Don’t settle for sideline cert24 CWNA PW0-105 CWNP PW0-204 Practice Exam Questions and Answers or the shortcut using CWNA PW0-105 CWNP PW0-204 cheats. Prepare for your tests like a professional using the same PW0-105 PW0-204 online training that thousands of others have used with Actual Tests PW0-105 PW0-204 practice exams.
PW0-105 Certified Wireless Network Administrator (CWNA)
QUESTION NO: 1
Given: Your consulting firm has recently been hired to complete a site survey for ABC Company.
Your engineers use predictive modeling software for surveying, but ABC Company insists on a pre-deployment site visit.
What tasks should be performed as part of the pre-deployment visit to prepare for a predictive survey? (Choose two)
A. With a spectrum analyzer, identify the type, amplitude, and location of RF interference sources, if any are present.
B. Evaluate the building materials at ABC’s facility and confirm that the floor plan documents are consistent with the actual building.
C. Validate that the AP transmit power and antenna type is identical for each AP in ABC’s existing deployment.
D. Collect information about ABC Company’s security requirements and the current configuration of their RADIUS and user database servers.
E. Simultaneously capture and analyze data on each 802.11 channel to establish a baseline for potential network capacity and throughput.
Answer: A,B
QUESTION NO: 2
What 802.11n technologies require MIMO support on both the transmitter and receiver? (Choose 2)
A. Spatial multiplexing
B. Transmit beamforming
C. Maximal ratio combining
D. Space-time block coding
E. Cyclic shift diversity
F. Short guard intervals
Answer: A,D
QUESTION NO: 3
What statement describes the authorization component of a AAA implementation?
A. Verifying that a user is who he says he is
B. Validating client device credentials against a database
C. Logging the details of user network behavior in order to review it at a later time
D. Granting access to specific network services according to a user profile
E. Implementing a WIPS as a full-time monitoring solution to enforce policies
Answer: D
QUESTION NO: 4
What facts are true regarding controllers and APs in a Split MAC architecture? (Choose 2)
A. An IP tunnel is established between the AP and controller for AP management and control functions.
B. Using centralized data forwarding, APs never tag Ethernet frames with VLAN identifiers or 802.1p CoS.
C. With 802.1X/EAP security, the AP acts as the supplicant and the controller acts as the
authenticator.
D. Management and data frame types must be processed locally by the AP, while control frame types must be sent to the controller.
E. In a distributed (local bridging) data forwarding model, the AP handles frame encryption and decryption.
Answer: A,E
PW0-204 Certified Wireless Security Professional (CWSP)
QUESTION NO: 1
In an effort to optimize WLAN performance ABC Company has already upgraded their infrastructure from 802 11b/gto802 11n. ABC has always been highly security conscious but they are concerned with security threats introduced by incompatibilities between 802.11n and 802.11a/g in the past.ABC has performed manual and automated scans with products that were originally designed for use in 802 11a/g networks.Including laptop-based spectrum and protocol analyzers as well as an overlay 802 11a/g WIPS solution.ABC has sought your input to understand and respond to potential security threats.
In ABC’s network environment, what type of devices would be capable of identifying rouge APs that use HT Greenfield 40 MHZ channels? (Choose 3)
A. 802.11n WPS sensor with a single 2×2 radio
B. The company’s current laptop-based protocol analysis tools
C. WIPS solution that is integrated in the company’s AP infrastructure
D. The company’s current overlay WIPS solution
E. The company’s current laptop-based spectrum analysis tools
Answer: A,B,C
QUESTION NO: 2
Given:A new Access point is connected to an authorized network segment and is detected
wirelessly by a WIPS.
By what method does the WIPS apply a security classification to newly discovered AP?
A. According to the location service profile
B. According to the SNMP MIB table
C. According to the RADIUS rectum attribute
D. According to the site survey template
E. According to the default security policy
Answer: B
QUESTION NO: 3
What elements should be addressed by a WLAN security policy? (Choose 2)
A. Verification that administrative passwords are unique to each infrastructure device
B. Enabling encryption to prevent MAC addresses from being sent in clear text
C. Security policy details should be safeguarded from non IT employees to prevent vulnerability exposure
D. End user training for password selection and acceptable network use
E. Social engineering recognition and mitigation technique.
Answer: D,E