Security Expert (CWSP) Exam Set 5

You work as a Network Administrator for Infonet Inc. The company's office has a wireless network. Wireless access point on the network works as a router and DHCP server. You want to configure a laptop to connect to the wireless network. What will you configure on the laptop to accomplish the task?


Options are :

  • I/O address
  • Internet service provider's DNS server address
  • Service Set Identifier
  • Demilitarized zone

Answer : Service Set Identifier

You work as a Network Administrator for ABC LTD. The company has a Windows Server 2008 network environment. The network is configured as a Windows Active Directorybased single forest domain-based network. The company has recently provided fifty laptops to its sales team members. You are required to configure an 802.11 wireless network for the laptops. The sales team members must be able to use their data placed at a server in a cabled network. The planned network should be able to handle the threat of unauthorized access and data interception by an unauthorized user. You are also required to prevent the sales team members from communicating directly to one another. Which of the following actions will you perform to accomplish the task? Each correct answer represents a complete solution. Choose all that apply.


Options are :

  • Using group policies, configure the network to allow the wireless computers to connect to the ad hoc networks only.
  • Implement the IEEE 802.1X authentication for the wireless network
  • Configure the wireless network to use WEP encryption for the data transmitted over a wireless network.
  • Implement the open system authentication for the wireless network.
  • Using group policies, configure the network to allow the wireless computers to connect to the infrastructure networks only.

Answer : Implement the IEEE 802.1X authentication for the wireless network Configure the wireless network to use WEP encryption for the data transmitted over a wireless network. Using group policies, configure the network to allow the wireless computers to connect to the infrastructure networks only.

Which of the following network standards is used in wireless networks?


Options are :

  • 802.3
  • 809.5
  • 802.11
  • 802.4

Answer : 802.11

PW0-070 Certified Wireless Technology Specialist Exam Set 3

You need to add a separate wireless network card to your customer's laptop. You need to select the appropriate expansion card type. Which of the following is NOT an expansion slot you will find in the laptop?


Options are :

  • PCMCIA TYPE III
  • PCI
  • Express
  • PCMCIA TYPE I

Answer : PCI

PW0-070 Certified Wireless Technology Specialist Exam Set 3

Which of the following are the fiber optic connectors?Each correct answer represents a complete solution. Choose all that apply.


Options are :

  • LC connector
  • N connector
  • ST connector
  • FC connector
  • SC connector
  • RJ-45 connector

Answer : LC connector ST connector FC connector SC connector

Which of the following IEEE 802.11 amendments can use three radio chains per band to transmit data?


Options are :

  • IEEE 802.11a
  • IEEE 802.11h
  • IEEE 802.11n
  • IEEE 802.11g

Answer : IEEE 802.11g

Which of the following is compatible with the IEEE 802.11i standard?


Options are :

  • EAP
  • WPA2
  • WEP
  • WPA

Answer : WPA2

PW0-070 Certified Wireless Technology Specialist Exam Set 3

Which of the following IEEE standards specifies a security mechanism for Wireless LAN (WLAN)?


Options are :

  • 802.11i
  • 802.11a
  • 802.11b
  • 802.11g

Answer : 802.11i

Which of the following items are configured on a user workstation for wireless networking? Each correct answer represents a complete solution. Choose two.


Options are :

  • MAC Address Filtering
  • Security Set Identifier (SSID)
  • Encryption
  • Service Set Identifier (SSID)

Answer : Encryption Service Set Identifier (SSID)

Which of the following contributes to voltage standing wave ratio (VSWR) in an IEEE 802.119 WLAN circuit?


Options are :

  • Access point power output
  • Impedance mismatch
  • Cable attenuation value
  • Antenna gain

Answer : Impedance mismatch

PW0-204 Certified Wireless Security Expert (CWSP) Exam Set 3

Which of the following PCMCIA card supports hard disk drives?


Options are :

  • Type III
  • Type VI
  • Type II
  • Type I

Answer : Type III

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions