You are receiving reports from several users that their clients connect with very low data rates. All reports are confined to a particular area in the facility and the users report that the problem does not occur with the same devices in other areas. What is most likely problem in that area?
A. High SNR
B. Improper AP security configuration
C. Poor signal strength
D. Improper client security configuration
EAP-TLS is used for 802.1X/EAP authentication on your WLAN. What must be installed on all client devices that connect using this method?
A. RADIUS shared secret
B. RADIUS IP address
C. Certificate
D. EAP-TLS DLL
You are configuring WPA2 for use on an AP. What encryption method should be used to ensure the highest security?
A. TKIP/RC4
B. TKIP/AES
C. CCMP/RC4
D. CCMP/AES
You have configured a WLAN profile on a client computer for a hidden SSID network. The SSID operates in both 2.4 GHz and 5 GHz. The profile never connects or even attempts to connect. What is the most likely configuration error in the profile or on the computer?
A. Wrong passphrase
B. Band selection is configured for 5 GHz-only
C. Wrong SSID
D. Band selection is configured for 2.4 GHz-only
Which one of the following is a non-deprecated security solution in the 802.11 standard?
A. WEP
B. CCMP/AES
C. TKIP/RC4
D. Shared Key Authentication
You are using 802.1X/EAP for enterprise authentication for your WLAN. Where must the RADIUS server's IP address be configured to enable this for the WLAN?
A. Wireless desktops
B. Subnet router
C. Wireless laptops
D. AP
What protocol is sometimes used to access a network or user directory by a RADIUS server instead of using an internal user database?
A. DHCP
B. NTP
C. EAP
D. LDAP
Which one of the following EAP methods is commonly available for mobile phones but not for laptops?
A. EAP-TLS
B. PEAP
C. EAP-SIM
D. EAP-TTLS
What AP configuration option is often thought to provide security but actually provides no security because of the simple spoofing attack weakens it?
A. MAC filtering
B. WEP
C. Shared Key Authentication
D. SSID hiding
You have implemented an 802.11 security solution that requires certificates. What are you using?
A. WEP
B. WPA2-Enterprise
C. WPA-Personal
D. WPA2-Personal
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CWNP exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your CWT-100 exam preparations and CWNP certification application, do not hesitate to visit our Vcedump.com to find your solutions here.