PW0-300 CWNA Wireless LAN Expert

PW0-300 CWNA Wireless LAN Expert

http://www.TwPass.com

PW0-300

CWNA

Wireless LAN Expert

http://www.twpass.com/twpass.com/exam.aspx?eCode= PW0-300

The PW0-300 practice exam is written and formatted by Certified Senior IT Professionals working in today's prospering companies and data centers all over the world! The PW0-300 Practice Test covers all the exam topics and objectives and will prepare you for success quickly and efficiently.

The PW0-300 exam is very challenging, but with our PW0-300 questions and answers practice exam, you can feel confident in obtaining your success on the PW0-300 exam on your FIRST TRY!

CWNA PW0-300 Exam Features

- Detailed questions and answers for PW0-300 exam

- Try a demo before buying any CWNA exam

- PW0-300 questions and answers, updated regularly

- Verified PW0-300 answers by Experts and bear almost 100% accuracy

- PW0-300 tested and verified before publishing

- PW0-300 exam questions with exhibits

- PW0-300 same questions as real exam with multiple choice options

Acquiring CWNA certifications are becoming a huge task in the field of I.T. More over these exams like PW0-300 exam are now continuously updating and accepting this challenge is itself a task.

This PW0-300 test is an important part of CWNA certifications. We have the resources to prepare you for this. The PW0-300 exam is essential and core part of CWNA certifications and once you clear the exam you will be able to solve the real life problems yourself.Want to take advantage of the Real PW0-300 Test and save time and money while developing your skills to pass

your CWNA PW0-300 Exam? Let us help you climb that ladder of success and pass your PW0-300 now!

PW0-300

QUESTION:

1

In a Split MAC wireless network architecture, lightweight APs map user priorities (UPs) specified by the QoS STA on incoming frames to ___________.

A. IEEE 802.1D Frame Precedence Values

B. GRE Priority Bits

C. IEEE 802.1Q Tag Protocol Identifiers

D. IP Differentiated Services Code Points

E. QoS Control Header Values

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=PW0-300&qno=1

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

2

Given: An ingress frame arrives on the Ethernet port of an autonomous AP marked with an

IEEE 802.1D user priority value. Which IEEE 802.1D user priority values (by name) will assure the data payload carried by the Ethernet frame gets assigned to the highest priority

WMM queue?

A. Controlled Load

B. Network Control

C. Video

D. Voice

E. Best Effort

F. Excellent Effort

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=PW0-300&qno=2

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

3

Given: When the delayed Block Ack policy is us ed between two QoS STAs, the recipient must respond to a BlockAckReq frame with an ACK fr ame. The recipient must then send its

BlockAck response frame in a subsequently obtained TXOP. Once the contents of the

BlockAck fram e have been prepared, the recipient must _______________.

A. Send the BlockAck response frame to the orig inator in the earliest possible TXOP using the highest priority A

C.

B. Send an ATIM to the originator signifying t hat the BlockAck response frame is ready for transmission.

C. Include the TID of the BlockAckReq in the next TXOP Request to the H

C.

D. Wait for one PIFS after the next Beacon and tran smit the BlockAck response to the originator using the same AC as the BlockAckReq frame.

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=PW0-300&qno=3

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

4

A QoS STA obtains a TXOP for an access category (AC) after what two parameters are met?

A. After a scheduled service period ends

B. The medium is idle at the AIFS[AC] slot boundary

C. The backoff time for that AC has expired

D. After a Block ACK Response

E. After a Target Beacon Transmission Time (TBTT)

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=PW0-300&qno=4

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

5

When using a protocol analyzer to capture conv ersations over a WLAN, you may often encounter encrypted data frames. Most WLAN protocol analyze rs have a feature that allows the analyst to save and reload the captured frames into memory at a later time. Using this functionality, what task can be performed?

A. When IEEE 802.1X/LEAP is being used as the WL AN security mechanism , the authentication response frame can be replayed from a saved tr ace file at a later time to successfully authenticate a hacker.

B. If a user name and passwo rd for an IEEE 802.1X/EAP-TTLS se curity implementation can be obtained through social engineering tactics, the user name and password can be entered into the analyzer to decrypt the frames from a saved trace file.

C. An analyst can search through the captured frames looking for RADIUS frames that will disclose the user s password.

D. Encrypted frames may be decrypted offline, a fter they are captured, by entering a

WEP key or WPA passphrase into the analyzer.

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=PW0-300&qno=5

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

6

How long, in microseconds, is the required Slot Ti me announced by an AP in an ERP BSS when both HR-DSSS and ERP-OFDM client stat ions are associated to the AP?

A. 2

B. 4

C. 9

D. 10

E. 20

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=PW0-300&qno=6

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

7

The IEEE 802.11 standard allows fo r frame fragmentation. Which tw o fields in the IEEE

802.11 frame are involved in numbering data frame fragme nts and notifying the receiving station when all of the fragments of a data frame have been received?

A. Capability Information field

B. Frame Control field

C. ERP Information field

D. Sequence Control field

E. DS Parameter field

F. Ordered Service field

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=PW0-300&qno=7

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

8

According to the IEEE 802.11 st andard (as amended), tr ansmit power inform ation is carried in which frames?

A. TPC Report frame

B. ADDTS Response frame

C. Probe Response frame

D. Beacon frame

E. Channel Switch Announcement frame

F. Measurement Report frame Given: ABC Company has implemented a QoS capable IEEE 802.11 WLAN controller based network with lightweight access po ints as shown in the graphic. What is the advantage of the access point mappin g IEEE

802.11 user priority (UP) values to DSCP values in the IP header that encapsulates the

802.11 frame? A. Direct mapping of UP-to-DSCP values in creases effective throughput between the access point and WLAN controller.

B. Since UP-to-802.1Q PCP mappings are not po ssible at the access point, the only method of prioritizing upstream data is through UP-to-DSCP mappings.

C. The QoS markings will survive layer 2 hops that could remove 802.1Q PCP values.

D. UP-to-DSCP mappings are more granul ar than UP-to-802.1Q PCP mappings.

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=PW0-300&qno=8

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

9

What does a TXOP Limit value of 0 in the EDCA Parameter Set included in a QoS AP s

Beacons or Probe Response frames indicate?

A. It indicates that one or more MSDUs or MMPDU s must be transmitted at the lowest basic rate during each TXOP.

B. It indicates that QoS STAs must wait for the HC to transmit a Polled TXOP before they can transmit MSDUs or MMPDUs.

C. It indicates that no MSDUs or MMPDUs ma y be transmitted by a non-pollable QoS

STA.

D. It indicates that a single MSDU or MMPDU may be transmitted at any rate for each

TXOP. A. Data frames from lower priori ty colliding ACs behave as if there were an external collision on the wireless medium.

B. Collisions between contending EDCAFs within a QoS STA are resolved within the

QoS STA

C. WMM-compliant applications collaborate within a QoS STA to handle transmission collisions at layer 7 of the OSI model

D. The WMM specification requires use of RTS/CT S as part of the EDCAF in each

QoS STA to avoid internal collisions between applications

E. Collisions within a QoS STA do not require se tting retry bits in MAC headers of

MPDUs from lower priority ACs

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=PW0-300&qno=9

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

10

Which statement is FALSE regarding us e of admission control in a QoS BSS?

A. The IEEE 802.11 QoS facility implements a singl e admission control mechanism for use in contention-free periods (CFPs) and contention periods (CPs).

B. The ACM bit is static for the duration of the lifetime of a BSS.

C. If a QoS STA desires to send data without admission control using an access category (AC) that mandates admission control, the QoS STA w ill use a lower priority

AC that does not use admission control.

D. A QoS AP uses ACM subfields in the EDCA Parameter Set element to indicate admission control requirements for each access category (AC).

E. A hybrid coordinator may enforce admissi on control policies during both contention-free periods (CFPs) and contention periods (CPs).

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=PW0-300&qno=10

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

11

Exhibit: Given the IEEE 802.11 Beacon frame decode shown, determine which statement is true.

A. The access point is operating on channel 3.

B. The access point has both 1 Mbps and 2 Mbps configured as basic rates.

C. This Beacon frame came from an ERP access point.

D. The duration value of 0 ec means that this access point is operating in HEMM mode.

E. ERP mobile stations must use the RT S/CTS protocol before Data transmissions.

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=PW0-300&qno=11

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

12

In an ERP QoS BSS using APSD, when is the Power Management subfield of the Frame

Control field set to a value of 1?

A. Only in management frames sent by a non-AP QoS STA immediately prior to entering a low power state (dozing).

B. On any QoS Data frame sent by t he QoS AP subsequent to a PS-Poll frame.

C. On any frame transmitted by a non-AP QoS STA using APS

D.

D. Only in the PS-Poll frame sent from a STA operating in PS mode.

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=PW0-300&qno=12

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

13

The IEEE 802.11 (as amended) Dynamic Frequency Selection (DFS) serv ice is capable of performing what functions?

A. Establishing a interference baseline on all 2.4 GHz channels

B. Using modulation switching techniques to avoid interfering with radar systems

C. Testing channels for radar before using a channel and while operating in a channel

D. Suspending operations on a channel with high IEEE 802. 11 co-channel in terference

E. Requesting and reporting of measurem ents in the current and other channels

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=PW0-300&qno=13

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

14

When an access point sends an RTS frame, the duration field will contain an amount of time, measured in microseconds, equal to which of the following?

A. 2 ACK, 1 RTS, 1 DATA, 4 SIFS

B. 1 ACK, 1 CTS, 1 DATA, 3 SIFS

C. 1 DATA, 1 RTS, 2 SIFS, 1 DIFS, 1 ACK

D. 1 RTS, 1 CTS, 1 DATA, 2 ACK, 4 SIFS

E. 1 RTS, 1 ACK, 1 CTS, 1 DATA, 3 SIFS

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=PW0-300&qno=14

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

15

Given: An EDCA QoS BSS is operating as a Robu st Security Network (RSN). Two QoS

STAs in the QoS BSS are using a Dire ct Link to communicate. When the RTS/CTS threshold is exceeded for a frame to be transmitted between the two QoS STAs, what is the frame exchange sequ ence, including interframe spaces?

A. AIFS-RTS-SIFS-CTS-SIFS-DATA-SIFS-ACK

B. DIFS-RTS-SIFS-ACK-SIFS-CTS -SIFS-ACK-SIFS-DATA-SIFS-ACK

C. DIFS-RTS-CTS-SIFS-DATA-SIFS-ACK

D. AIFS-RTS-SIFS-CTS-DIFS-DATA-SIFS-ACK

E. RIFS-RTS-SIFS-CTS-SIFS-DATA-SIFS-ACK

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=PW0-300&qno=15

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

16

An IEEE 802.11 protocol analyzer using a singl e radio, dual-band 2. 4 GHz (ERP) / 5 GHz

(OFDM) PC Card is able to perform which tasks?

A. Capture and decode IEEE 802.11- compliant FHSS access point transmissions in the

2.4 GHz ISM band.

B. Capture and decode all protection mechanism frames.

C. Capture and decode OFDM, HR-DSSS, and ERP-OFDM transmissions simultaneously.

D. Capture and decode transmi ssions from 900 MHz a DSSS system.

E. Capture, decrypt, and decode WPA2/CCM P compliant IEEE 802.1X/PEAP unicast data frames.

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=PW0-300&qno=16

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

17

XYZ Corporation is renting space in a multi-tenant office building and has recently installed a new ERP WLAN in their office. The network administrat or has very little experience with

WLANs, and Referring to the diagram, match label boxes A and B with their appropriate name.

A. A = Contention-Free Period, B = Contention Period

B. A = ATIM Window, B = Data Window

C. A = Congestion Control Period, B = Arbitration Window

D. A = Contention-Free Period, B = Contention Window

E. A = Data Period, B = Interframe Space Period

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=PW0-300&qno=17

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

18

There are many differences between ana lyzing wireless and wired networks. In a wireless network, there is no guarantee that one station can hear another station s transmissions. If no corrective actions are taken or corrective mechanisms are implemented, a "hidden node" situation may cause which measurable statistics parameter to be incremented in a wireless protocol analyzer?

A. Duration value

B. Retransmission Count

C. Contention Window

D. Slot Time

E. Fragment Interval

F. DTIM Interval

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=PW0-300&qno=18

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

19

Given: ABC Company is intere sted in deploying an IEEE 802.11 net work that supports wVoIP devices. During a proof-of-concept test, they deployed a WLAN controller, one lightweight AP, and QoS features in support of their voice and data client devices in the 2.4

GHz band. The network administrator has configured the ac cess point to perform client connectivity and rogue wireless device scanning. As a test, John places a rogue AP on his network and configures it to use channel 11. The WLAN c ontroller never reports the rogue

AP. Why does the WLAN controller never report the rogue AP?

A. Lightweight APs can only scan for rogue dev ices on the channel they are using. The authorized AP is on channel 1.

B. Admission Control is enabled on the WLAN c ontroller, and the voice client is actively communicating through the AP during the entire test.

C. The rogue AP is using the encrypted management frame feat ure which masks its presence.

D. The rogue AP is operating in APSD mode, and therefore does not transmit identifying management frames.

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=PW0-300&qno=19

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

20

ABC Company has two access points (AP-1 and AP-2) connected to an Ethernet hub. Which statements describe how each access point will handle a frame sent from a wired node to a wireless station associated to AP-1?

A. AP-1 will check its association table and broad cast the frame onto the wireless medium. AP-2 will check its association table and drop the frame.

B. AP-1 will check its association table and broad cast the frame onto the wireless

medium. AP-2 will check its switching table and forward the frame to AP-1.

C. AP-1 will automatically forward the frame onto the wireless medium. AP-2 will notify the wired node that it does not have an asso ciation ID for the station.

D. AP-1 and AP-2 will both automatically forwar d the frame onto the wireless medium.

E. AP-1 and AP-2 will both issue ARP frames onto the wireless medium, and if they receive a reply, they will broadca st the data frame onto the wireless medium.

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=PW0-300&qno=20

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

21

WMM-PS trigger frames can be what type of IEEE 802.11 frames?

A. QoS Null

B. QoS + CF-Poll

C. QoS Data

D. CTS

E. PS-Poll

F. Reassociation

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=PW0-300&qno=21

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

22

ERP access points may provide which service to increase overall network performance in a

BSS when only ERP stations are associated to the access point?

A. Short PLCP Preamble support

B. Short Slot Time

C. Arbitrary Beacon Spacing

D. 4-Way Handshake

E. Fast BSS Transition

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=PW0-300&qno=22

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

23

Which statements are true regarding an IEEE 802.11 frame s PLCP preamble?

A. A long preamble uses a Sync field of 128 bits, and both stations and access points may use either long or short preambles.

B. A short preamble uses a Sync field of 40 bits, and stations and access points must have matching preamble lengths in order to communicate.

C. Long and short preamble lengths vary dependi ng on the modulation in use on the network, and access points always inform stations of the preamble length in use on the network.

D. When short preambles are being used, the Sy nc and SFD fields both consist of 16 bits. Only access points have configurable preamble lengths.

E. An HR-DSSS access point t hat supports both long and short preambles may allow stations that are using different preamble lengths to communicate through it simultaneously.

F. ERP client stations associating to HR-D SSS access points must use the preamble length specified by the access point.

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=PW0-300&qno=23

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

24

In an ERP BSS, when is the cont ention window equal to zero?

A. When both the virtual and physical carrier sense report an idle channel

B. After the maximum retry counter resets

E. Use a spectrum analyzer to identify and remove RF interference sources in the 2.4

GHz ISM band

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=PW0-300&qno=24

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

25

Exhibit: Given: Before installing a Wi-Fi network, ABC Company performed a spectrum analysis looking for problems. The 2.4 GHz RF spectrum looked like Image-A.

After installing an ERP WLAN, ABC Company performed another spectrum analysis during business hours. The 2.4 GHz RF spectrum then looked like Image-B close to an AP on channel 1. Now the 2.4 GHz RF spectrum looks like Ima ge-C and access points and clients can no longer communicate on channel 1. What s happening to channel 1 access points?

A. The access points are experiencing spurious line emissions due to a faulty surge suppression unit. This causes the APs to "spike and shear" their RF transmissions.

B. A high-power, narrowband RF interference source is jamming channel 1.

C. Stronger transmissions from licensed 2. 4 GHz users, such as HAM operators, are compressing the transmissions from the channel 1 access points into the lower portion of the band.

D. The shape of the signals in images B and C indi cates that a licensed user in this frequency range has enabled his "guard bands" in an effort to restrict local interference with his system.

E. The voided areas in images B and C indicate that multipath fading is nulling the signal from the Channel 1 access points.

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=PW0-300&qno=25

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

26

Which statements are true regarding fram e acknowledgement in an IEEE 802.11 WLAN?

A. ACK frames following Data fr ames with the More Fragments bit set to 1 set the

NAV of competing stations for a duration value equal to two SIFS plus the next Data fragment and its ACK.

B. A client station s Reassociation Request fr ames are only acknowledged with a

Reassociation Response from the access point when roam ing in a WLAN secur ed with IEEE 802.1X/EAP.

C. Probe request acknowledgement (sending of a Pr obe Response frame) is configurable in the access point and is always linked to SSID broadcast configuration in Beacons.

D. In an EDCA BSS, encrypted Data frames are onl y acknowledged by client stations, never by access points.

E. Data frame fragments are acknowledged individually (with an ACK frame).

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=PW0-300&qno=26

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

27

Exhibit: Given the IEEE 802.11 frame decode s hown, which statements are true?

A. This screenshot was taken from a Probe Response frame.

B. No mobile stations in this BSS have traffic queued at the access point.

C. The TIM is also a DTIM.

D. The Beacon Interval is 100 milliseconds.

E. This screenshot was captured in an Ad Hoc (IBSS) network.

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=PW0-300&qno=27

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

28

Exhibit: Given: ABC Company is implementing a QoS enabl ed infrastructure that will support both voice and data. Their WLAN controller is connected to one of three core layer-3 Ethernet switches. Each core layer-3 Ethernet switch has mult iple edge layer-2

Ethernet switches attached. Lightweight APs are connected to all edge layer-2 Ethernet switches. The WLAN controller is on subnet 10.1.1.0/24, and the APs are on numerous other subnets. The APs are connected to the WLAN controller via GRE tunnels. When a data packet is sourced at the voice cli ent destined to the voice server, which devices along the path transmit frames with IEEE 802.1Q priority tags?

A. Voice client

B. Voice client, AP, WLAN controller

C. Edge switch, core switches

D. AP, core switches, WLAN controller

E. Edge switches, core switches, WLAN controller

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=PW0-300&qno=28

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

29

Given: An IEEE 802.11 Authentication frame include s information used to initiate a multiframe exchange between a client station and an access poin t that ultimately results in the verification of the identity of the client station. Which of the following are Informatio n

Fields in the Authentication frame?

A. Contention-free parameter set

B. Transaction sequence number

C. Supported rates

D. Algorithm number

E. Challenge text

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=PW0-300&qno=29

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

30

Exhibit: Given: ABC University has an ex isting 802.11 infrastructure managed by a multi-vendor Wireless Network Management System (WNMS). The network was built in three distinct phases, each when a different network administrator was in ch arge of the

WLAN. Each administrator preferred a different vendor, and therefore there are both autonomous access points and client radios from three different vendors as shown in the Chart exhibit. Since students were asking for wireless access in classrooms and dormitories, the original purpose of the WLAN was to provide hotspot cove rage in these areas. All access points are on the same VLAN which has Internet access. A fourth wireless network administrator, Sam, has been hired to manage and upgrade the WLAN to support new features across t he entire campus for the benefit of faculty and staff. Sam hasn t been working with 802.11 WLANs very long, so he deci ded to contact a consultant, you, to help him meet his new goals. In order to meet all of the upgrade requirem ents (see the Upgrade

Requirements exhibit) while minimizing overall costs, what recommendations (s ee the Plan

Options exhibit) do you give Sam? Choose the best plan.

A. Plan 1

B. Plan 2

C. Plan 3

D. Plan 4

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=PW0-300&qno=30

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

31

ABC Company has implemented a WLAN controlle r, lightweight APs, and applications that require fast handoffs. What feature, when supporte d by the WLAN controller and client devices, will allow client devices to make fast BSS transitions?

A. Asynchronous Key Forwarding

B. Opportunistic PMK Caching

C. LWAPP Fast Roaming

D. Over-the-air Client Provisioning

E. PTK Key Hashing

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=PW0-300&qno=31

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

32

Given: The graphic is taken from a spectrum analyzer. What type(s) of wireless sy stem(s) is/are illustrated?

A. An RFID system using HR-DSSS on channel 6

B. An IEEE 802.11 ERP system on channel 6 and an IEEE 802.11 FHSS system

C. An IEEE 802.11 ERP system using TP C and DFS features in the 2.4 GHz band

D. An IEEE 802.11 HR-DSSS system on ch annel 6 and a Bluetoot h 2.0 EDR system

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=PW0-300&qno=32

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

33

An IEEE 802.11 QoS Data (subtype value 1000) fr ame may have a maximum header size of how many octets?

A. 28

B. 30

C. 32

D. 36

E. 40

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=PW0-300&qno=33

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

34

What are two techniques used for real-time tracking of wVoIP devices within a facility?

A. Client positioning

B. Triangulation

C. RF fingerprinting

D. RF calibration

E. SNR provisioning

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=PW0-300&qno=34

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

35

Which step must be taken prior to using a PC Card based IEEE 802. 11 protocol analyzer?

A. Configure the WLAN card s cli ent utilities for Promiscuous mode.

B. Load special firmware into the WLAN card being used for analysis.

C. Install a custom driver that allows t he radio card to operate in RF Monitor mode.

D. Load the IEEE 802.11-to-802.3 frame conver sion engine provided by the manufacturer.

E. Disable all installed network adapters except for the WLAN card in use.

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=PW0-300&qno=35

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

36

Exhibit: Which statement is true about the presented analyzer trace?

A. 00:40:96:A1:9A:F9 is a client stati on performing a successful IEEE 802.1X/LEAP reauthentication.

C. A wireless client station must be sending data directly to the access point for the purpose of managing the access point.

D. A wireless client station could be sending data to a wireless client station across an access point.

E. A wireless client station could be sending data directly to another wireless client station as part of a QoS BSS direct link.

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=PW0-300&qno=36

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

37

Exhibit: In order to get a visual representation of conv ersations happening on the WLAN, a peer map like the one shown can be used. Which statements ar e true based on the peer map shown in the graphic?

A. This peer map displays MAC layer addressing information.

B. This peer map distinguishes between the di fferent security mechanisms used between each pair of network nodes.

C. This peer map shows how much data is traver sing each peer connection relative to the other connections.

D. This peer map quickly identifies all access points in the WLAN.

E. This peer map illustrates the modulat ion in use for each peer connection.

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=PW0-300&qno=37

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

38

An HR-DSSS client station, sends a single 60 0 octet MSDU to another HR-DSSS client

station while operating as part of an unsecured infrastructure BSS. Due to thresholds set on all client stations and the access point, all MPDUs over 300 octets in length invoke the

RTS/CTS protocol. How many CTS frames are transmitted on the wirele ss medium as part of the process of moving the 600 octet MSDU between the two client stations?

A. 1

B. 2

C. 3

D. 4

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=PW0-300&qno=38

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

39

Exhibit: Given one screenshot of a fragment burst (Image A) and another screenshot of one of the data frames decoded (Image B), determine which statements are true.

A. The RTS/CTS threshold value on the transmitter is set to 500 bytes.

B. The frame decode shown is of the third fragment in the sequence.

C. The duration value of 508 ec is exactly enough to protect the SIFS and ACK that follow this fragment.

D. The transmitter of this frame is using Unsc heduled Automatic Power Save Deliver

(U-APSD).

E. This fragment is a retransmission.

F. The sequence number of 169 shown in the decode is unidirectionally unique to the communication between the transmitting station and the access point. In the frame decode shown, 1, 2, 5.5, and 11 Mbps are all show n as supported data rates. 1 and 2

Mbps are shown with (basic) beside them . What does (basic) mean in this context? A.

The access point requires the station to support Basic rates in order to associate to its

Basic Service Set.

B. The highest data rate set to Basic is automatic ally used to send broadcast traffic such as Beacon frames.

C. Basic rates are optional data rates, often used fo r assuring connectivity for those stations that are at a significant distance from the access point.

D. Basic rates are only used for multicast traffic, and do not affect unicast traffic.

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=PW0-300&qno=39

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

40

A wireless network administrator has examined the extraordinarily high frame retransmissions from several STAs in a BSS that is not using en cryption. For this reason, he has decided to configure station fragmentation thresholds for 400 octets. With this configuration change, when a data frame with a 1500 octet MSDU is transmitted by one of the wireless client stations destined to a wired station through an acce ss point, what will be the orde r and size

(in octets) of the fragments as they are transmitted?

A. Frame1 = 400, Frame2 = 400, Frame3 = 400, Frame4 = 300

B. Frame1 = 300, Frame2 = 300, Frame3 = 300, Frame4 = 300, Frame5 = 300

C. Frame1 = 300, Frame2 = 400, Frame3 = 400, Frame4 = 400

D. Frame1 = 400, Frame2 = 400, Frame3 = 400, Frame4 = 400, Frame5 = 40

E. The fragmentation threshold setting on client stations only affects received frames, not transmitted frames

F. The fragmentation threshold setting on client stations is not a manual adjustment and can only be auto-configured by access points

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=PW0-300&qno=40

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

41

At what MAC layer transmission rate doe s an HR-DSSS access poi nt send Probe Response frames?

A. Always at 1 Mbps.

B. At the highest rate supported by bot h the access point and client station.

C. At the highest basic rate configured on the access point.

D. At the lowest basic rate configured on the access point.

E. At any rate supported by both the client station and the access point.

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=PW0-300&qno=41

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

42

Which statement is true regarding the Associat ion Identifier (AID) used in IEEE 802.11

WLANs?

A. The AID has a maximum value of 2048, and is used to uniquely identify a wireless client station associated with an access point.

B. The AID has a maximum value of 2007, and resides in the duration/ID field of a PS-

Poll frame.

C. When bit 16 of the field is zero, the value in bits 15-0 represent the remaining duration of a frame exchange.

D. The least significant 8 bits of this field are used by the wireless client station to identify which bit in a TIM indicates that the access point has frames buffered for the wireless client station.

E. The AID is used by the access point in EDCA mode to reduce duplicate transmissions when sending multicasts.

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=PW0-300&qno=42

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

43

When an IEEE 802.11 standard (as amended) comp liant WLAN security solution is being used with IPSec/ESP for layer ed security, what will a WLAN protoc ol analyzer see as the

security mechanism in use?

A. CCMP, TKIP, or WEP

B. IPSec/ESP

C. Protocol 88:95

D. Both WEP and IPSec/ESP

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=PW0-300&qno=43

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

44

All successful frame transmissi ons within an EDCA TXOP are separated by what IEEE

802.11 entity?

A. SIFS

B. AIFS

C. ACK

D. CAP

E. PIFS

F. TBTT

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=PW0-300&qno=44

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

45

When an originator QoS STA wishes to initiate a Block Ack agreement with a recipient QoS

STA, what is the first frame sent by the originator?

A. BlockAckSetupReq

B. BlockAckReq

C. ADDBA Request

D. BlockAckPolicyReq

E. ActionBAReq

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=PW0-300&qno=45

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

46

Select the processes that makes WMM-PS more efficient than IEEE 802.11 Power Save mode.

A. Queued frames are transmitted to the QoS STA during an EDCA TXOP burst.

B. WMM-PS introduces the Wi-Fi Enhanced Po wer Save (WEPS) thro ughput enhancement algorithm.

C. The access point uses Trigger Traffic Indication Maps (TTIMs) for transmit

coordination.

D. Fragmentation thresholds are optimized ba sed on the RF environment, which decreases transmission overhead.

E. Data frames are used instead of Co ntrol frames to request queued data.

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=PW0-300&qno=46

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

47

Exhibit: Given: ABC Company s IEEE 802.11 dual-band WLAN has been installed and functioning properly for a year. Three (3) lightweight access points are installed in conference rooms around the facility (see theloorPlanxhibit) because the original design specified only hotspot coverage. Although a WLAN controller is currently install ed, the lightweight APs can be converted to autonomous if necessary. The Chief Executive Of ficer

(CEO) has given the wireless network manager a new directive to implement wVoIP and wireless data access throughout the entire facility for all 30 employees. In order to implement wVoIP while complying with the upgrade parameters (see Upgrade Parameters exhibit) established by the dire ctive, how should the wi reless network manager proceed?

(see the Plan Options exhibit) Choose the best plan.

A. Plan 1

B. Plan 2

C. Plan 3

D. Plan 4

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=PW0-300&qno=47

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

48

Given: ABC Company ha s an IEEE 802.11 WLAN secured by strong authentication (PEAP-

EAP- MSCHAPv2) and encryption (CCMP/AES). They wish to implement wVoIP phones, but have noticed that the phones they have selected only supports WPA-Personal using

TKIP/RC4. How can ABC Company maintain their current leve l of data security while allowing the wVoIP phones network access?

A. Enable application layer encryption for the voic e protocol and implement a wireless intrusion prevention system (WIPS) on the wVoIP network segment.

B. Use a separate SSID for the wVoIP phones and map this new SSID to a separate

VLAN on the wired infrastructure.

C. Use MAC filtering to t he network segment where t he wVoIP phones will be used.

D. Use a secure DHCP server that can restrict access to layer 3 addresses based on user authentication.

E. Using RBAC, allow only the appropriate voice protocol (SIP, H.323, etc.) to a specific destination address on the network segment where the wVoIP phones will be used.

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=PW0-300&qno=48

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

49

Exhibit: Given: The graphic is taken from a spectrum analyzer. What types of wireless systems are illustrated?

A. An ERP IEEE 802.11 system using channel 6 and Bluetooth v1.2 discovery

B. A wideband RF jamming device and an OpenAir FHSS system

C. A 2.4 GHz cordless phone and a wireless RFID reader

D. An IEEE 802.11 HR-DSSS system using channel 2 and a digital FHSS phone

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=PW0-300&qno=49

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

50

Exhibit: Given: ABC Company is implementing a QoS enabl ed infrastructure that will support both voice and data. Their WLAN controller is connected to one of three core layer-3 Ethernet switches. Each core layer-3 Ethernet switch has mult iple edge layer-2

Ethernet switches attached. Lightweight APs are connected to all edge layer-2 Ethernet switches. The WLAN controller is on subnet 10.1.1.0/24, the APs are on numerous othe r subnets, and the layer-3 Ethernet switch is the IP gateway for all voice clients. The APs are connected to the WLAN controller via GRE tunnels. When an IP data packet is sourced at the voice cl ient destined to the voice server, which devices along the path are capable of constructing DSCP values in that IP data packet?

A. Voice client, AP

B. Voice client, core switch, WLAN controller

C. Edge switch, core switch

D. AP, core switch, WLAN controller

E. Voice client, AP, edge switch, core switch

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=PW0-300&qno=50

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

51

Exhibit: Shown is a screenshot of a wireless protocol analyzer displaying the decode information for a single 802.11 encrypted data + CF-Poll frame. T he infrastructure BSS on which this information was captured is using WEP, and this particular fr ame was sent from a cli ent station (STA) to an access point (AP). As a protocol analyst, how would you explain the ex istence of this frame on the wireless medium given the information in the decode?

A. The IEEE 802.11 network is using both version 1 and version 2 protocols simultaneously. This unexpected frame is from the version 2 protocol set.

B. The frame was sent by a c lient station that does not comp ly with IEEE HR-DSSS

standard to an access point that is Wi-Fi?certified.

C. The access point is operating as a repeater, and clients must poll repeater access points in order to transmit data frames through them.

D. The frame was misinterpreted based on insuffi cient information received by the analyzer due to frame corruption.

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=PW0-300&qno=51

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

52

When site surveying for an IEEE 802.11 network that w ill carry both voice and data traffic, what makes co-channel IEEE 802.11 transm issions more detrimental than random RF noise in some cases?

A. 1

B. 3

C. 5

D. 7

E. 9

F. 11

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=PW0-300&qno=52

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

53

Exhibit: Given: ABC Company has impl emented a HR-DSSS wVoIP network (as illustrated), and the HR- DSSS phones in use suppor t Push-to-Talk (PTT). PTT adds 4% bandwidth utilization to the AP with the transmitting phone. PTT adds 1% bandwidt h utilization to all other HR-DSSS APs in the system. Not all APs in the system are used to support wVoIP phones. In order to stop a PTT transmission from causing unnecessary utilization of APs not participating in wVoIP (like AP-2 in the illustration), what can the network administrator do?

A. Create a separate SSID and VLAN for wVoIP phon es, and configure APs to support the wVoIP VLAN.

B. Enable Internet Group Management Protocol (IGMP) on the wired infrastructure network.

C. Disable the 1 Mbps data rate on all non-wVoIP APs so that mu lticasts will not be transmitted onto the wireless network.

D. Create separate VLANs for unicast and mu lticast frames across the entire network infrastructure.

E. Disable QoS support on non-wVoIP APs.

F. Disable multicast routing on the wired infrastructure.

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=PW0-300&qno=53

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

54

The IEEE 802.11 standard (as amended) specifies two protec tion mechanisms: RTS/CTS and CTS-to-Self. Which statement is true regardin g use of these two protection mechanisms?

A. RTS and CTS frames use Short Interframe Sp aces (SIFS), and CTS-to-Self frames use PCF Interframe Spaces (PIFS).

B. Use of RTS/CTS introduces more latency t han CTS-to-Self due to a higher number of frames transmitted onto the wireless medium.

C. RTS and CTS frames get relayed through the access point, whereas the CTS-to-Self frames do not.

D. A CTS-to-Self frame sent by a client stat ion may reach fewer nodes than the

RTS/CTS frame exchange.

E. All client stations in a basic service area (BSA) hear RTS, CTS, and CTS-to-Self frames, so either the RTS/CTS mechanism or CTS-to-Self mechanism can be used with equal effectiveness.

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=PW0-300&qno=54

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

55

An ERP access point has both ERP and HR-DSS S stations associated and transmitting data.

Which statement is accurate co ncerning the access poi nt s responsibilities in the Basic

Service Set?

A. The access point may transmit Beacons using a sh ort preamble only if all of the stations in the BSS have indicated support for short preambles.

B. The access point must transmit Beac ons using a short preamble in a mixed mode environment. Stations not supporting short preambles will not be able to associate.

C. The access point will alternate transmitting Beacons using long and short preambles so that stations using either pream ble length can associate.

D. If Beacons are transmitted using short preambl es, all associated stations are required to transmit all data frames using short preambles.

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=PW0-300&qno=55

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

56

Which statements rega rding an IEEE 802.11 Chann el Switch Announcem ent frame are true?

A. Channel Switch Announcement frames use the Action frame body format.

B. Channel Switch Announcement frames are the only place where the Channel Switch

Announcement element is found.

C. Channel Switch Announcement frames must be transmitted immediately following a

DTIM Beacon so that dozing stations will re ceive the channel switch information.

D. Channel Switch Announcement frames carry information elements from an AP to a

STA in a BSS.

E. Channel Switch Announcement frames are transmitted after the wireless medium has been idle for a PIFS.

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=PW0-300&qno=56

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

57

XYZ Company is using a single ERP access point in their New York branch office. There are ten ERP wireless client stations currently on the netwo rk, each in use by XYZ s full-time employees. XYZ has hired a consultant to work on some accounting problems, and he is using an HR-DSSS

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=PW0-300&qno=57

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

58

A process called preauthentication is specif ied by the IEEE 802.11 standard (as amended).

Preauthentication is implemented by some vendors and involves a client station performing what task?

A. Authenticating with an Independent Ba sic Service Set and an Extended Service Set simultaneously.

B. Authenticating to additional Basic Servic e Sets through the distribution system while maintaining an association to only one access point at a time.

C. Reassociating to the Extended Service Set through a second access point just prior to deauthenticating the existing access point.

D. Associating to multiple Basic Service Se ts simultaneously using the PeerKey function.

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=PW0-300&qno=58

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

59

A QoS AP uses the ACM (admission control mandatory) subfields advertised in the

____________ element to indicate whether admissio n control is required for each of the

Access Categories.

A. EDCA Parameter Set

B. QoS Capability

C. Admission Control

D. TCLAS Processing

E. QoS BSS Load

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=PW0-300&qno=59

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

60

What operation immediately follows an inte rnal collision between two EDCAFs on an IEEE

802.11 QoS STA?

A. The EDCAF of higher priority transmits its frame.

B. Each EDCAF begins a new backoff procedure.

C. The EDCAF of lower priority sets the retry bit to 1.

D. An EDCAF frame burst starting with the higher priority frame.

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=PW0-300&qno=60

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

61

What statements about ERP slot times are true?

A. When the ERP-OFDM modulation is in use, the SIFS and slot time are always equal.

B. When HR-DSSS is in use in an ERP BSS, a slot time consists of a Rx -to-Tx turnaround time and an energy detect time totaling 20 .

C. All interframe spaces are calculated based on the slot time value.

D. The optional 9 slot time may not be used if the BSS has one or more associated non-

ERP stations.

E. When the ERP DSSS-OFDM modulation is in us e, all stations may use the 9 slot time.

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=PW0-300&qno=61

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

62

Given: The Traffic Identifier (TID) is assigned to an MSDU in the layers above the MAC.

There are 16 possible TID values. What statement is true about TID values?

A. 4 values are assigned to traffic categories (TC), and 12 values are assigned to traffic streams (TS)

B. 8 values are assigned to traffic categories (T C), and 8 values are assigned to traffic streams (TS)

C. 12 values are assigned to traffic categories (TC), and 4 values are assigned to traffic streams (TS)

D. All 16 values can be used for traffic ca tegories (TC) or traffic streams (TS)

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=PW0-300&qno=62

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

63

According to the IEEE 802.11 standard (as amended), local maximum transmit power for the current channel is regulated by what elements in Beacon management frames?

A. Power management element

B. MaxPower element

C. RSSI notification element

D. Country element

E. Power Constraint element

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=PW0-300&qno=63

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

64

To effect Preauthentication, a STA s supplicant sends an IEEE 802.1X/EAPoL Start message.

How is the EAPoL Start message addressed?

A. DA = MAC of default gateway; RA = BSSID of the AP to which the STA is associated

B. DA = BSSID of targeted AP; RA = BSSID of the AP to which the STA is associated

C. DA = MAC of the default gateway; RA = Ethernet MAC of the targeted AP

D. DA = BSSID of the targeted AP; RA = Ethernet MAC of the targeted AP

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=PW0-300&qno=64

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

65

What PLCP preamble type doe s the IEEE 802.11 standard, Cl ause 17 (OFDM) specify?

A. Fixed 56-bit preamble

B. Fixed 12-symbol preamble

C. Long 128-bit preamble

D. Long 12-octet preamble

E. Short 72-bit preamble

F. Long 12-symbol preamble

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=PW0-300&qno=65

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

66

A QoS STA is permitted to send which frame types to a Hybrid Coordinator?

A. QoS Null

B. Data + CF-Poll

C. CF-End + CF-ACK

E. Service Start Time

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=PW0-300&qno=66

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

67

What must occur before a STA operating in an HR-DSSS BSS can transmit a frame over the wireless medium?

A. Its NAV must be equal to zero.

B. It must receive a CF-Poll frame from the access point.

C. The appropriate interframe space must expire.

D. Its Backoff timer must expire.

E. Its CCA must report that the medium is idle.

F. The AP must issue the STA a TXOP.

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=PW0-300&qno=67

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

68

An administrator decides to optimize WLAN performance by adjusting the fragmentation threshold on each access point to a value much lo wer than the default of 2346 bytes. She notices that when wireless client statio ns are doing prolonged data transfer s from a wired server, that downstream performance is better than it was before her adjustments. One problem she has not yet solved is why performance in the upstream direction has not been improved due to these adjustments. As a wireless protocol analyst, which of the following explanations would you give to the administrator?

A. Fragmentation thresholds settings are only effe ctive in the downstream direction

(toward the wireless client stations) as sp ecified by the I EEE 802.11 standard.

B. Fragmentation thresholds are uniquely set on eac h wireless client station and access point and affect only transmissions from that node in particular.

C. When configuring fragmentation threshold values, it is important to enable RTS/CTS also in order to get effective bi-directional results.

D. Fragmentation is only supported bi-direction ally when Antenna Diversity is enabled on both wireless client stations and the access point.

E. World Mode (also known as Multi-Domain Oper ation) must be enabled for fragmentation to be bi-directional due to regulatory requirements in most countries.

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=PW0-300&qno=68

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

69

Per the IEEE 802.11 standard (as amended), Association and Reas sociation Reque st frames carry which performance related information element?

A. QoS Capability

B. TPC Report

C. EDCA Parameter Set

D. QoS BSS Load

E. DFS Recovery Interval

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=PW0-300&qno=69

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

70

D. Position the analyzer near Station-Z. Analyze t he frames Station-Z is receiving, looking for corrupted data frames. E. Position the analyzer half way between Station- Z and the access point. Analyze the data rate at which frames are sent and how long they take to be received.

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=PW0-300&qno=70

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

71

Exhibit: Determine which statement is true using the information in the analyzer trace shown.

A. This analyzer trace displays one PING Re quest / PING Reply packet exchange between two wireless client stations through an access point.

B. This analyzer trace displays two PING Requ est / PING Reply packet exchanges between two wireless client stations through an access point.

C. This analyzer trace displays two PING Re quest / PING Reply packet exchanges between two wireless client stations that are part of an IBSS.

D. This analyzer trace displays one PING Request / PING Reply packet exchange between a wireless client station and a wired station through an access point.

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=PW0-300&qno=71

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

72

Given: An IEEE 802.11 data frame is encrypt ed with CCMP/AES and is carrying the maximum frame payload. This data frame is being transmitted from a QoS STA to a QoS AP.

What is the size of this IEEE 802.11 MPDU?

A. 1500 octets

B. 2304 octets

C. 2312 octets

D. 2346 octets

E. 2350 octets

F. 2356 octets

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=PW0-300&qno=72

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

73

A station has successful received a fram e. Which statements are true regarding the acknowledgement procedures in an IEEE 802.11 WLAN?

A. Broadcast frames are acknowledged by all c lient stations participating in PCF mode.

B. Data frames are not acknowledged if the laye r 4 protocol is TCP because TCP has its own ACK frames. UDP datagrams are always acknowledged.

C. Multicast frames are acknowledged by client st ations participating in the multicast data stream only.

D. PS-Poll frames may be acknowledged either with an ACK frame or with a Data frame.

E. Directed management frames such as authe ntication and association requests are always acknowledged.

F. Data frame retransmissions are not acknowledged if they are fragmented.

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=PW0-300&qno=73

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

74

An HR-DSSS STA does not receive an ACK for a firs t-attempt data frame that it transmitted.

In this case, what happens to the STA s DCF contention window?

A. The slot time within the contention window decreases by 50%.

B. It varies because the backoff algorithm is random.

C. The contention window approximately doubles in size.

D. The contention window is not affected by failed Data frame deliveries.

E. The contention window is immediately closed, and the frame is retransmitted.

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=PW0-300&qno=74

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

75

Exhibit: Using the WLAN protocol analyzer s frame decode shown as a reference, which access point data rate configuration setting must be correct?

A. Supported: 11, 5.5, 2 (basic), 1 (basic)

B. Supported: 11 (basic), 5.5 (basic)

C. Supported: 11 (basic), 5. 5 (basic), 2 (basic), 1

D. Supported: 11, 5.5, 2, 1

E. Supported: 11 (basic), 5.5, 2, 1

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=PW0-300&qno=75

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

76

Exhibit: In the HR-DSSS frame decode shown, why does the protocol analyzer not show "(basic)" beside 5.5 and 11 Mbps data rates?

A. Only two data rates may be configured as "bas ic" rates, and the administrator has chosen to select 1 and 2 Mbps as basic rates.

B. 5.5 and 11 Mbps data rates are not supported on this access point.

C. 5.5 and 11 Mbps data rates may only be used when all client stations associated to the access point are connected at a data rate of at least 5.5 Mbps.

D. 5.5 and 11 Mbps data rates are not required by this BSS.

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=PW0-300&qno=76

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

77

Exhibit: Referencing this decode of an HR-DSSS frame, choose the statement that could be true.

A. This frame was the first fragment in a series of 3 fragments (as part of a fragment burst) sent from a wireless client station to a station on the wired network.

B. This frame was sent from one access point to another access point along a wireless distribution system.

C. This frame was sent from a wireless client station to requ est information about

BSSs within range.

D. This frame was sent from a wireless client station to an access point for the purpose of managing the access point s configuration.

E. This frame was sent to a wireless client station from a node on the wired segment and WEP was not used.

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=PW0-300&qno=77

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

78

Given the frame capture and the decode shown, after which Beacons in the list shown (as referenced by the frame number in the leftmost column) would multicast traffic have been sent in this infrastructure BSS if multicast traffic had been queued for transmission at the access point?

A. frame number 49

B. frame number 50

C. frame number 51

D. frame number 53

E. frame number 54

F. frame number 55

G. frame number 57

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=PW0-300&qno=78

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

79

Exhibit: Given: ABC Company recorded the 2.4 GHz band with a spectrum analyzer prior to installing their ERP WLAN. Image-A is how the band appeared prior to the

WLAN installation. Image-B is how the band appears now, and all chan nels on their WLAN have ceased to function. What is the best explanation as to why their WLAN is no longer functioning properly?

A. A wideband RF power source is corru pting all IEEE 802.11 transmissions.

B. A new microwave oven was in stalled in the cafeteria.

C. A malfunctioning IEEE 802.11 OFDM radio card is transmi tting continuously.

D. A manual site survey tool is active ly testing the throughput of their WLAN.

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=PW0-300&qno=79

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

80

Exhibit: Given: The graphic is taken from a spectrum analyzer. What types of RF transmitters are illustrated?

A. An IEEE 802.11 HR-DSSS security camera on channel 6 and an RFID tag

B. A Bluetooth headset and a narrowband RF jamming device

C. A 2.4 GHz cordless phone and an OpenAir FHSS system

D. An ERP IEEE 802.11 system usi ng channel 1 and a microwave oven

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=PW0-300&qno=80

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

81

Exhibit: What IEEE 802.11 MAC layer function is illustrated by the following diagram?

A. Sequential Acknowledgements B. Fragment Bursting C. HCCA Polling D. CP Regulated

Spacing E. Unscheduled APSD

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=PW0-300&qno=81

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

82

Exhibit: Given: In the illustrated network, you are de ploying a pilot IEEE 802.11 wVoIP network. You currently have only a single HR-DSSS access point and twelve HR-DSSS wVoIP phones deployed. All phones use 64 kbps G.711 voice encoding with a 30 ms sample rate. The recommended maximum bandwidth utilization for the AP is 65%. Currently, all wVoIP phones can connect to the AP throughout the entire office building. Network

Utilization per G.711 Phone: 2 Mbps = 12% 5.5 Mbps = 6 % In the analyzer trace shown, the TBTT is nominally 102.5 milliseconds. Why does the Beacon transmission interval vary?

A. The access point must compete to gain acce ss to the RF medium in order to transmit a Beacon.

B. The DCF Interframe space (DIFS) is nominally 50 , but typically varies by as much as 10 causing delays in Beacons.

C. This is a trace of an ERP network wh ere both HR-DSSS and ERP nodes are active on the network. The access point is changing slot times from short to long as needed.

D. Beacon frames vary in size, and therefore so me take slightly longer to send than others.

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=PW0-300&qno=82

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

83

On an enterprise IEEE 802.11 WLAN supporting both voice and data, why is WPA2-Personal security often preferred over WPA2-Enter prise security for voice-enabled devices?

A. WPA2-Personal is more easily configured on the voice-enabled client devices than

WPA2- Enterprise.

B. WPA2-Personal supports IEEE 802.11 fast/sec ure roaming between acce ss points, whereas WPA2-Enterprise deployments may not.

C. WPA2-Enterprise voice-enabled devices consume ba ttery life at rate of almost double that of WPA2-Personal.

D. WPA2-Personal imposes less encryption over head than WPA2-Enterprise, resulting in better performance.

E. Voice-enabled devices use application layer (L7) security mechanisms, minimizing the need for scalable data link (L2) security.

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=PW0-300&qno=83

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

84

What information will a dual-band IEEE 802.11 2.4 GHz (ERP) / 5 GHz (OFDM) protocol analyzer capture if it can only capture Data Link information?

A. Source IP Address

B. Null Data frames

C. TCP SYN datagram

D. Short Interframe Spaces

E. Sequence Control fields

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=PW0-300&qno=84

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

85

E. The access point is not signaling for protection (Protection = no) in the Beacons, but it should be.

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=PW0-300&qno=85

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

86

Exhibit: Given: Shown are frames captured from an I EEE 802.1X/LEAP authentication.

This WLAN is a Robust Security Network (RSN) using the CCMP cipher suite. Using the information given in the screenshot, calcul ate how long it takes for only the frames that are part of the 4-Way handshake to complete.

A. 3.018 ms

B. 5.820 ms

C. 210.443 ms

D. 237.753 ms

E. 243.743 ms

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=PW0-300&qno=86

-------------------------------------------------------------------------------------------------------------------------------------

QUESTION:

87

Answer:

http://www.twpass.com/twpass.com/exam.aspx?ecode=PW0-300&qno=87

-------------------------------------------------------------------------------------------------------------------------------------

TwPass Certification Exam Features;

- TwPass offers over

2500

Certification exams for professionals.

- More than

98,800

Satisfied Customers Worldwide.

- Average

99.8%

Success Rate.

- Over

120

Global Certification Vendors Covered.

- Services of Professional & Certified Experts available via support.

- Free 90 days updates to match real exam scenarios.

- Instant Download Access!

No Setup required.

- Price as low as $19, which is 80% more cost effective than others.

- Verified answers researched by industry experts.

- Study Material

updated

on regular basis.

- Questions / Answers are downloadable in

PDF

format.

- Mobile Device Supported (Android, iPhone, iPod, iPad)

-

No authorization

code required to open exam.

-

Portable

anywhere.

-

Guaranteed Success

.

- Fast, helpful support 24x7.

View list of All Exams (AE);

http://www.twpass.com/twpass.com/vendors.aspx

Download Any Certication Exam DEMO.

http://www.twpass.com/twpass.com/vendors.aspx

To purchase Full version of exam click below; http://www.TwPass.com/

Was this manual useful for you? yes no
Thank you for your participation!

* Your assessment is very important for improving the work of artificial intelligence, which forms the content of this project

Download PDF

advertisement