PW0-104 Wireless LAN Administration Certified Practice Exam Set 2

Which of the following are two statements that best describe 802.11-1999 (R2003) network operation with regard to association and re-association processes? (Choose two)


Options are :

  • Access points can ignore stations using a null (blank) SSID field in their Probe Request frames, but must respond with a Probe Response frame if a station has a specific SSID matching their own.
  • In order to provide seamless roaming, some vendors allow a station to associate with a new access point while still associated with the old one as long as both access points are from the same vendor.
  • When a station is in the cell range of multiple access points, it will associate with an access point that uses active scanning before associating with an access point that uses passive scanning.
  • When actively scanning for a network to join, clients transmit Probe Request frames, which contain most of the same information found in beacons.
  • A station cannot attempt to associate with an access point until that access point authenticates the station.

Answer : When actively scanning for a network to join, clients transmit Probe Request frames, which contain most of the same information found in beacons. A station cannot attempt to associate with an access point until that access point authenticates the station.

PW0-270 Certified Wireless Analysis Professional (CWAP) Exam Set 5

What are some common specifications for 802.11 WLAN antennas? (Choose 3)


Options are :

  • Operating Frequency
  • Azimuth Beamwidth
  • Return Loss Rating
  • Spectral Resilience
  • Power loss in dB
  • Impedance in Ohms

Answer : Operating Frequency Azimuth Beamwidth Impedance in Ohms

When using VMW Power Save operation, a wireless client device__________.


Options are :

  • Alternates between awake and dozing, depending on its need to transmit and receive information
  • Buffers frames from the access point until it wakes to process the frames up the stack
  • Experiences lower throughput and lower latency than when operating in Active mode
  • Powers down some radio chains and transmits information at a slower data rate

Answer : Alternates between awake and dozing, depending on its need to transmit and receive information

Which of the following are three items that are specified by or derived from the IEEE 802.11i wireless LAN security amendment? (Choose three)


Options are :

  • 802.1X/EAP framework
  • IP Security (IPSec)
  • CCMP / AES
  • WPA2-Enterprise

Answer : 802.1X/EAP framework CCMP / AES WPA2-Enterprise

PW0-071 Certified Wireless Technology Specialist Sales Exam Set 1

Your company has many client devices, some that support WEP, some that support WPA, and some that support WPA2. The client devices that support only WEP can be firmware upgraded to support the TKIP wireless security protocol. As the wireless administrator at Your company, it is your responsibility to provide the strongest industry standard layer-2 security possible while applying a reliable solution for all devices. Which are two security measures that you should apply to meet Your company’s requirements? (Choose two)


Options are :

  • TKIP/RC4 encryption
  • 802.1X/EAP authentication
  • Shared Key authentication
  • CCMP/AES encryption

Answer : TKIP/RC4 encryption 802.1X/EAP authentication

What are two BSS modes specified the 802.11 Clause 20 (High Throughput) PHY? (Choose 2)


Options are :

  • 22 MHz
  • 20 MHZ
  • 5/10 MHz
  • 20/40 MHz

Answer : 5/10 MHz

Devices compliant with the IEEE 802.11-2007 standard use which radio brands? (Choose 4)


Options are :

  • 5.15 - 5.25 GHz UNII band
  • 5.470 - 5.725 GHz UNII band
  • 5.725 - 5.875 GHz ISM band
  • 902 - 928 MHz ISM band
  • 2.4000 - 2.4835 GHz ISM band

Answer : 5.15 - 5.25 GHz UNII band 5.470 - 5.725 GHz UNII band 5.725 - 5.875 GHz ISM band 2.4000 - 2.4835 GHz ISM band

PW0-204 Certified Wireless Security Professional (CWSP) Exam Set 1

You are contracted by a local school to wirelessly connect a mobile classroom to the school's network infrastructure. You are thinking about positioning a wireless workgroup bridge at the mobile classroom to create the wireless connection back to the main building in which the school's data center is located. What should you take into consideration prior to deploying a wireless workgroup bridge in this scenario?


Options are :

  • You will only be able to connect wired devices to the wireless workgroup bridge and not any wireless client devices in the mobile classroom.
  • You will need to connect a wireless bridge to the main building's network infrastructure to make the connection to the wireless workgroup bridge at the mobile classroom.
  • If you need to use security options such as MAC filtering, WEP, or WPA-Personal, you will need to use a dedicated wireless bridge at the mobile classroom instead of the wireless workgroup bridge.
  • If you connect the wireless workgroup bridge to an access point at the main building, the access point will not be able to provide connections to other wireless client devices during communication with the wireless workgroup bridge.

Answer : You will only be able to connect wired devices to the wireless workgroup bridge and not any wireless client devices in the mobile classroom.

The IEEE 802.11-2007 standard specifies which channel access method as a part of the Hybrid Coordination function?


Options are :

  • TSF/CA
  • HDCF
  • EDCA
  • PCFA

Answer : EDCA

What facts are true regarding controllers and APs in a Split MAC architecture? (Choose 2)


Options are :

  • A tunneling mechanism is used between the controller and AP.
  • Preauthentication support is required for fast/secure roaming.
  • Using centralized forwarding, controller-based APs do not tag Ethernet frames with VLAN identifiers.
  • With 802.1X/EAP security, the AP acts as a supplicant

Answer : Preauthentication support is required for fast/secure roaming. With 802.1X/EAP security, the AP acts as a supplicant

CWNA-106 Certified Wireless Network Administrator Exam Set 2

Given: ABC Company is opening a new branch office that needs an 802.11 WLAN to support a mission critical application. The IT manager has considered implementing a remote office WLAN controller with controller-based APs instead of several autonomous APs. He has asked you about the primary differences between the two solutions.What statements define characteristics of WLAN controllers? (Choose 2)


Options are :

  • The CAPWAP protocol currently allows controller-based APs from one vendor to be used with WLAN controllers from another vendor
  • Controller-based APs must be plugged directly into the WLAN controller, but autonomous APs can be plugged into Ethernet switches of any kind.
  • Controller-based APs download their firmware and configuration from the WLAN controller upon initialization, thus reducing management overhead.
  • If a WLAN controller is used, all attached controller-based APs must use the same WLAN profiles.
  • Most controller-based APs support 802.3-2005, Clause 33 PoE, and some controllerbased APs support the 802.3at PoE Plus standard.

Answer : Controller-based APs download their firmware and configuration from the WLAN controller upon initialization, thus reducing management overhead. If a WLAN controller is used, all attached controller-based APs must use the same WLAN profiles.

Given: ABC Hospital is considering a Wi-Fi infrastructure upgrade where the dual-radio ERP access points would be replaced with new dual-ratio HT APs. ABC wants to minimize the time and cost associated with performing a new site survey, so they will be performing a rip-and-replace migration. What problem is most likely to be experienced in this scenario?


Options are :

  • The Wi-Fi infrastructure’s rogue scanning feature will no longer be able to accurately triangulate rogue clients.
  • Increased receiver sensitivity on the HT APs will cause them to continually change channels to avoid co-channel interference.
  • Client stations located in the hallways will experience minimal performance gain from the HT APs due to line-of-sight conditions.
  • Multipath will increase causing increased layer-2 retransmissions. The retransmission will cause latency for VoWiFi handsets.

Answer : Multipath will increase causing increased layer-2 retransmissions. The retransmission will cause latency for VoWiFi handsets.

What antenna technologies are used to help overcome null areas of RF coverage due to multipath? (Choose 2)


Options are :

  • Transmit Beamforming
  • Spectral Clarification
  • Antenna Diversity
  • Beam Linearization

Answer : Transmit Beamforming Antenna Diversity

PW0-104 Wireless LAN Administration Practice Exam Set 1

In an enterprise installation, which is the type of wireless LAN device that can be implemented as part of the core or access network layers?


Options are :

  • Wireless workgroup bridge
  • Wireless bridge
  • Wireless mesh router
  • Wireless access point

Answer : Wireless mesh router

Identify the feature designed IT wireless clients to improve battery life when only a single spatial stream in needed.


Options are :

  • Wireless Multimedia Power Save (WMM-PS)
  • Spatial Multiplexing Power Save (SMPS)
  • 802.11r/k Power Save
  • Power Save Multi-Poll

Answer : Spatial Multiplexing Power Save (SMPS)

Given: ABC Company has a 5 GHz WLAN deployment using the UNII-2 and UNII-2e bands. DFS functionally is enabled as required by the regulatory domain. A VoWiFi station is associated to AP1, which is using channel 52. After detecting a radar signature on channel 52, AP1 sends a channel switch announcement and moves to channel 60. The VoWiFi station doesn’t receive the channel switch announcement.What is most likely to occur as a result of this scenario?


Options are :

  • An increase in frame retransmissions, causing voice latency
  • All APs in the ESS will change channels as well
  • AP1 will send a reassociation request to the VoWiFi station on channel 52
  • The VoWiFi station will roam to a different AP that is using channel 52

Answer : An increase in frame retransmissions, causing voice latency

PW0-104 Wireless LAN Administration Certified Practice Exam Set 3

Your company informs you that they are trying to hook a new laptop up to their 802.11g network. Your company says that even though the utility shows that the access point has high signal strength and that there is an excellent connection to the access point, their laptop is unable to get a valid IP address and thus cannot connect to servers on their wired network. Which are the two wireless network problems that can be the reason for this situation? (Choose two)


Options are :

  • The wireless client device is configured to use Shared Key authentication.
  • The laptop's MAC address has not been added to the access point's filter list.
  • The wireless client device is using the wrong WEP key.
  • The wireless client device is using the wrong network name (ESSID)

Answer : The laptop's MAC address has not been added to the access point's filter list. The wireless client device is using the wrong WEP key.

The use of which four Extensible Authentication Protocol (EAP) types is included in the WPA/WPA2-Enterprise certification programs from the Wi-Fi Alliance? (Choose four)


Options are :

  • EAP-MD5
  • EAP-TLS
  • EAP-FAST
  • EAP-TTLS
  • PEAPv0 / EAP-MSCHAPv2

Answer : EAP-TLS EAP-TTLS PEAPv0 / EAP-MSCHAPv2

Which two advantages does using predictive site survey modeling software offer compared to performing a traditional "manual" site survey? (Choose two)


Options are :

  • Predictive modeling software provides more reliable data than manual surveys when fine-tuning access point placement.
  • Interference sources from external networks can be more accurately measured when using predictive modeling software.
  • Predictive modeling software makes it simple to try various access point's locations, updating an access point coverage pattern in real-time.
  • It takes less time to create a reasonably accurate initial site survey using predictive modeling software than when performing a manual survey.
  • Predictive modeling software can predict the ideal access point location more than 99% of the time.

Answer : Predictive modeling software makes it simple to try various access point's locations, updating an access point coverage pattern in real-time. It takes less time to create a reasonably accurate initial site survey using predictive modeling software than when performing a manual survey.

PW0-105 Certified Wireless Network Administrator Exam Set 4

What factors significantly affect the amount of wireless bandwidth available to each station within a BSS? (Choose 2)


Options are :

  • Beacon interval value Configured in the access point
  • The layer 3 protocol used by each station to transmit data over the wireless link
  • The data rates enabled on the access point
  • The data rates at which client stations are transmitting uplink data

Answer : The data rates enabled on the access point The data rates at which client stations are transmitting uplink data

What are two appropriate IEEE 802.11-1999 (R2003) stipulations with regard to DSSS technology?


Options are :

  • The impedance level of the transmit antenna port(s) shall be 75 Ohms if the port is exposed.
  • Minimum transmit power should be no less than 0 dBm.
  • Power control should be provided for transmitted power greater than 1 Watt
  • A basic data rate and an enhanced data rate are specified for the 802.11 DSSS physical layer.
  • DSSS systems must be able to interoperate with FHSS systems at the same data rate.

Answer : Minimum transmit power should be no less than 0 dBm. A basic data rate and an enhanced data rate are specified for the 802.11 DSSS physical layer.

Which authentication methods generate dynamic encryption keys as a by-product? (Choose 2)


Options are :

  • WLAN Profile
  • WPA2-Personal
  • DWEP
  • HTTPS Captive Portal
  • 802.1X/EAP

Answer : WPA2-Personal 802.1X/EAP

PW0-104 Wireless LAN Administration Practice Exam Set 5

During a site survey, it is important to collect and record data about radio frequency related interference and blockage sources that result in reduced signal coverage. The least amount of RF signal loss is introduced by which type of building construction material?


Options are :

  • Aluminum siding
  • Insulation-doped glass window
  • Concrete or brick wall
  • Wood-studded drywall

Answer : Wood-studded drywall

According to the 802.11-2007 standard, when is an ERP-OFDM access point required to respond to Probe Request frames from High Throughput (HT) stations?


Options are :

  • Only when the Probe Request frames contain all basic data rates specified by the access point
  • Only when the Probe Request frames contain a blank SSID value
  • Access points are always required to respond to probe requests
  • Only when the Probe Request frames contain the correct SSID value
  • Only when the access point is configured for Open System authentication

Answer : Only when the Probe Request frames contain a blank SSID value Only when the Probe Request frames contain the correct SSID value

How is throughput capacity scaled in a single channel architecture (SCA) WLAN system?


Options are :

  • By enabling multiple simultaneous client data streams on each radio within an AP
  • By using downlink data compression and uplink flow control at the AP
  • By increasing the radio density in the APs. which increases the number of available channel layers
  • By placing APs that are on a single channel more closely together

Answer : By increasing the radio density in the APs. which increases the number of available channel layers

PW0-104 Wireless LAN Administration Practice Exam Set 4

You are a network engineer for your company. Your company wants you to establish an outdoor WLAN connection between two buildings that are 2 kilometers (1.24 miles) apart. Your first required goal is to create a point-to-point link between the two buildings within FCC regulations. Secondly, you need to provide an industry-standard security solution capable of supporting mutual authentication. Protecting your wireless bridges from environmental elements such as windblown dust, rain, and splashing water could be done as an optional goal.You proceed by installing an 802.11b wireless bridge at each building, configuring one in root mode and the other in non-root mode. You then configure each radio for 1 watt (+30 dBm) and connect 9 dBi omni-directional antennas to both. You position each wireless bridge in a NEMA-compliant enclosure intended for outdoor use and configure them for 802.11i-compliant security features. Which statement in relation to the solution you chose to deploy is accurate?


Options are :

  • Your solution meets both required objectives and the optional objective
  • Your solution meets neither required objective but meets the optional objective.
  • Your solution meets the second required objective and the optional objective, but not the first required objective.
  • Your solution meets the first required objective and the optional objective, but not the second objective.

Answer : Your solution meets the second required objective and the optional objective, but not the first required objective.

Which of the following is an advantage of using WPA-Personal as a security solution for 802.11a networks, rather than WEP-128?


Options are :

  • WPA-Personal is based upon IEEE 802.11 industry standards, but WEP is not.
  • WPA-Personal uses 802.1X/EAP for authentication, and WEP-128 uses preshared keys.
  • WPA-Personal uses CCMP for encryption, and WEP-128 uses TKIP for encryption.
  • WPA-Personal uses CCMP for encryption, and WEP-128 uses TKIP for encryption.

Answer : WPA-Personal uses CCMP for encryption, and WEP-128 uses TKIP for encryption.

Which two of the following statements pertaining to 802.11-compliant systems and colocated access points are accurate? (Choose two)


Options are :

  • The same number of 802.11b systems and 802.11g systems can be co-located in the 2.4 GHz ISM band without adjacent channel interference.
  • 802.11g access points configured for 802.11g-compliant operation use protection mechanisms to prevent OFDM transmissions from colliding with the DSSS transmissions. This prevents performance degradation when 802.11g systems are co-located with 802.11b access points.
  • Up to four 802.11a access points in the 5.15 ?5.25 GHz U-NII band can be co-located without performance degradation.
  • 802.11 FHSS systems have a co-location throughput advantage over 802.11b DSSS systems because they are frequency agile and make use of more discrete channels.

Answer : The same number of 802.11b systems and 802.11g systems can be co-located in the 2.4 GHz ISM band without adjacent channel interference. Up to four 802.11a access points in the 5.15 ?5.25 GHz U-NII band can be co-located without performance degradation.

PW0-071 Certified Wireless Technology Specialist Sales Exam Set 1

What parameters make WMM-PS more efficient than legacy 802.11 Power Save mode?


Options are :

  • Applications control capacity and latency requirements
  • WMM-PS client devices switch in and out of APSD mode every Beacon
  • WMM-PS identifies incoming VoIP data and delivers it immediately
  • Queued frames are delivered at scheduled intervals
  • Use of Data frames as trigger frames instead of Control frames

Answer : Applications control capacity and latency requirements Use of Data frames as trigger frames instead of Control frames

PW0-270 Certified Wireless Analysis Professional (CWAP) Exam Set 5

What criteria can an 802.11 wireless client use to select the best access point with which to associate?


Options are :

  • Received Signal Strength Indicator value
  • Prioritized RF positioning information from each access point
  • Signal-to-Noise Ratio value
  • Physical distance to the closest access point
  • Average round trip time of a link test packet

Answer : Received Signal Strength Indicator value Signal-to-Noise Ratio value

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions