Exam Code: PW0-105
Exam Name: Certified Wireless Network Administrator (CWNA)
As XYZ Company’s wireless specialist, you have been asked to troubleshoot some unexpected frame patterns in a wireless protocol capture. Your peers explain that the network’s beacon frames are inconsistent. That is, the BSSID is the same for all beacons, but the source address varies between three different addresses.
What network configuration would cause this beacon frame behavior?
A. A single AP supports multiple BSSs with different SSIDs
B. A virtual cell single channel network has been implemented
C. The beacons are from an IBSS instead of a BSS
D. Three APs still share the same default configuration.
In an 802.11n WLAN with a heterogeneous set of associated client devices including 802.11b, 11g, and 11n, what HT protection mode will the BSS use?
A. Mode 0: No protection mode (Greenfield)
B. Mode 1: Nonmember protection mode
C. Mode 2: 20 MHz protection mode
D. Mode 3: Non-HT mixed mode
Given: As you prepare for a site survey in a hospital, you have learned about several wireless devices that support connection-oriented, real-time applications. These applications are sensitive to service interruptions and require excellent signal quality, low latency, and low loss. For that reason, it is important to identify sources of RF interference as well as building characteristics that would cause RF blockage or dead spots.
What systems or environmental characteristics are most likely to cause interference or RF blockage and disrupt service for these applications? (Choose two)
A. Microwave ovens
B. Long hallways
C. Elevator shafts
D. RFID chokepoints
E. Drywall offices
What term correctly completes the following sentence?
In an IEEE 802.11 frame, the IP packet is considered by the MAC layer to be a(n) _________.
A. MAC Service Data Unit (MSDU)
B. MAC Protocol Data Unit (MPDU)
C. Bridge Protocol Data Unit (BPDU)
D. PLCP Service Data Unit (PSDU)
E. PLCP Protocol Data Unit (PPDU)
What factors are likely to cause the greatest impact on the application layer throughput of an 802.11n client station in a 2.4 GHz HT BSS? (Choose three)
A. Use of WEP or TKIP for encryption instead of CCMP
B. Use of passphrase authentication instead of 802.1X/EAP authentication
C. Increasing the beacon interval from 100 to 200 (TUs)
D. RF interference from more than 10 nearby Bluetooth transmitters
E. Increasing or decreasing the number of spatial streams in use by the client station and AP
F. Configuring the AP to perform off-channel IDS scans for rogue devices for 50 ms out of every 20 seconds
Given: Joe runs a small hotel, and as a value added service for his customers he has implemented a Wi-Fi hot-spot. Joe has read news articles about how hackers wait at hot-spots trying to take advantage of unsuspecting users. Joe wants to avoid this problem at his hotel.
What is an efficient and practical step that Joe can take to decrease the likelihood of active attacks on his customers’ wireless computers?
A. Implement Network Access Control (NAC) and require antivirus and firewall software along with OS patches
B. Require EAP-FAST authentication and provide customers with a username/password on their receipt
C. Implement an SSL VPN in the WLAN controller that initiates after HTTPS login
D. Enable station-to-station traffic blocking by the access points in the hotel
What factors will have the most significant affect on the amount of wireless bandwidth available to each station within a BSS? (Choose two)
A. The number of client stations associated to the BSS
B. The power management settings in the access point’s beacons
C. The presence of co-located (10m away) access points on non-overlapping channels
D. The data rates at which nearby client stations are transmitting and receiving data
E. The layer 3 protocol used by each station to transmit data over the wireless link
What features were introduced in the IEEE 802.11h amendment in order to uphold regulatory requirements for 5 GHz operation? (Choose two)
A. Automated Radio Measurement (ARM)
B. Distributed Coordination Function (DCF)
C. Frequency Shift Keying (FSK)
D. Transmit Power Control (TPC)
E. Radio Resource Management (RRM)
F. Dynamic Frequency Selection (DFS)
What statements about the SSID are true? (Choose two)
A. The SSID is a security session identifier used in RSNs.
B. The SSID must be included in an association request frame.
C. The SSID is an alphanumeric value assigned to device manufacturers by the IEEE.
D. The SSID is a pseudo-random number assigned to each client by an AP.
E. The SSID is an alphanumeric value with a maximum length of 32 octets.
F. When configuring a new network, creating an SSID is optional.
What statement about the IEEE 802.11e QoS facility is true?
A. 802.11 QoS is achieved by giving high priority queues a statistical advantage at winning contention.
B. Four 802.1p user priorities are mapped to eight 802.11 transmit queues.
C. When the Voice queue has frames awaiting transmission, no data will be transmitted from the Best
D. To improve efficiency, Block Acknowledgments are required for Voice and Video WMM queues.
E. 802.11 control frames are assigned to the 802.11 EF priority queue.
In an enterprise WLAN, what condition will prevent a dual-band HT client device from performing a fast and seamless transition (i.e. latency-sensitive applications are not disrupted) between two access points that are managed by the same WLAN controller?
A. The current AP is using channel 1 and the new AP is using channel 40.
B. The SSID of the current AP does not match the SSID of the new AP.
C. The current AP supports only ERP and the new AP is HT capable.
D. The access points are hiding the SSID in Beacons and Probe Response frames.
In addition to throughput enhancements, what other improvements does 802.11n provide when
compared with 802.11a/g? (Choose 2)
A. Introduces "fast transition" roaming protocols for VoWiFi phones
B. Better link reliability between 802.11a/b/g client devices and 802.11n APs
C. Improves service quality for real-time applications at greater distances
D. Increases in receive sensitivity enhance RTLS location accuracy
E. Stronger security with more robust encryption modes.
What statements about the beamwidth of an RF antenna are true? (Choose two)
A. The lower the gain of an antenna, the more narrow one or both beamwidths become.
B. The beamwidth patterns on an antenna polar chart indicate the point at which the RF signal stops
C. Horizontal and vertical beamwidth are calculated at the points in which the main lobe decreases
power by 3 dB.
D. Horizontal beamwidth is displayed (in degrees) on the antenna’s Azimuth Chart.
E. Antenna beamwidth is measured in units of decibels relative to an isotropic radiator (dBi).
When compared with legacy Power Save mode, how does WMM-PS improve voice device and application performance?
A. WMM-PS identifies and prioritizes incoming VoIP data and delivers it immediately
B. WMM-PS uses a trigger-and-delivery method that eliminates the need for PS-Poll exchanges
C. WMM-PS requires scheduled service periods for predictable uplink data delivery.
D. WMM-PS allows the WLAN transceiver to disable more components when in a low power state.
If you want to pass CWNP PW0-105 successfully, donot missing to read latest lead2pass CWNP PW0-105 exam questions.
If you can master all lead2pass questions you will able to pass 100% guaranteed.