Exam4Training

CWNP CWS-101 CWNP Certified Wireless Specialist (CWS) Online Training

Question #1

Which guidelines are recommended when performing a manual site survey? (Choose two.)

  • A . Walkthrough of location
  • B . Predictive analysis
  • C . Equipment purchase
  • D . Client device configuration
  • E . Spectrum analysis

Reveal Solution Hide Solution

Correct Answer: AE
Question #2

Which are relative measures of RF power? (Choose two.)

  • A . mW
  • B . dB
  • C . dBm
  • D . dBi
  • E . Watt

Reveal Solution Hide Solution

Correct Answer: BD
Question #3

Which layer of the OSI model allows physical addresses to be converted to logical addresses?

  • A . Application
  • B . Session
  • C . Transport
  • D . Network
  • E . Data Link

Reveal Solution Hide Solution

Correct Answer: D
Question #4

You have a switch supporting 802.3at and you must power an AP that is 40 meters from the switch.

What can be used to provide power to the AP?

  • A . Transmit Power Control (TCP)
  • B . Radio Resource Management (RRM)
  • C . Power over Ethernet (PoE)
  • D . Quality of Service (QoS)

Reveal Solution Hide Solution

Correct Answer: C
Question #5

The throughput of a wireless LAN can be affected by or _____.

  • A . Distance from access point, IP address
  • B . Distance from access point, MAC address
  • C . Distance from access point, output power of access point
  • D . Distance from access point, output power of client device

Reveal Solution Hide Solution

Correct Answer: C
Question #6

Which of the following MDM features allows for corporate and other applications to be distributed to mobile devices that connect to the corporate network?

  • A . Content update
  • B . Pushing content
  • C . Update server
  • D . Distributed edge

Reveal Solution Hide Solution

Correct Answer: B
Question #7

A tablet is a single stream client with one radio and one antenna.

What 802.11 features is definitely not supported on this device?

  • A . MIMO (Multiple-Input/Multiple-Output)
  • B . DRS (Dynamic Rate Switching)
  • C . Authentication
  • D . Association

Reveal Solution Hide Solution

Correct Answer: A
Question #8

Which network access method attempts to avoid collisions?

  • A . CSMA/CA
  • B . CSMA/CD
  • C . CSMA/CR
  • D . CSMA/DSSS

Reveal Solution Hide Solution

Correct Answer: A
Question #9

What is the maximum latency or delay requirement in milliseconds for many voice over IP (VoIP) devices?

  • A . 150 ms
  • B . 100 ms
  • C . 50 ms
  • D . 20 ms

Reveal Solution Hide Solution

Correct Answer: A
Question #10

A type of site survey that is software-based, requires minimum time on-site, and takes into consideration the attenuation value of materials such as the type of walls and doors is _____.

  • A . Active
  • B . Passive
  • C . Predictive
  • D . Optional

Reveal Solution Hide Solution

Correct Answer: C

Question #11

What technology may use a form of multilateration known as time difference of arrival (TDoA) to measure the difference in distance between two stations from known locations?

  • A . On-boarding
  • B . Geo-location
  • C . Off-boarding
  • D . Geo-fencing

Reveal Solution Hide Solution

Correct Answer: D
Question #12

When planning for a bridge link between locations, in addition to the link distance, what requirement should be known in order to determine the antennas, settings and bridges to use?

  • A . Required color
  • B . Required power sourcing method
  • C . Required throughput
  • D . Required cable length

Reveal Solution Hide Solution

Correct Answer: B
Question #13

You must ensure Power over Ethernet (PoE) is available for new AP installations.

What device can provide PoE power to the APs assuming it includes PoE support?

  • A . Link tester
  • B . Router
  • C . Switch
  • D . Ethernet coupler

Reveal Solution Hide Solution

Correct Answer: C
Question #14

The IEEE 802.11 association process happens after which phase?

  • A . Authentication
  • B . Distribution
  • C . Deauthentication
  • D . Reauthentication

Reveal Solution Hide Solution

Correct Answer: A
Question #15

Which one of the following is an example of a real-time communications application?

  • A . E-Mail
  • B . VoIP (Voice over IP)
  • C . Database access
  • D . FTP file transfer

Reveal Solution Hide Solution

Correct Answer: B
Question #16

Antennas provide an increase in RF coverage by using gain.

  • A . Active
  • B . Passive
  • C . Positive
  • D . Maximum

Reveal Solution Hide Solution

Correct Answer: B
Question #17

What is the term defining the number of times a cycle of an RF signal will oscillate in one second?

  • A . Phase
  • B . Frequency
  • C . Amplitude
  • D . Wavelength

Reveal Solution Hide Solution

Correct Answer: B
Question #18

An incorrect passphrase set on a client device will result in a different preshared key that is generated for a device using WPA 2.0 as a security solution.

What will be the result of a mismatched passphrase between the client device and an access point?

  • A . Association is established and terminated and no valid IP address
  • B . Invalid association and valid IP address
  • C . A deauthentication
  • D . A disassociation

Reveal Solution Hide Solution

Correct Answer: A
Question #19

Which wireless LAN technology can be used to obtain the highest data transfer rate possible?

  • A . DSSS
  • B . Ethernet
  • C . HT-OFDM
  • D . OFDM

Reveal Solution Hide Solution

Correct Answer: C
Question #20

What 802.11 PHY (Physical Layer) operates in 60 GHz?

  • A . HR/DSSS (802.11b)
  • B . HT (802.11n)
  • C . OFDM (802.11a)
  • D . DMG (802.11ad)

Reveal Solution Hide Solution

Correct Answer: D

Question #21

When a wireless LAN device listens for beacon frames, it is participating in which phase?

  • A . Power save
  • B . Passive scanning
  • C . Active scanning
  • D . Authentication

Reveal Solution Hide Solution

Correct Answer: B
Question #22

Which is a valid logical IP address?

  • A . 255.255.0.0
  • B . 192.168.200.1
  • C . AB.CD.EF12.34.56
  • D . 12.34.56.AB.CD.EF

Reveal Solution Hide Solution

Correct Answer: B
Question #23

What method defines the process of connecting a device to a wireless network for the first time and allowing a user to register their device in order to gain access to the company and other network resources?

  • A . Onboarding
  • B . Activation
  • C . Tethering
  • D . Security policy

Reveal Solution Hide Solution

Correct Answer: A
Question #24

Non-Wi-Fi interference for an 802.11g network can be caused by and _____. (Choose two.)

  • A . AM radios
  • B . Microwave ovens
  • C . 802.11b networks
  • D . Cordless phones
  • E . Radar systems
  • F . Digital TV systems

Reveal Solution Hide Solution

Correct Answer: BD
Question #25

When using a predictive modeling site survey approach, which of the following is true about manual verification?

  • A . Manual verification never has to be performed.
  • B . Manual verification is always required.
  • C . Manual verification should be performed only at the customer’s request.
  • D . Manual verification should be performed, but it is not required.

Reveal Solution Hide Solution

Correct Answer: D
Question #26

What type of wireless network device is PIN-based security most commonly used with?

  • A . SOHO brands that support WPA 2.0
  • B . Enterprise brands that support WPA 2.0
  • C . SOHO brands that support WPS
  • D . Enterprise brands that support WPS

Reveal Solution Hide Solution

Correct Answer: C
Question #27

Which of the following devices is an in-line device that will inject DC voltage into the Ethernet cable?

  • A . Midspan
  • B . Midpoint
  • C . Endspan
  • D . Endpoint

Reveal Solution Hide Solution

Correct Answer: A
Question #28

You are performing a protocol analysis in order to determine potential interference from other wireless LANs in the immediate area of the site survey.

You discover several wireless LANs that can potentially cause interference with the proposed installation.

Which technology in use would not have an impact on the 802.11g wireless network you are surveying for?

  • A . FHSS
  • B . OFDM
  • C . DSSS
  • D . ERP-OFDM
  • E . PBCC

Reveal Solution Hide Solution

Correct Answer: B
Question #29

DSSS uses which spreading code at 1 Mbps?

  • A . Barker
  • B . CCK
  • C . DBPSK
  • D . DQPSK

Reveal Solution Hide Solution

Correct Answer: A
Question #30

Which one of the following is an example of a multi-band device?

  • A . A laptop supporting only 802.11n in 2.4 GHz
  • B . A laptop supporting 802.11n, 802.11ac, and 802.11ad
  • C . A laptop supporting only 802.11n in 5GHz
  • D . A laptop supporting only 802.11a

Reveal Solution Hide Solution

Correct Answer: B

Question #31

Which security solution is mandatory for client devices in order to be considered Wi-Fi Protected Setup certified?

  • A . WEP
  • B . PIN
  • C . WPA
  • D . PBC
  • E . TKIP

Reveal Solution Hide Solution

Correct Answer: B
Question #32

What infrastructure software solution is often used to manage enterprise mobile devices?

  • A . VPN
  • B . MDM
  • C . BYOD
  • D . ESS

Reveal Solution Hide Solution

Correct Answer: C
Question #33

What process is used in 802.11 networks to provide confidentiality?

  • A . Redundancy
  • B . Encryption
  • C . Authentication
  • D . Accounting

Reveal Solution Hide Solution

Correct Answer: B
Question #34

An 802.11b channel is how wide in MHz?

  • A . 5 MHz
  • B . 22 MHz
  • C . 25 MHz
  • D . 30 MHz

Reveal Solution Hide Solution

Correct Answer: B
Question #35

The open system authentication process uses how many frames?

  • A . One
  • B . Two
  • C . Three
  • D . Four

Reveal Solution Hide Solution

Correct Answer: B
Question #36

A wireless client device is showing a low receive signal strength value.

What option could improve this situation?

  • A . Upgrade the client device
  • B . Add another access point
  • C . Upgrade firmware on devices
  • D . Eliminate multipath

Reveal Solution Hide Solution

Correct Answer: B
Question #37

What network service is used to provide automatic Internet Protocol configuration for network client devices?

  • A . DNS
  • B . DHCP
  • C . ARP
  • D . NTP

Reveal Solution Hide Solution

Correct Answer: B
Question #38

What technology is used to send WLAN data over a wireless medium using many subcarrier frequencies?

  • A . Wireless broadband
  • B . Narrowband
  • C . Spread-spectrum
  • D . Spectral masking
  • E . Wideband

Reveal Solution Hide Solution

Correct Answer: C
Question #39

A weakness with MAC address filtering is that it allows an intruder to _____.

  • A . Crack the encryption.
  • B . Spoof an address.
  • C . Cause an RF DoS attack.
  • D . Steal user authentication.

Reveal Solution Hide Solution

Correct Answer: B
Question #40

Layer 2 Tunneling Protocol commonly uses which encryption method?

  • A . IPSec
  • B . PPTP
  • C . AES
  • D . WEP
  • E . MPPE

Reveal Solution Hide Solution

Correct Answer: A

Question #41

When an AP is managed by connecting to it directly and it depends on no other device for operations, what kind of AP management system is in use?

  • A . Cloud-based
  • B . Autonomous
  • C . Controller-based
  • D . Wireless Network Management System (WNMS)

Reveal Solution Hide Solution

Correct Answer: B
Question #42

When performing a manual site survey, choose the best way to identify areas that lack RF coverage.

  • A . Mark them with tape so they can be located at a later time.
  • B . Use a camera to take a photograph and document it in the report.
  • C . Show the site manager the areas that lack coverage.
  • D . Document on the floor plans or blueprints.

Reveal Solution Hide Solution

Correct Answer: D
Question #43

Which layer of the OSI model uses physical addresses to deliver data to the destination?

  • A . Physical
  • B . Data Link
  • C . Network
  • D . Transport

Reveal Solution Hide Solution

Correct Answer: A
Question #44

The help desk for company XYZ received a call from a user who could not locate their company-issued smart phone device. The network administrator that was assigned to the trouble ticket is unable to remotely lock the device through the MDM software that is in use at the organization.

Which of the following would most likely cause this issue?

  • A . The user installed an app from a consumer store.
  • B . The user updated the operating system.
  • C . The user disabled the profile on the device.
  • D . The user assigned a static IP address.

Reveal Solution Hide Solution

Correct Answer: C
Question #45

How many data bits does serial communication transmit at a time?

  • A . 1
  • B . 3
  • C . 4
  • D . 8

Reveal Solution Hide Solution

Correct Answer: A
Question #46

The IEEE 802.1X standard identifies the authenticator as another term for the _____ in wireless networking.

  • A . Client device
  • B . Access point
  • C . RADIUS server
  • D . EAP server

Reveal Solution Hide Solution

Correct Answer: B
Question #47

The IP address of a network adapter is also known as which address?

  • A . MAC address
  • B . Logical address
  • C . Layer 4 address
  • D . Mesh address

Reveal Solution Hide Solution

Correct Answer: B
Question #48

What may occur when an RF wave encounters an object large in relation to the wavelength during propagation?

  • A . Reflection
  • B . Raising of frequency
  • C . Lowering of frequency
  • D . Increase in amplitude

Reveal Solution Hide Solution

Correct Answer: A
Question #49

An independent basic service set (IBSS) consists of how many access points?

  • A . 0
  • B . 1
  • C . 2
  • D . 4

Reveal Solution Hide Solution

Correct Answer: A
Question #50

When a device associates to an access point during a site survey, it is performing what type of survey?

  • A . Predictive
  • B . Active
  • C . Passive
  • D . Required

Reveal Solution Hide Solution

Correct Answer: B

Question #51

At which layer of the OSI model are bits compiled into frames?

  • A . Physical
  • B . Data Link
  • C . Network
  • D . Transport
  • E . Application

Reveal Solution Hide Solution

Correct Answer: B
Question #52

How many access points can be co-located without channel reuse in the same radio frequency area to maximize total system throughput while minimizing RF interference in an IEEE 802.11g network?

  • A . Two
  • B . Three
  • C . Four
  • D . Six

Reveal Solution Hide Solution

Correct Answer: B
Question #53

The device driver of a wireless network adapter card is _____.

  • A . Required
  • B . Optional
  • C . Used with security
  • D . Another name for SSID

Reveal Solution Hide Solution

Correct Answer: A
Question #54

Physical addresses on a network device are responsible for which of the following?

  • A . To identify the logical location on the network
  • B . To identify which device should receive the information
  • C . To identify the routing information on the network
  • D . To identify the protocol in use on the network

Reveal Solution Hide Solution

Correct Answer: B
Question #55

You are a network administrator and receive a call from a user stating that she cannot access the wireless LAN. The office contains 50 other users, and nobody else is complaining about the network.

What could be a potential problem that would keep this user from connecting to the access point?

  • A . The connection to the Internet has been terminated.
  • B . The access point needs to be upgraded.
  • C . Incorrect firmware was installed on the access point.
  • D . The wireless client device has a corrupt device driver.

Reveal Solution Hide Solution

Correct Answer: D
Question #56

Why would you need to know about neighbor 802.11 networks to create an effective WLAN implementation plan for a site?

  • A . To determine the vendor they have implemented
  • B . To determine the security solutions they have implemented
  • C . To ensure the use of the right version of 802.11
  • D . To determine the channels they are using

Reveal Solution Hide Solution

Correct Answer: D
Question #57

Enterprise access points may contain which of the following features? (Choose 3.)

  • A . WPA 2.0 support
  • B . RADIUS server
  • C . Static output power
  • D . Repeater mode
  • E . Power sourcing equipment

Reveal Solution Hide Solution

Correct Answer: ABD
Question #58

You support a wireless network for an office of five employees. The installation consists of one access point, three notebook computers, and two desktop computers.

The access point and computers in the office have wireless adapters that are Wi-Fi WPA 2.0 Certified. You want to use the highest level security possible without additional cost or administration.

Which of the following solutions would be best for this deployment? (Choose 2.)

  • A . WEP
  • B . WPA 2.0 personal
  • C . WPS
  • D . WMM
  • E . WPA 2.0 enterprise

Reveal Solution Hide Solution

Correct Answer: BC
Question #59

Most manufacturers recommend installing a wireless IEEE 802.11n USB adapter at what point?

  • A . When the computer is not powered on
  • B . When instructed by the setup utility
  • C . After calling technical support
  • D . Before starting the setup process

Reveal Solution Hide Solution

Correct Answer: B
Question #60

OFDM uses which communication channel width to exchange data?

  • A . 1 MHzCwide channel
  • B . 20 MHzCwide channel
  • C . 22 MHzCwide channel
  • D . 80 MHzCwide channel

Reveal Solution Hide Solution

Correct Answer: B

Question #61

Highly directional antennas are typically used for connectivity.

  • A . Short-range
  • B . Omnidirectional
  • C . Long-range
  • D . Dipole

Reveal Solution Hide Solution

Correct Answer: C
Question #62

Which layer of the OSI model provides an interface to the user?

  • A . Physical
  • B . Network
  • C . Transport
  • D . Application
  • E . Data Link
  • F . Presentation

Reveal Solution Hide Solution

Correct Answer: D
Question #63

IEEE 802.11a/b/g/n devices use what type of communication?

  • A . Half diplex
  • B . Full diplex
  • C . Half duplex
  • D . Full duplex

Reveal Solution Hide Solution

Correct Answer: C
Question #64

Which items describe a service set identifier (SSID)? (Choose two.)

  • A . 32 characters maximum
  • B . 64 characters maximum
  • C . Is case sensitive
  • D . Is not case sensitive

Reveal Solution Hide Solution

Correct Answer: AC
Question #65

A well-planned and executed mobile device security strategy will help to ensure that company policy is implemented and enforced as designed and intended with every technology deployment, regardless of the device platform that is used.

Which two of the following should be considered with regard to content distribution? (Choose two.)

  • A . Secure SSID
  • B . Access permissions
  • C . Data encryption
  • D . Location services
  • E . MAC filtering

Reveal Solution Hide Solution

Correct Answer: BC
Question #66

When RF passes or bends around an obstacle such as a building or column, the behavior is:

  • A . Reflection
  • B . Refraction
  • C . Scattering
  • D . Diffraction

Reveal Solution Hide Solution

Correct Answer: D
Question #67

You are a network consultant hired to perform a manual site survey for a small office building. The wireless network to be installed will use data and voice. For backward compatibility, the customer needs to support 2.4 GHz equipment.

To provide the highest quality of service for the voice application, you recommend that the received signal strength be a minimum of for a data rate of 54 mbps.

  • A . C20 dBm
  • B . C25 dBm
  • C . C67 dBm
  • D . C76 dBm

Reveal Solution Hide Solution

Correct Answer: C
Question #68

IEEE 802.11a uses which PHY technology?

  • A . ERP-OFDM
  • B . HR/DSSS
  • C . OFDM
  • D . FHSS

Reveal Solution Hide Solution

Correct Answer: C
Question #69

Stations (STA) operating in which two IEEE 802.11 amendments are interoperable?

  • A . 802.11 and 802.11a
  • B . 802.11a and 802.11b
  • C . 802.11a and 802.11g
  • D . 802.11b and 802.11g

Reveal Solution Hide Solution

Correct Answer: D
Question #70

Different types of mobile app stores are available based on what apps a user will need to download.

Which app store would be the best choice to download a custom-built app designed specifically for an organization?

  • A . Native mobile app store
  • B . Consumer mobile app store
  • C . Hybrid mobile app store
  • D . Enterprise mobile app store

Reveal Solution Hide Solution

Correct Answer: D

Question #71

IEEE 802.11g WLANs operate in what frequency range?

  • A . 900 MHz
  • B . 5.15-5.25 GHz
  • C . 5.25-5.35 GHz
  • D . 2.4-2.5 GHz

Reveal Solution Hide Solution

Correct Answer: D
Question #72

You are a technical support engineer and receive a call from a customer regarding a problem with their wireless network connection. The building has an ESS network with five 802.11g access points.

The customer claims that when they move from their office to a conference room using the 802.11g network they lose their connection and cannot connect to the access point in the conference room.

Which is the most likely cause for this user to lose their connection when they roam on the wireless network?

  • A . Different RF channel
  • B . Mismatched SSID
  • C . Different BSSID
  • D . Mismatched association

Reveal Solution Hide Solution

Correct Answer: B
Question #73

After the successful installation of an MDM solution, the administrator should ensure that all users of mobile devices agree to rules stated in which of the following documents?

  • A . EULA policy
  • B . Acceptable use policy
  • C . Content-filtering policy
  • D . Pilot test policy

Reveal Solution Hide Solution

Correct Answer: B
Question #74

How many channels are available for wireless LANs to use in the unlicensed UNII-1 band?

  • A . 2
  • B . 4
  • C . 6
  • D . 11

Reveal Solution Hide Solution

Correct Answer: B
Question #75

You need to perform a site survey for a small real estate office that currently has no wireless network.

Which factors must be considered as part of the site survey?

  • A . Spectrum analysis
  • B . Packet analysis
  • C . Environmental conditions
  • D . Correct antenna selection

Reveal Solution Hide Solution

Correct Answer: D
Question #76

A newly configured wireless intrusion prevention system will _____.

  • A . Require a network administrator to monitor for intrusions
  • B . Automatically monitor the network for potential attacks
  • C . Require an administrator to manually shut down a rogue access point
  • D . Automatically notify a network administrator regarding a firmware upgrade

Reveal Solution Hide Solution

Correct Answer: B
Question #77

An AP has two Ethernet wired networking ports. One (port 1) is labeled with a Power over Ethernet (PoE) indicator and the other (port 2) is not.

What is unique about port 1 when compared to port 2?

  • A . It can be used to transfer voice data
  • B . It can be used to transfer wireless data
  • C . It can be used to power the AP
  • D . It can be used to transfer wired data

Reveal Solution Hide Solution

Correct Answer: C
Question #78

An azimuth chart shows which RF radiation pattern?

  • A . Vertical
  • B . Horizontal
  • C . Positive
  • D . Negative

Reveal Solution Hide Solution

Correct Answer: B
Question #79

Horizontal beamwidth is to the earth’s surface.

  • A . Parallel
  • B . Perpendicular
  • C . Positive
  • D . Negative

Reveal Solution Hide Solution

Correct Answer: A
Question #80

Why is it considered a mistake to use 160 MHz channels in most 5 GHz frequency band enterprise deployments?

  • A . The available frequency space is insufficient for such an implementation
  • B . The data rates will be too high
  • C . The communication retry rates will decrease
  • D . The throughput will be too high

Reveal Solution Hide Solution

Correct Answer: A

Question #81

Which frequency ranges are used in an IEEE 802.11a-compliant wireless LAN? (Choose two.)

  • A . 900 MHz ISM range
  • B . 2.40 GHz ISM range
  • C . 5.25 GHz UNII range
  • D . 5.35 GHz UNII range

Reveal Solution Hide Solution

Correct Answer: CD
Question #82

Which of the following is a set of parameters or instructions that will provide a device with the ability to connect to a network and follow specific requirements or settings for the connected session?

  • A . Mobile device geo-location
  • B . Mobile device certificate
  • C . Mobile device profile
  • D . Mobile device EULA

Reveal Solution Hide Solution

Correct Answer: C
Question #83

When an RF signal bounces off a smooth nonabsorptive surface, the behavior is:

  • A . Refraction
  • B . Reflection
  • C . Scattering
  • D . Diffraction

Reveal Solution Hide Solution

Correct Answer: B
Question #84

In order for a wireless client to become completely part of the basic service set, it must first _____ and then _____

  • A . Associate, authenticate
  • B . Authenticate, associate
  • C . Deauthenticate, authenticate
  • D . Disassociate, authenticate

Reveal Solution Hide Solution

Correct Answer: B
Question #85

Which are absolute measures of RF power? (Choose two.)

  • A . Watt
  • B . dB
  • C . mW
  • D . dBi
  • E . dBd

Reveal Solution Hide Solution

Correct Answer: AC
Question #86

At which two layers of the OSI model does wireless LAN technology operate? (Choose two.)

  • A . Session
  • B . Network
  • C . Physical
  • D . Application
  • E . Data Link

Reveal Solution Hide Solution

Correct Answer: CE
Question #87

Which of the following describe the two main parts of a computer network security policy? (Choose two.)

  • A . General policy
  • B . OEM policy
  • C . Functional policy
  • D . Termination policy

Reveal Solution Hide Solution

Correct Answer: AC
Question #88

Weak or no signal at a wireless client device can be the result of _____.

  • A . Distance from an access point
  • B . Distance from other client devices
  • C . Distance from the wiring closet
  • D . Distance from Ethernet switch

Reveal Solution Hide Solution

Correct Answer: A
Question #89

A basic service set (BSS) consists of how many access points?

  • A . Zero
  • B . At least one
  • C . At least two
  • D . At least four

Reveal Solution Hide Solution

Correct Answer: B
Question #90

Access points work at which layers of the OSI model?

(Choose 2.)

  • A . Layer 1
  • B . Layer 2
  • C . Layer 3
  • D . Layer 4
  • E . Layer 5
  • F . Layer 6
  • G . Layer 7

Reveal Solution Hide Solution

Correct Answer: AB

Question #91

Wireless bridges must be configured with __________and __________. (Choose 2.)

  • A . A null SSID
  • B . The same SSID
  • C . The same RF channel
  • D . Channel scanning
  • E . Wired Equivalent Privacy

Reveal Solution Hide Solution

Correct Answer: BC
Question #92

Which one of the following is considered a data-intensive application?

  • A . Web Browsing
  • B . Cloud Storage
  • C . E-Mail
  • D . Voice over IP (VoIP)

Reveal Solution Hide Solution

Correct Answer: B
Question #93

Which data encryption/authentication method is identified in the original IEEE 802.11 standard?

  • A . TKIP
  • B . AES
  • C . CCMP
  • D . WEP
  • E . EAP

Reveal Solution Hide Solution

Correct Answer: D
Question #94

Without any regulatory domain taken into consideration, the 2.4 GHz frequency range allows for how many channels using 802.11b?

  • A . 3
  • B . 6
  • C . 11
  • D . 14

Reveal Solution Hide Solution

Correct Answer: D
Question #95

Which two of the following options are available for Wi-Fi Protected Access 2 (WPA 2.0)?

  • A . Personal mode
  • B . Protection mode
  • C . Professional mode
  • D . Enterprise mode
  • E . WPA 2 mode

Reveal Solution Hide Solution

Correct Answer: AD
Question #96

Which protocol is responsible for addressing and routing?

  • A . IP
  • B . TCP
  • C . UDP
  • D . ARP

Reveal Solution Hide Solution

Correct Answer: A
Question #97

Which item has an effect on RF line of sight?

  • A . Phase
  • B . Obstacles
  • C . Interference
  • D . Amplitude

Reveal Solution Hide Solution

Correct Answer: B
Question #98

You recently installed an IEEE 802.11g wireless network in a small office. One of the employees has been complaining of poor performance and mentioned her notebook computer runs very slowly because of the access point it connects to.

What could cause this notebook computer to be performing poorly?

  • A . The new 5.8 GHz cordless telephone in her office is interfering with the IEEE 802.11g wireless LAN.
  • B . The access point is located at the opposite side of the building from the user’s office separated by several walls.
  • C . A media access control (MAC) filter is enabled on the notebook computer, causing excessive retries.
  • D . You recently rolled out a new version of the access point’s firmware to enable new features that became available.

Reveal Solution Hide Solution

Correct Answer: B
Question #99

Which one of the following is a non-deprecated security solution in the 802.11 standard?

  • A . AES (Advanced Encryption Standard)
  • B . WEP (Wired Equivalent Privacy)
  • C . RC4 (Rivest Cipher 4)
  • D . TKIP (Temporal Key Integrity Protocol)

Reveal Solution Hide Solution

Correct Answer: A
Question #100

The physical address of a network adapter is the _____.

  • A . MAC address
  • B . Logical address
  • C . Layer 3 address
  • D . Mesh address

Reveal Solution Hide Solution

Correct Answer: A
Exit mobile version