Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

CWNP PW0-071 - Certified Wireless Technology Specialist - Sales

Page: 1 / 3
Total 70 questions

What is the most likely cause of low throughput on a hotel's guest network?

A.

The 1.5 Mbps Internet connection is creating a bottleneck for the Wi-Fi users.

B.

The user's laptop does not have 54 Mbps data rate enabled.

C.

The strong security methods used with public access networks often cause low throughput.

D.

The user is too close to the servicing access point.

Which one of the following adjustments can most benefit a high density environment?

A.

Antennas with more gain

B.

APs with lower output power

C.

PoE with more wattage

D.

Controllers with fewer 802.3 ports

As an RF signal propagates, it reflects off an object. The reflected signal and the signal following a direct path arrive at the receiver at different points in time. What is the term used to describe this RF behavior?

A.

Antenna Diversity

B.

Multipath

C.

Multiple In, Multiple Out (MIMO)

D.

Channel Reciprocity

E.

Beamwidth Refraction

Given: A customer has recently purchased an 802.11g access point that accepts multiple external antennas. The customer wants to know if they need to purchase multiple antennas or a single antenna for the AP.

What do you tell them is a benefit of using multiple antennas?

A.

Additional gain and therefore a larger coverage area

B.

Additional functionality through enabling of repeater features

C.

Transmit and receive diversity that addresses multipath problems

D.

Improved throughput by enabling full-duplex communication

Identify the strongest passphrase-based security mechanism for 802.11 wireless networks.

A.

TKIP

B.

WPA-PSK

C.

WPA2-Personal

D.

RC4

E.

WEP

After successfully connecting to the Wi-Fi network in your hotel room, you launch a web browser on your laptop. Instead of opening your homepage, it directs you to a hotel-branded page that asks for your name, room number, and a secret key. What has most likely happened?

A.

You are the victim of a phishing attack, should not provide the information, and should call the front desk for help.

B.

Every room in the hotel has its own access point, and entering the room number and key confirms connectivity to the correct AP.

C.

The access point is out of connections and you must enter your room number and code to be added to the hotel's Access Request Queue (ARQ) to obtain the next available connection.

D.

The hotel is using a captive portal to provide guest connectivity while keeping non-guest users off the wireless network.

ABC Company is comprised of four departments: sales, marketing, engineering, and accounting. The company would like to separate the users on the WLAN so that users from different departments have access to different services on the network. To implement this strategy, you recommend a WLAN controller that supports _________.

A.

Role Based Access Control (RBAC)

B.

Preshared Key (PSK)

C.

Extended Service Set Identifiers (ESSIDs)

D.

Multiple Input Multiple Output (MIMO)

E.

Wireless Intrusion Protection System (WIPS)

Virtual Private Network (VPN) solutions are often used in conjunction with Wi-Fi networks for what purpose?

A.

Endpoint security for travelling users connected to unsecure Wi-Fi hot-spots

B.

Validating user identity when using 802.1X/EAP security

C.

Capturing and analyzing wireless network frames

D.

Managing access points that are connected to WLAN controllers

In preparation for site surveys, your company is creating a questionnaire that will help you understand your customer's client connectivity requirements. What question is NOT appropriate for your company's pre-survey questionnaire?

A.

What applications will be used by Wi-Fi client devices on the wireless network?

B.

How will Power over Ethernet (PoE) be supplied to Wi-Fi client devices?

C.

How many concurrent Wi-Fi client connections are expected on the wireless network?

D.

What types of Wi-Fi client devices will be connected to the wireless network?

E.

What 802.11 physical technology (PHY) will be used by the Wi-Fi client devices?

What tool is best suited for locating and identifying sources of RF interference, such as microwave ovens?

A.

Spectrum analyzer

B.

Wi-Fi client utilities

C.

Wireless protocol analyzer

D.

Predictive analysis software

E.

High-gain omni antenna