CWNP PW0-100 Exam (page: 4)
CWNP PW0-100 Wireless LAN Administration, Certified Wireless Network Administrator (CWNA)
Updated on: 31-Mar-2026

Viewing Page 4 of 77

Which of the following are features included in the 802.11 standard? (Choose all that apply)

  1. Support of asynchronous and time-bounded delivery service.
  2. Use of the CSMA/CD and RTS/CTS protocols.
  3. 802.1x with EAP support.
  4. Wireless VPN tunnels with RADIUS authentication methods.

Answer(s): A

Explanation:

Point-to-Point Protocol (PPP) - A protocol that provides router-to-router and host-tonetwork connections over both synchronous and asynchronous circuits. PPP is the successor to SLIP.An IEEE 802.11 mode that enables contention-free frame transfer based on a priority mechanism; stations are polled for the need for frame transmission. Enables time-bounded services that support the transmission of voice and video



Which of the following is a secure method of client device authentication onto a WLAN?

  1. PLCP Login Layer
  2. Open System Authentication
  3. PMD Zones
  4. CSMA/CA

Answer(s): B

Explanation:

The IEEE 802.11 standard specifies two methods of authentication: Open System authenticationand Shared Key authentication. The simpler and also the more secure of the two methods is Open System authentication
Open System Authentication
Open System authentication is a method of null authentication and is specified by the IEEE 802.11 as the default setting in wireless LAN equipment.Using this method of authentication, a station can associate with any access point that uses Open System authenticationbased only on having the right service set identifier (SSID). The SSIDs must match on both the access point and client before a client is allowed to complete the authentication process. Uses of the SSID relating to security will be discussed in Chapter 10 (Security).The Open System authentication process is used effectively in both secure and non-secure environments.
Open System Authentication Process
The Open System authentication process occurs as follows:
1. The wireless client makes a request to associate to the access point
2. The access point authenticates the client and sends a positive response and the client becomes associated (connected)



A change in the direction and intensity of a group of waves after passing by an obstacle or the bending waves around an object is referred to as?

  1. Diffraction
  2. Refraction
  3. Diffusion
  4. Scattering
  5. Reflection

Answer(s): A

Explanation:

Diffraction occurs when the radio path between the transmitter and receiver is obstructed by a surface that has sharp irregularities or an otherwise rough surface. At high frequencies, diffraction, like reflection, depends on the geometry of the obstructing object and the amplitude, phase, and polarization of the incident wave at the point of diffraction. Diffraction is commonly confused with and improperly used interchangeably with refraction.



Attenuation is the term used to describe?

  1. A decrease in RF signal strength.
  2. A lengthening of the antenna cable.
  3. The ratio of front-to-back antenna beam strength.
  4. The apparent increase in an antenna's receives signal power.

Answer(s): A

Explanation:

Attenuation is simply a reduction of signal strength during transmission. You represent attenuation in decibels (dB), which is ten times the
logarithm of the signal power at a particular input divided by the signal power at an output of a specified medium. For example, an office wall (i.e., medium) that changes the propagation of an RF signal from a power level of 200 milliwatts (the input) to 100 milliwatts (the output) represents 3 dB of attenuation. Consequently, positive attenuation causes signals to become weaker when traveling through the medium.
When signal power decreases to relatively low values, the receiving 802.11 radio will likely encounter bit errors when decoding the signal. This problem worsens when significant RF interference is present
Excessive attenuation causes the network's throughput to decrease because of operation at a lower data rate and the additional overhead necessary to retransmit the frames. Generally, this means that the user is operating within the outer bounds of an access point's range. There's enough attenuation present to decrease signal power below acceptable values. At worst case,
signal power loss due to attenuation becomes so low that affected users will lose connectivity to the network



Which spread spectrum technologies exhibit resistance to narrowband RF interference by design?

  1. FHSS
  2. DSSS
  3. Point-to-point Infrared
  4. Broadcast Infrared

Answer(s): A

Explanation:

Frequency hopping spread spectrum is a spread spectrum technique that uses frequency agility to spread the data over more than 83 MHz. Frequency agility refers to the radio's ability to change transmission frequency abruptly within the usable RF frequency band. In the case of frequency hopping wireless LANs, the usable portion of the 2.4 GHz ISM band is 83.5 MHz, per FCC regulation and the IEEE 802.11 standard. Both FHSS and DSSS technologies have their advantages and disadvantages, and it is incumbenton the wireless LAN administrator to give each its due weight when deciding howto implement a wireless LAN. This section will cover some of the factors that shouldbe discussed when determining which technology is appropriate for your organization, including:
? Narrowband interference
? Co-location
? Cost
? Equipment compatibility & availability
The advantages of FHSS include a greater resistance to narrow band interference. DSSS systemsmay be affected by narrow band interference more than FHSS because of the use of22 MHz wide contiguous bands instead of the 79 MHz used by FHSS. This fact may be a serious consideration if the proposed wireless LAN site is in an environment that has such interference present.



A 2.4 GHz Spread Spectrum phone located near an 802.11b compliant Access Point will not cause interference.

  1. This is always true.
  2. This is always false.
  3. It depends on configuration of the Access Point and phone.

Answer(s): C

Explanation:

communications tower or other legitimate system, the wireless LAN administrator might have to consider using a wireless LAN system that utilizes a different set of frequencies. For example, if an administrator were responsible for the design and installation of an RF network at a large apartment complex, special considerations might be in order. If an RF interference source were a large number of 2.4 GHz spread spectrum phones, baby monitors, and microwave ovens in this apartment complex, then the administrator might choose to implement 802.11a equipment that uses the 5 GHz UNII bands instead of 802.11b equipment that shares the 2.4 GHz ISM band with these other devices. Unintentional jamming occurs regularly due to many different devices across many different industries sharing the 2.4 GHz ISM band with wireless LANs. Malicious jamming is not a common threat. The reason RF jamming is not very popular among hackers is that it is fairly expensive to mount an attack, considering the cost of the required equipment,



Bluetooth uses which type of data modulation?

  1. CCK
  2. 64QAM
  3. GFSK
  4. BPSK

Answer(s): C

Explanation:

option. Bluetooth and HomeRF are both FHSS technologies that use GFSK modulation technology in the 2.4 GHz ISM band.



When doing wireless LAN mathematical calculations, it is necessary to be able to convert which of the following?

  1. dBm to milliwatts.
  2. dBi to milliwatts
  3. dB to watts
  4. dBm to dBi

Answer(s): A

Explanation:

Milliwatt
When implementing wireless LANs, power levels as low as 1 milliwatt (1/1000 watt, abbreviated as "mW") can be used for a small area, and power levels on a single wireless LAN segment are rarely above 100 mW - enough to communicate up to a half mile in optimum conditions. Access points generally have the ability to radiate 30-100 mW of power, depending on the manufacturer. It is only in the case of point-to-point outdoor connections between buildings that power levels above 100 mW would be used. Most of thepower levels referred to by administrators will be in mW or dBm. These two units of measurement both represent an absolute amount of power and are both industry standard measurements.



Viewing Page 4 of 77



Share your comments for CWNP PW0-100 exam with other users:

NISHAD 11/7/2023 11:28:00 AM

how many questions are there in these dumps?
UNITED STATES


Pankaj 7/3/2023 3:57:00 AM

hi team, please upload this , i need it.
UNITED STATES


DN 9/4/2023 11:19:00 PM

question 14 - run terraform import: this is the recommended best practice for bringing manually created or destroyed resources under terraform management. you use terraform import to associate an existing resource with a terraform resource configuration. this ensures that terraform is aware of the resource, and you can subsequently manage it with terraform.
Anonymous


Zhiguang 8/19/2023 11:37:00 PM

please upload dump. thanks in advance.
Anonymous


deedee 12/23/2023 5:51:00 PM

great great
UNITED STATES


Asad Khan 11/1/2023 3:10:00 AM

answer 16 should be b your organizational policies require you to use virtual machines directly
Anonymous


Sale Danasabe 10/24/2023 5:21:00 PM

the question are kind of tricky of you didnt get the hnag on it.
Anonymous


Luis 11/16/2023 1:39:00 PM

can anyone tell me if this is for rhel8 or rhel9?
UNITED STATES


hik 1/19/2024 1:47:00 PM

good content
UNITED STATES


Blessious Phiri 8/15/2023 2:18:00 PM

pdb and cdb are critical to the database
Anonymous


Zuned 10/22/2023 4:39:00 AM

till 104 questions are free, lets see how it helps me in my exam today.
UNITED STATES


Muhammad Rawish Siddiqui 12/3/2023 12:11:00 PM

question # 56, answer is true not false.
SAUDI ARABIA


Amaresh Vashishtha 8/27/2023 1:33:00 AM

i would be requiring dumps to prepare for certification exam
Anonymous


Asad 9/8/2023 1:01:00 AM

very helpful
PAKISTAN


Blessious Phiri 8/13/2023 3:10:00 PM

control file is the heart of rman backup
Anonymous


Senthil 9/19/2023 5:47:00 AM

hi could you please upload the ibm c2090-543 dumps
Anonymous


Harry 6/27/2023 7:20:00 AM

appriciate if you could upload this again
AUSTRALIA


Anonymous 7/10/2023 4:10:00 AM

please upload the dump
SWEDEN


Raja 6/20/2023 5:30:00 AM

i found some questions answers mismatch with explanation answers. please properly update
UNITED STATES


Doora 11/30/2023 4:20:00 AM

nothing to mention
Anonymous


deally 1/19/2024 3:41:00 PM

knowable questions
UNITED STATES


Sonia 7/23/2023 4:03:00 PM

very helpfull
UNITED STATES


binEY 10/6/2023 5:15:00 AM

good questions
Anonymous


Neha 9/28/2023 1:58:00 PM

its helpful
Anonymous


Desmond 1/5/2023 9:11:00 PM

i just took my oracle exam and let me tell you, this exam dumps was a lifesaver! without them, iam not sure i would have passed. the questions were tricky and the answers were obscure, but the exam dumps had everything i needed. i would recommend to anyone looking to pass their oracle exams with flying colors (and a little bit of cheating) lol.
SINGAPORE


Davidson OZ 9/9/2023 6:37:00 PM

22. if you need to make sure that one computer in your hot-spot network can access the internet without hot-spot authentication, which menu allows you to do this? answer is ip binding and not wall garden. wall garden allows specified websites to be accessed with users authentication to the hotspot
Anonymous


381 9/2/2023 4:31:00 PM

is question 1 correct?
Anonymous


Laurent 10/6/2023 5:09:00 PM

good content
Anonymous


Sniper69 5/9/2022 11:04:00 PM

manged to pass the exam with this exam dumps.
UNITED STATES


Deepak 12/27/2023 2:37:00 AM

good questions
SINGAPORE


dba 9/23/2023 3:10:00 AM

can we please have the latest exam questions?
Anonymous


Prasad 9/29/2023 7:27:00 AM

please help with jn0-649 latest dumps
HONG KONG


GTI9982 7/31/2023 10:15:00 PM

please i need this dump. thanks
CANADA


Elton Riva 12/12/2023 8:20:00 PM

i have to take the aws certified developer - associate dva-c02 in the next few weeks and i wanted to know if the questions on your website are the same as the official exam.
Anonymous