CWNP PW0-100 Exam (page: 10)
CWNP PW0-100 Wireless LAN Administration, Certified Wireless Network Administrator (CWNA)
Updated on: 31-Mar-2026

Viewing Page 10 of 77

Ad Hoc mode cannot be used for which of the following? (Choose all that apply) A.
In an Extended Service Set.

  1. In an airport.
  2. In a Basic Service Set.
  3. In a hotel room.

Answer(s): A,C



How should the site survey engineer document the "dead spots" in the area to be covered by a WLAN?

  1. Showing the network administrator the spots in person.
  2. Marking the spots with markers or flags.
  3. Dead spots are not recorded in a site survey.
  4. Marking the locations of dead spots on a site blueprint or floor plan.

Answer(s): D



What are two methods specified by IEEE 802.11 to authenticate a user in a wireless LAN? (Choose two)

  1. Shared secrets
  2. Certificates
  3. Usernames
  4. Passwords

Answer(s): A,B

Explanation:

Use of PPTP with shared secrets is very simple to implement and provides a reasonable
level of security, especially when added to WEP encryption. Use of IPsec with shared secretsor certificates is generally the solution of choice among security professionals in this arena. When the VPN server is implemented in an enterprise gateway, the same process takes place except that, after the client associates to the access point, the VPN tunnel is established with the upstream gateway device instead of with the access point itself.



Choose the term that means "an amplitude reduction in the signal"

  1. Offset
  2. Amplification
  3. Attenuation
  4. Limiting

Answer(s): C

Explanation:

attenuation - a term used to describe decreasing the amplitude of an RF signal due to resistance of cables, connectors, splitters, or obstacles encountering the signal path



Which of the following are mechanisms defines by 802.11b for providing access control and privacy on a wireless LAN? (Choose two)

  1. RADIUS
  2. WEP
  3. AES
  4. SSID

Answer(s): B,D

Explanation:

REF FOR B //
Open System authentication is a very simple process. As the wireless LAN administrator, you have the option of using WEP (wired equivalent privacy) encryption with Open System authentication. If WEP is used with the Open System authentication process, there is still no verification of the WEP key on each side of the connection during authentication. Rather, the WEP key is used only for encrypting data once the client is authenticated and associated.
REF FOR D//: The service set identifier (SSID) is a unique, case sensitive, alphanumeric value from 2-32 characters long used by wireless LANs as a network name. This naming handle is used for segmenting networks, as a rudimentary security measure, and in the process of joining a network. The SSID value is sent in beacons, probe requests, probe responses, and other types of frames. A client station must be configured for the correct SSID in order to join a network. The administrator configures the SSID (sometimes called the ESSID) in each access point.Some stations have the ability to use any SSID value instead of only one manually specified by the administrator. If clients are to roam seamlessly among a group of access points, the clients and all access points must be configured with matching SSIDs. The most important point about an SSID is that it must match EXACTLY between access points and clients.



Which item(s) would NOT be beneficial for a network manager to provide to an engineer doing an indoor site survey?

  1. Blueprints of the facility.
  2. Available lifts for mounting access points.
  3. Access to network backbone routers.
  4. A list of RF systems already in use in the facility.
  5. Diagram of available AC power.
  6. Previous site survey reports.

Answer(s): B



Prior to August 31, 2000, the FCC required the use of how many channels with a 2.4 GHz FHSS system before repeating the pattern?

  1. 70
  2. 75
  3. 79
  4. 83

Answer(s): B

Explanation:

No overlapping frequencies are allowed under either rule. If the minimum 75 MHz of used bandwidth within the frequency spectrum were cut into pieces as wide as the carrier frequency bandwidth in use, they would have to sit side-by-side throughout the spectrum with no overlap. This regulation translates into 75 non-overlapping carrier frequencies under the pre- 8/31/00 rules and 15-74 non-overlapping carrier frequencies under the post- 8/31/00 rules.
The IEEE states in the 802.11 standard that FHSS systems will have at least 6 MHz of carrier frequency separation between hops. Therefore, a FHSS system transmitting on 2.410 GHz must hop to at least 2.404 if decreasing in frequency or 2.416 if increasing in frequency. This requirement was left unchanged by the IEEE after the FCC change on 8/31/00.



After August 31, 2000, the FCC allowed a maximum channel
bandwidth for FHSS of?

  1. 1 MHz
  2. 2 MHz
  3. 5 MHz
  4. 11 MHz

Answer(s): C

Explanation:

Certified Wireless Network Administrator Study Guide, page 54



Viewing Page 10 of 77



Share your comments for CWNP PW0-100 exam with other users:

Eli 6/18/2023 11:27:00 PM

the software is provided for free so this is a big change. all other sites are charging for that. also that fucking examtopic site that says free is not free at all. you are hit with a pay-wall.
EUROPEAN UNION


open2exam 10/29/2023 1:14:00 PM

i need exam questions nca 6.5 any help please ?
Anonymous


Gerald 9/11/2023 12:22:00 PM

just took the comptia cybersecurity analyst (cysa+) - wished id seeing this before my exam
UNITED STATES


ryo 9/10/2023 2:27:00 PM

very helpful
MEXICO


Jamshed 6/20/2023 4:32:00 AM

i need this exam
PAKISTAN


Roberto Capra 6/14/2023 12:04:00 PM

nice questions... are these questions the same of the exam?
Anonymous


Synt 5/23/2023 9:33:00 PM

need to view
UNITED STATES


Vey 5/27/2023 12:06:00 AM

highly appreciate for your sharing.
CAMBODIA


Tshepang 8/18/2023 4:41:00 AM

kindly share this dump. thank you
Anonymous


Jay 9/26/2023 8:00:00 AM

link plz for download
UNITED STATES


Leo 10/30/2023 1:11:00 PM

data quality oecd
Anonymous


Blessious Phiri 8/13/2023 9:35:00 AM

rman is one good recovery technology
Anonymous


DiligentSam 9/30/2023 10:26:00 AM

need it thx
Anonymous


Vani 8/10/2023 8:11:00 PM

good questions
NEW ZEALAND


Fares 9/11/2023 5:00:00 AM

good one nice revision
Anonymous


Lingaraj 10/26/2023 1:27:00 AM

i love this thank you i need
Anonymous


Muhammad Rawish Siddiqui 12/5/2023 12:38:00 PM

question # 142: data governance is not one of the deliverables in the document and content management context diagram.
SAUDI ARABIA


al 6/7/2023 10:25:00 AM

most answers not correct here
Anonymous


Bano 1/19/2024 2:29:00 AM

what % of questions do we get in the real exam?
UNITED STATES


Oliviajames 10/25/2023 5:31:00 AM

i just want to tell you. i took my microsoft az-104 exam and passed it. your program was awesome. i especially liked your detailed questions and answers and practice tests that made me well-prepared for the exam. thanks to this website!!!
UNITED STATES


Divya 8/27/2023 12:31:00 PM

all the best
UNITED STATES


KY 1/1/2024 11:01:00 PM

very usefull document
Anonymous


Arun 9/20/2023 4:52:00 PM

nice and helpful questions
INDIA


Joseph J 7/11/2023 2:53:00 PM

i found the questions helpful
UNITED STATES


Meg 10/12/2023 8:02:00 AM

q 105 . ans is d
INDIA


Navaneeth S 7/14/2023 7:57:00 AM

i have interest to get a sybase iq dba certification
UNITED STATES


Aish 10/11/2023 5:27:00 AM

want to pass exm.
INDIA


Anonymous 6/12/2023 7:23:00 AM

are the answers correct?
INDIA


Kris 7/7/2023 9:43:00 AM

good morning, could you please upload this exam again, i need it to test my knowledge in sd-wan with version 7.0.
Anonymous


Meghraj mali 10/7/2023 1:47:00 PM

very nice question
CANADA


Noel 11/1/2022 9:14:00 PM

i have learning disability and this exam dumps allowed me to focus on the actual questions and not worry about notes and the those other study materials.
SOUTH AFRICA


Jas 10/25/2023 6:01:00 PM

165 should be apt
UNITED STATES


Neetu 6/22/2023 8:41:00 AM

please upload the dumps, real need of them
Anonymous


Mark 10/24/2023 1:34:00 AM

any recent feeedback?
UNITED STATES