Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us

 Home

 Search

Latest Brain Dumps

 BrainDump List

 Certifications Dumps

 Microsoft

 CompTIA

 Oracle

  Cisco
  CIW
  Novell
  Linux
  Sun
  Certs Notes
  How-Tos & Practices 
  Free Online Demos
  Free Online Quizzes
  Free Study Guides
  Free Online Sims
  Material Submission
  Test Vouchers
  Users Submissions
  Site Links
  Submit Site

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Online Training Demos and Learning Tutorials for Windows XP, 2000, 2003.

 

 

 

 





Braindumps for "PW0-105" Exam

Certified Wireless Network Administrator (CWNA)

 Question 1.
Given: Your consulting firm has recently been hired to complete a site survey for ABC Company. Your engineers use predictive modeling software for surveying, but ABC Company insists on a pre-deployment site visit. 

What tasks should be performed as part of the pre-deployment visit to prepare for a predictive survey? (Choose two)

A. With a spectrum analyzer, identify the type, amplitude, and location of RF interference sources, if any are present.
B. Evaluate the building materials at ABC's facility and confirm that the floor plan documents are consistent with the actual building.
C. Validate that the AP transmit power and antenna type is identical for each AP in ABC's existing deployment.
D. Collect information about ABC Company's security requirements and the current configuration of their RADIUS and user database servers.
E. Simultaneously capture and analyze data on each 802.11 channel to establish a baseline for potential network capacity and throughput.

Answer: A, B

Explanation:

Question 2.
What 802.11n technologies require MIMO support on both the transmitter and receiver? (Choose 2)

A. Spatial multiplexing
B. Transmit beamforming
C. Maximal ratio combining
D. Space-time block coding
E. Cyclic shift diversity
F. Short guard intervals

Answer: A, D

Explanation:

Question 3.
What statement describes the authorization component of a AAA implementation?

A. Verifying that a user is who he says he is
B. Validating client device credentials against a database
C. Logging the details of user network behavior in order to review it at a later time
D. Granting access to specific network services according to a user profile
E. Implementing a WIPS as a full-time monitoring solution to enforce policies

Answer: D

Explanation:

Question 4.
What facts are true regarding controllers and APs in a Split MAC architecture? (Choose 2) 

A. An IP tunnel is established between the AP and controller for AP management and control  functions.
B. Using centralized data forwarding, APs never tag Ethernet frames with VLAN identifiers or 802.1p CoS.
C. With 802.1X/EAP security, the AP acts as the supplicant and the controller acts as the authenticator.
D. Management and data frame types must be processed locally by the AP, while control frame types must be sent to the controller.
E. In a distributed (local bridging) data forwarding model, the AP handles frame encryption and decryption.

Answer: A, E

Explanation:

Question 5.
What feature(s) are most likely to be supported by 802.11 enterprise-class WLAN controllers? (Choose 4)

A. Link aggregation / port trunking
B. 802.1p and DSCP QoS
C. BGP and Frame Relay
D. Captive web portals
E. IGMP snooping

Answer: A, B, D, E

Explanation:

Question 6.
Given: You are the network administrator for ABC Company. Your manager has recently attended a wireless security seminar. The seminar speaker taught that a wireless network could be hidden from potential intruders if you disabled the broadcasting of the SSID in Beacons and configured the access points not to respond to Probe Request frames that have a null SSID field. Your manager suggests implementing these security practices. 

What response should you give to this suggestion? (Choose two)

A. Any 802.11 protocol analyzer can see the SSID in clear text in frames other than Beacons and Probe Response frames. This negates any security benefit of trying to hide the SSID in Beacons and Probe Response frames.
B. This security practice prevents manufacturers' client utilities from detecting the SSID. As a result, the SSID cannot be obtained by attackers, except through social engineering, guessing, or use of a WIPS.
C. Although it does not benefit the security posture, hiding the SSID in Beacons and Probe Response frames can be helpful for preventing some users (such as guests) from attempting To connect to the corporate network.
D. Any tenants in the same building using advanced penetration testing tools will be able to obtain the SSID by exploiting WPA EAPOL-Key exchanges. This poses an additional risk of exposing the WPA key.
E. To improve security by hiding the SSID, the AP and client stations must both be configured to remove the SSID from association request and response frames. Most WLAN products support this.

Answer: A, C

Explanation:

Question 7.
What component of the 802.11 standard allows stations to reserve access to the RF medium for a specified period of time?

A. Long slot times
B. DTIM Interval
C. Listen Interval
D. Probe Request frames
E. RTS or CTS frames

Answer: E

Explanation:

Question 8.
Given:
Network users and IT personnel at a large machinery manufacturer have been discussing the potential uses and benefits of implementing an indoor WLAN. The network administrator and network manager have requested a meeting of senior management personnel to discuss a WLAN implementation before taking any site survey or implementation steps. The first order of discussion in the meeting is corporate policy concerning implementation and use of WLAN technology.

What specific topics are appropriate in this policy meeting? (Choose two)

A. Vendor hardware recommendations
B. Business justification
C. User productivity impact
D. Antenna types
E. Obtaining permits and zoning requirements

Answer: B, C

Explanation:

Question 9.
In a long-distance RF link, what statement about Fade Margin is true?

A. Fade Margin is an additional pad of signal strength designed into the RF system to 
    compensate for unpredictable signal fading.
B. The Fade Margin of a long-distance radio link should be equivalent to the receiver's antenna gain.
C. A Fade Margin is unnecessary on a long-distance RF link if more than 80% of the first Fresnel zone is clear of obstructions.
D. The Fade Margin is a measurement of signal loss through free space, and is a function of frequency and distance.

Answer: A

Explanation:

Question 10.
What statement best describes the manual RF site survey report?

A. It is a series of notes taken during the interview with the network manager and given to the site survey project manager.
B. It is a one-page network inspection summary used to create a certificate of network compliance.
C. It contains the results from the RF coverage, capacity, and interference analysis.
D. It is an internal document used by the site surveying firm for network deployment, and is not usually shown to the client.
E. It states the customer requirements, business justification, and a detailed budget for the WLAN.

Answer: C

Explanation:


Google
 
Web www.certsbraindumps.com


Study Guides and Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA





              Privacy Policy                   Disclaimer                    Feedback                    Term & Conditions

www.helpline4IT.com

ITCertKeys.com

Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.