CWNP PW0-100 Wireless LAN Administration, Certified Wireless Network Administrator (CWNA) PW0-100 Exam Questions in PDF

Free CWNP PW0-100 Dumps Questions (page: 5)

WEP keys are also known by what more generic name?

  1. Certificates
  2. Secure Tokens
  3. Shared Secrets
  4. SecureIDs

Answer(s): C

Explanation:

Shared secrets are strings of numbers or text that are commonly referred to as the WEP key. Certificates are another method of user identification used with wireless networks. Just as with WEP keys, certificates (which are authentication documents) are placed on



When considering erecting an outside antenna for use with a 2.4 GHz wireless LAN, which things are considered as you perform the site survey? (Choose two)

  1. Is the weather in this area volatile?
  2. Are there any FM radio stations nearby?
  3. Are telephone lines located in this area?
  4. Is there a possibility of future obstructions?

Answer(s): A,D



Insertion loss on wireless LAN splitters is measured in?

  1. db
  2. dBi
  3. dBm
  4. milliwatts

Answer(s): A

Explanation:

The insertion loss should be significantly low (perhaps around 0.1 dB) so as not to cause high RF signal amplitude loss as the signal passes through the arrestor. Low insertion loss (loss incurred by just introducing the item into the circuit) is necessary because simply putting the splitter in the RF circuit can cause a significant RF signal amplitude decrease. Insertion loss of 0.5 dB or less is considered good for an RF splitter.



The FCC determines which of the following in the United States? (Choose all that apply)

  1. RF Output power limits.
  2. Appropriate RF Frequency band use.
  3. IEEE standards.
  4. Licensing of frequency bands.
  5. Interoperability of license-free RF products
  6. Licensing fee for end-user use of ISM bands

Answer(s): A,B,D



Which weather conditions can cause damage to an outdoor spread spectrum wireless LAN? (Choose all that apply)

  1. Lightning
  2. Wind
  3. Rain
  4. Snow

Answer(s): A,B

Explanation:

Severely adverse weather conditions can affect the performance of a wireless LAN. In general, common weather occurrences like rain, hail, snow, or fog do not have an adverse affect on wireless LANs. However, extreme occurrences of wind, fog, and perhaps smog can cause degradation or even downtime of your wireless LAN. A radomecan be used to protect an antenna from the elements.
Wind
Wind does not affect radio waves or an RF signal, but it can affect the positioning of outdoor antennas. For example, consider a wireless point-to-point link that connects two buildings that are 12 miles apart. Taking into account the curvature of the Earth (Earth bulge), and having only a five-degree vertical and horizontal beam width on each antenna, the positioning of each antenna would have to be exact. A strong wind could Lightning can affect wireless LANs in two ways. First, lightning can strike either a wireless LAN component such as an antenna or it may strike a nearby object. Lightning strikes of nearby objects can damage your wireless LAN components as if these components are not protected by a lightning arrestor. A second way that lightning affects wireless LANs is by charging the air through which the RF waves must travel after striking an object lying between the transmitter and receiver. twoantennas. This effect is called "antenna wind loading",



Which of these are known methods of attacking a wireless LAN? (Choose two)

  1. Broadcast Monitoring.
  2. Rouge Access Points.
  3. Passive Probes.
  4. Excessive use of RTS/CTS protocol.

Answer(s): B,C

Explanation:

- method by which stations broadcast a probe frame, and all access points within range respond with a probe response frame; Similar to passive scanning, the station will keep track of the probe responses and make a decision on which access point to authenticate and associate with based on the probe responses having the strongest signal level



If two DSS access points are placed on the same channel in the same physical space, which of the following will take place?

  1. The available bandwidth to users will increase.
  2. The available bandwidth to users will decrease.
  3. The access points will interfere with each other.
  4. Users will be able to roam between the two access points.

Answer(s): C

Explanation:

One option, which is the easiest, is to use channels 1 and 11 with only 2 access points, as illustrated in Figure 9.11. Using only these two channels will ensure that you have no overlap between channels regardless of proximity between systems, and therefore, no detrimental effect on the throughput of each access point. By way of comparison, two access points operating at the maximum capacity of 5.5 Mbps (about the best that you can expect by any access point), give you a total capacity of 11 Mbps of aggregate throughput, whereas three access points operating at approximately 4 Mbps each (degraded from the maximum due to actual channel overlap) on average yields only 12 Mbps of aggregate throughput. For an additional 1 Mbps of throughput, an administrator would have to spend the extra money to buy another access point, the time and labor to install it, and the continued burden of managing it.



Where can MAC filters be implemented on a wireless LAN? (Choose all that apply) A.
Access Points

  1. WLAN USB client
  2. RADIUS servers
  3. WLAN SNMP agent
  4. Personal firewall software

Answer(s): A,C

Explanation:

A//
Wireless LANs can filter based on the MAC addresses of client stations. Almost all access points (even very inexpensive ones) have MAC filter functionality. The network administratorcan compile, distribute, and maintain a list of allowable MAC addresses andprogram them into each access point.If a PC card or other client with a MAC address that is not in the access point's MAC filter list tries to gain access to the wireless LAN, the MAC address filter functionality will not allow that client to associate with that access point.
Ref for C//Of course, programming every wireless client's MAC address into every access point across a large enterprise network would be impractical. MAC filters can be implemented onsome RADIUS servers instead of in each access point. This configuration makes MAC filters a much more scalable security solution. Simply entering each MAC address into RADIUS along with user identity information, which would have to be input anyway, is a good solution. RADIUS servers often point to another authentication source, so that other authentication source would need to support MAC filters.



Share your comments for CWNP PW0-100 exam with other users:

N
Not Robot
5/14/2023 5:33:00 PM

are these comments real

K
kriah
9/4/2023 10:44:00 PM

please upload the latest dumps

E
ed
12/17/2023 1:41:00 PM

a company runs its workloads on premises. the company wants to forecast the cost of running a large application on aws. which aws service or tool can the company use to obtain this information? pricing calculator ... the aws pricing calculator is primarily used for estimating future costs

M
Muru
12/29/2023 10:23:00 AM

looks interesting

T
Tech Lady
10/17/2023 12:36:00 PM

thanks! that’s amazing

M
Mike
8/20/2023 5:12:00 PM

the exam dumps are helping me get a solid foundation on the practical techniques and practices needed to be successful in the auditing world.

N
Nobody
9/18/2023 6:35:00 PM

q 14 should be dmz sever1 and notepad.exe why does note pad have a 443 connection

M
Muhammad Rawish Siddiqui
12/4/2023 12:17:00 PM

question # 108, correct answers are business growth and risk reduction.

E
Emmah
7/29/2023 9:59:00 AM

are these valid chfi questions

M
Mort
10/19/2023 7:09:00 PM

question: 162 should be dlp (b)

E
Eknath
10/4/2023 1:21:00 AM

good exam questions

N
Nizam
6/16/2023 7:29:00 AM

I have to say this is really close to real exam. Passed my exam with this.

P
poran
11/20/2023 4:43:00 AM

good analytics question

A
Antony
11/23/2023 11:36:00 AM

this looks accurate

E
Ethan
8/23/2023 12:52:00 AM

question 46, the answer should be data "virtualization" (not visualization).

N
nSiva
9/22/2023 5:58:00 AM

its useful.

R
Ranveer
7/26/2023 7:26:00 PM

Pass this exam 3 days ago. The PDF version and the Xengine App is quite useful.

S
Sanjay
8/15/2023 10:22:00 AM

informative for me.

T
Tom
12/12/2023 8:53:00 PM

question 134s answer shoule be "dlp"

A
Alex
11/7/2023 11:02:00 AM

in 72 the answer must be [sys_user_has_role] table.

F
Finn
5/4/2023 10:21:00 PM

i appreciated the mix of multiple-choice and short answer questions. i passed my exam this morning.

A
AJ
7/13/2023 8:33:00 AM

great to find this website, thanks

C
Curtis Nakawaki
6/29/2023 9:11:00 PM

examination questions seem to be relevant.

U
Umashankar Sharma
10/22/2023 9:39:00 AM

planning to take psm test

E
ED SHAW
7/31/2023 10:34:00 AM

please allow to download

A
AD
7/22/2023 11:29:00 AM

please provide dumps

A
Ayyjayy
11/6/2023 7:29:00 AM

is the answer to question 15 correct ? i feel like the answer should be b

B
Blessious Phiri
8/12/2023 11:56:00 AM

its getting more technical

J
Jeanine J
7/11/2023 3:04:00 PM

i think these questions are what i need.

A
Aderonke
10/23/2023 2:13:00 PM

helpful assessment

T
Tom
1/5/2024 2:32:00 AM

i am confused about the answers to the questions. do you know if the answers are correct?

V
Vinit N.
8/28/2023 2:33:00 AM

hi, please make the dumps available for my upcoming examination.

S
Sanyog Deshpande
9/14/2023 7:05:00 AM

good practice

T
Tyron
9/8/2023 12:12:00 AM

so far it is really informative

AI Tutor 👋 I’m here to help!