PW0-071 Certified Wireless Technology Specialist Sales Exam Set 2

ABC Company's wireless network is configured to hide the SSID in beacons, and allows connectivity only to approved MAC addresses. For encryption and authentication, ABC is using WEP security with a 128-bit key. You have been asked to provide feedback about the strength of their security. You tell ABC Company that _________.


Options are :

  • MAC filtering and SSID hiding will prevent unauthorized access, but WEP will not.
  • MAC filtering will prevent unauthorized access, but SSID hiding and WEP will not.
  • Each currently-used security mechanism is helpful, and the network is secure.
  • Each currently-used security mechanism is weak, and the network is insecure.

Answer : Each currently-used security mechanism is weak, and the network is insecure.

PW0-270 Certified Wireless Analysis Professional (CWAP) Exam Set 3

After your city implemented a municipal Wi-Fi network using 802.11g on channels 1, 6, and 11 near your office, your users have been complaining about poor performance on their 802.11b VoWiFi phones. The best solution for optimizing your 802.11a/g network to support VoWiFi in this scenario is to _____________.


Options are :

  • Upgrade your VoWiFi phones to 802.11g.
  • Buy new phones that support WPA2-Personal security.
  • Buy new 5 GHz capable VoWiFi phones.
  • Configure your VoWiFi phones for unused 2.4 GHz channels.

Answer : Buy new 5 GHz capable VoWiFi phones.

Virtual Private Network (VPN) solutions are often used in conjunction with Wi-Fi networks for what purpose?


Options are :

  • Capturing and analyzing wireless network frames
  • Validating user identity when using 802.1X/EAP security
  • Endpoint security for travelling users connected to unsecure Wi-Fi hot-spots
  • Managing access points that are connected to WLAN controllers

Answer : Endpoint security for travelling users connected to unsecure Wi-Fi hot-spots

Which one of the following adjustments can most benefit a high density environment?


Options are :

  • APs with lower output power
  • Antennas with more gain
  • PoE with more wattage
  • Controllers with fewer 802.3 ports

Answer : APs with lower output power

CWNA-106 Certified Wireless Network Administrator Exam Set 5

As an alternative to using leased lines to connect two offices on the same campus, your customer wants to implement a Wi-Fi solution. When asked by your customer, what advantages do you cite regarding use of a Wi-Fi infrastructure instead of a leased line? (Choose 2)


Options are :

  • Wi-Fi implementations have a lower total cost of ownership than leased lines.
  • Wi-Fi implementations offer more flexibility and easier expansion than leased lines.
  • Wi-Fi implementations are more reliable than leased lines.
  • Wi-Fi implementations support larger numbers of simultaneous connections than leased lines.
  • Wi-Fi implementations are not susceptible to outages caused by inclement weather.

Answer : Wi-Fi implementations have a lower total cost of ownership than leased lines. Wi-Fi implementations offer more flexibility and easier expansion than leased lines.

Identify the strongest passphrase-based security mechanism for 802.11 wireless networks.


Options are :

  • RC4
  • WPA2-Personal
  • WPA-PSK
  • TKIP

Answer : WPA2-Personal

Where is the use of a Wireless Internet Service Provider (WISP) most appropriate?


Options are :

  • Last mile wireless data delivery to homes and businesses
  • To provide guest access to the Internet in an office building
  • As hot-spot connectivity in large airports and conference centers
  • Wi-Fi bridging between two or more buildings within a city

Answer : Last mile wireless data delivery to homes and businesses

PW0-270 Certified Wireless Analysis Professional (CWAP) Exam Set 3

Given: In order to reduce travel-related expenses, your CFO has enacted a company policy that eliminates cellular data connectivity for traveling users. Many of your users must connect to the office network during travel, but you have security concerns about wireless hot-spot usage.To address these concerns, what advice should you give to your traveling users with regard to wireless hot-spot usage? (Choose 2)


Options are :

  • Only use hot-spots that offer either WPA2-PSK or 802.1X/EAP user-based security.
  • You should only use fee-based hot-spots which are more secure than free hot-spots.
  • Always use company-provided VPN client software after connecting to the Wi-Fi network.
  • Verify that personal firewall and antivirus software are both enabled before connecting.
  • Before connecting at hot-spots, conduct a scan to see if hacking tools are in use.

Answer : Always use company-provided VPN client software after connecting to the Wi-Fi network. Verify that personal firewall and antivirus software are both enabled before connecting.

Given: A customer has recently purchased an 802.11g access point that accepts multiple external antennas. The customer wants to know if they need to purchase multiple antennas or a single antenna for the AP.What do you tell them is a benefit of using multiple antennas?


Options are :

  • Transmit and receive diversity that addresses multipath problems
  • Additional functionality through enabling of repeater features
  • Additional gain and therefore a larger coverage area
  • Improved throughput by enabling full-duplex communication

Answer : Transmit and receive diversity that addresses multipath problems

Given: In ABC Company's branch office, there are three 802.11n access points serving 20 Wi-Fi clients for email, web browsing, and occasional file sharing. Some users sit at a picnic table outside the building during lunchtime and have complained that the network is slow and connectivity is intermittent during this period of time.What is the most likely cause of the slow and intermittent connectivity?


Options are :

  • The users experiencing connectivity problems are using WPA2-Personal, which has shorter range than 802.1X/EAP.
  • The client laptops are using 802.11g radios that are not fully interoperable with 802.11n.
  • The picnic tables are located at the edge of the effective range of Wi-Fi coverage
  • WLANs require visual line-of-sight, and only those clients that can see an AP through a window can connect.

Answer : The picnic tables are located at the edge of the effective range of Wi-Fi coverage

PW0-104 Wireless LAN Administration Certified Practice Exam Set 3

Which Wi-Fi vertical market applications are regulated by a government or industry group for security compliance? (Choose 2)


Options are :

  • Consumer payment information in retail stores
  • Patient records in hospitals
  • Guest Internet services in coffee shops
  • Inventory management in warehouses

Answer : Consumer payment information in retail stores Patient records in hospitals

ABC Manufacturing currently has 35 access points throughout their main facility, and each Friday afternoon two administrators walk the premises with spectrum and protocol analyzers to detect unauthorized devices and network activity. You have noted several problems with this approach. To address the inefficiencies with this approach and to provide the most robust preventative security, you have set aside a portion of the department's budget to install a ________.


Options are :

  • Wireless Intrusion Prevention System (WIPS)
  • Full-time Protocol Analyzer
  • Full-time Spectrum Analyzer
  • Wireless Distribution System (WDS)

Answer : Wireless Intrusion Prevention System (WIPS)

After successfully connecting to the Wi-Fi network in your hotel room, you launch a web browser on your laptop. Instead of opening your homepage, it directs you to a hotelbranded page that asks for your name, room number, and a secret key. What has most likely happened?


Options are :

  • The hotel is using a captive portal to provide guest connectivity while keeping nonguest users off the wireless network.
  • You are the victim of a phishing attack, should not provide the information, and should call the front desk for help.
  • Every room in the hotel has its own access p
  • The access point is out of connections and you must enter your room number and code to be added to the hotel's Access Request Queue (ARQ) to obtain the next available connection.

Answer : The hotel is using a captive portal to provide guest connectivity while keeping nonguest users off the wireless network.

PW0-270 Certified Wireless Analysis Professional (CWAP) Exam Set 1

ABC Company is comprised of four departments: sales, marketing, engineering, and accounting. The company would like to separate the users on the WLAN so that users from different departments have access to different services on the network. To implement this strategy, you recommend a WLAN controller that supports _________.


Options are :

  • Multiple Input Multiple Output (MIMO)
  • Role Based Access Control (RBAC)
  • Preshared Key (PSK)
  • Extended Service Set Identifiers (ESSIDs)

Answer : Role Based Access Control (RBAC)

What is the most likely cause of low throughput on a hotel's guest network?


Options are :

  • The 1.5 Mbps Internet connection is creating a bottleneck for the Wi-Fi users.
  • The user's laptop does not have 54 Mbps data rate enabled.
  • The strong security methods used with public access networks often cause low throughput.
  • The user is too close to the servicing access point.

Answer : The 1.5 Mbps Internet connection is creating a bottleneck for the Wi-Fi users.

In a typical office building, Wi-Fi clients are likely to experience poor Wi-Fi coverage in what locations? (Choose 2)


Options are :

  • Stairwells
  • Elevators
  • Cubicles
  • Enclosed offices
  • Hallways

Answer : Stairwells Elevators

CWNA-106 Certified Wireless Network Administrator Exam Set 4

What symptom would indicate the presence of a hidden node in a Wi-Fi network?


Options are :

  • An increase in retransmissions
  • An increase in encrypted packets
  • An increase in signal leakage
  • An increase in antenna diversity

Answer : An increase in retransmissions

ABC Company has recently deployed a Wi-Fi network in their corporate facility. After deployment, they considered a solution for monitoring and enforcing their wireless security policy. What type of system can perform this task?


Options are :

  • Adaptive Network Monitoring Service (ANMS)
  • Wireless Intrusion Prevention System (WIPS)
  • Unified Wireless Network Controller (UWNC)
  • Predictive Modeling Survey Platform (PMSP)

Answer : Wireless Intrusion Prevention System (WIPS)

As an RF signal propagates, it reflects off an object. The reflected signal and the signal following a direct path arrive at the receiver at different points in time. What is the term used to describe this RF behavior?


Options are :

  • Channel Reciprocity
  • Beamwidth Refraction
  • Multipath
  • Antenna Diversity
  • Multiple In, Multiple Out (MIMO

Answer : Multipath

PW0-270 Certified Wireless Analysis Professional (CWAP) Exam Set 2

Given: Several users are required to transfer files among themselves in a conference room. No APs are available for connections to the network infrastructure. All users have laptops with 802.11 wireless adapters installed and operational.What can you implement to allow users to transfer files when 802.11 adapters are available, but no wireless LAN infrastructure is accessible?


Options are :

  • BSSID
  • IBSS
  • BSS
  • ESS

Answer : IBSS

PW0-270 Certified Wireless Analysis Professional (CWAP) Exam Set 6

ABC Corporation has decided to deploy their first Wi-Fi network in their corporate headquarters. ABC prepared for adding a Wi-Fi network by installing PoE-capable Ethernet switches in their wiring closets. What type of PoE implementation is this?


Options are :

  • Injector-based
  • Endpoint
  • Midspan
  • Powerline

Answer : Endpoint

When implementing a wireless LAN, what is the area covered by an AP and usable by a client station called?


Options are :

  • Basic Service Set Identifier
  • Infrastructure Basic Service Set
  • Independent Basic Service Set
  • Basic Service Area
  • Service Set Identifier

Answer : Basic Service Area

As a new salesperson for ABC Company's Golden Gate division, you are tasked with selling Wi-Fi equipment. While evaluating the manufacturer's specifications for a specific Wi-Fi device, you read that this device supports 802.1X/EAP. What capability does this feature provide?


Options are :

  • Power Save functionality
  • QoS for multimedia applications
  • Air Time Fairness
  • User identity validation

Answer : User identity validation

PW0-204 Certified Wireless Security Professional (CWSP) Exam Set 1

The two most common modes of WLAN discovery are passive scanning, where a client station listens for _________ frames, and active scanning, where a client sends and receives _________ frames.


Options are :

  • Data ; Null
  • Beacon ; Probe
  • SSID ; Management
  • Probe Response ; Broadcast

Answer : Beacon ; Probe

What layer of the OSI reference model is responsible for data framing for a given physical layer technology?


Options are :

  • Data Link
  • Transport
  • Session
  • Network

Answer : Data Link

Given: Your branch office AP is configured with WPA2-Personal, and you have decided that CWTS4me is a good passphrase. You have also configured your laptop with the same passphrase, which is used by the access point to validate the laptop's identity when it attempts to connect to the WLAN.What is this process of identity validation called?


Options are :

  • Association
  • Affiliation
  • Authentication
  • Activation

Answer : Authentication

PW0-204 Certified Wireless Security Professional (CWSP) Exam Set 1

Manufacturers design hardware used for wireless LANs based on a common set of criteria or rules known as standards. The name of the organization responsible for creating 802.11 WLAN standards is what?


Options are :

  • IEEE
  • IETF
  • WiMAX Forum
  • ITU
  • Wi-Fi Alliance

Answer : IEEE

You are hired by ABC Company to recommend an appropriate solution for their wireless network. They would like to operate in the 2.4 GHz ISM frequency band and will require data throughput in excess of 10 Mbps. To meet that need, you recommend equipment compliant with the ______ or ______ amendments to the 802.11 standard. (Choose 2)


Options are :

  • 802.11a
  • 802.11n
  • 802.11b
  • 802.11g
  • 802.11i

Answer : 802.11n 802.11g

What is a difference between an Infrastructure Basic Service Set (BSS) network and an Ad Hoc network?


Options are :

  • In an Ad Hoc network, only one WLAN controller is used. A BSS allows multiple WLAN controllers to be connected together to form a mobility domain.
  • An Ad Hoc network allows only legacy security options such as WEP. A BSS allows the creation of a robust security network (RSN) using security methods such as WPA2- Personal.
  • In a BSS, an access point is used for connectivity to the wired network infrastructure. In an Ad Hoc network, client stations communicate directly with each other.
  • A BSS is recommended for enterprise WLANs, while Ad Hoc deployments are recommended for small and medium businesses.

Answer : In a BSS, an access point is used for connectivity to the wired network infrastructure. In an Ad Hoc network, client stations communicate directly with each other.

PW0-204 Certified Wireless Security Professional (CWSP) Exam Set 1

Select the statement that correctly describes the Wi-Fi Alliance's primary role in the WLAN industry.


Options are :

  • The Wi-Fi Alliance creates compliance standards around which vendors can develop products.
  • The Wi-Fi Alliance ensures interoperability of band selection and power settings across regulatory domains.
  • The Wi-Fi Alliance creates recommended practices by which the IEEE can test and certify product interoperability.
  • The Wi-Fi Alliance is a WLAN industry analyst firm that reports market trends and developments.
  • The Wi-Fi Alliance tests and certifies product interoperability based upon standards created by the IEEE.

Answer : The Wi-Fi Alliance tests and certifies product interoperability based upon standards created by the IEEE.

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions