최신 CWNP Wireless LAN Certifications PW0-205 무료샘플문제:
1. Which of the following must be true before an 802.11 station may transmit a frame on the RF medium using DCF mode?
A) A time period of at least PIFS must have passed.
B) The Network Allocation Vector must be equal to zero.
C) The Backoff Timer must be equal to zero.
D) The station must have received a PS-Poll frame from the access point.
E) A time period of at least DIFS must have passed.
F) All collision arbitration must be completed on the RF medium.
2. What, if any, compatibility problems might arise if an 802.11b client station wireless network interface card (NIC) configured for use in Europe is used with an 802.11b access point configured for use in the United States?
A) The NIC would not see the access point at all because European 802.11b radios use HyperChannel encoding at the physical layer.
B) The station NIC might not be able to talk to the access point because Europe and the
C) No compatibility problems would arise because the wireless NIC is capable of operating on any channel specified by the 802.11b access point.
D) S. use different channel sets.
E) No compatibility problems would occur because the physical layer of the 802.11b standard is the same world-wide.
3. ABC Corp has just installed a single 802.11b access point into their medium-sized office environment. As the wireless LAN administrator at ABC Corp, you use a wireless protocol analyzer to troubleshoot the problem. You place your analyzer close to the access point, and capture some traffic from office users. Given the screenshot shown, which of the following statements offer the best explanation for the poor wireless LAN performance of ABC's new 802.11b wireless LAN?
A) Due to an 802.11g client joining the BSS, protection mechanisms have been enabled in the BSS by the access point. These protection mechanisms greatly increase protocol overhead, thereby decreasing overall wireless LAN throughput.
B) One of the wireless LAN users has moved far enough away from the access point that his client station has begun transmitting frames at the minimum supported data rate. Even when a single user uses this rate for Data frames, throughput for the entire wireless LAN as a whole is slowed significantly.
C) There is likely a source of RF interference somewhere around the access point. This is causing many data frames to be retransmitted, so overall wireless LAN throughput has been greatly diminished.
D) A nearby 802.11b access point is operating on an adjacent channel causing a significant amount of corrupt frames within ABC's BSS. These corrupt frame fragments are congesting the channel on which ABC's wireless LAN is operating, thereby decreasing its throughput.
4. Bill works at ABC Company help desk. Around lunch time, Bill gets a call asking for the password of network user Shazaam. Bill gives the caller some erroneous information about user Shazaam, and immediately contacts ABC Company security department about a social engineering attack. Bill is trained to recognize Shazaam as a red alert, but how does Bill know that a social engineering attack is in progress?
A) ABC Company uses 802.1X/EAP-TTLS as their wireless security protocol for user authentication, and EAP-TTLS uses an "anonymous" user name outside the TLS tunnel. In this case, the anonymous user is named Shazaam, and it can be seen in clear text on a wireless protocol analyzer.
B) ABC Company uses FakeAP as a protection mechanism against hackers. FakeAP is a utility that transmits thousands of fake management frames that can confuse hackers.
Shazaam has been configured as a fake user name in these management frames and can be seen on a wireless protocol analyzer.
C) ABC Company uses IPSec VPNs to secure their wireless LAN. IPSec VPNs use an
"anonymous" name field during the authentication process when using digital certificates.
The network administrator has configured all wireless client stations to use Shazaam in the anonymous name field so that wireless protocol analyzers will mistakenly think it is a real user name.
D) ABC Company uses 802.1x/PEAP-EAP-TLS as their wireless security protocol for user authentication, and PEAP has a programmable integrated intrusion detection mechanism currently named Shazaam. This intrusion mechanism is picked up, in clear text, on wireless protocol analyzers as a user name.
5. What is an advantage of being able to fragment MSDUs and MMPDUs on a wireless network?
A) Increased throughput in an 802.11b/g mixed mode environment.
B) Decreased translation time between 802.3 and 802.11 networks at the access point.
C) Increased throughput due to interference from other 802.11 stations.
D) Decreased retransmission overhead in a noisy RF environment.
E) Increased throughput in a clean RF environment
F) Decreased number of 802.11 control and management frames required for transmission.
질문과 대답:
질문 # 1 정답: B,C,E | 질문 # 2 정답: C | 질문 # 3 정답: B | 질문 # 4 정답: A | 질문 # 5 정답: D |