PrepAway - Latest Free Exam Questions & Answers

Tag: PW0-205

Exam PW0-205 , Wireless LAN Analysis

What kind of signal is described?

While seeking the source of interference on channel 11 in your 802.11n WLAN running within 2.4 GHz, you notice a signal in the spectrum analyzer real time FFT
display. The signal is characterized with the

greatest strength utilizing only 1-2 megahertz of bandwidth and it does not use significantly more bandwidth until it has weakened by roughly 20 dB. At approximately
-70 dB, it spreads across as much as 35 megahertz of bandwidth.
What kind of signal is described?

What option specifies the best approach to minimize leg…

Given:
You support a coffee shop and have recently installed a free 802.11ac wireless hot-spot for the benefit of your customers. You want to minimize legal risk in the
event that the hot-spot is used for illegal Internet activity.
What option specifies the best approach to minimize legal risk at this public hot-spot while maintaining an open venue for customer Internet access?

Where must the X.509 server certificate and private key…

Given:
Your company has just completed installation of an IEEE 802.11 WLAN controller with 20

controller-based APs. The CSO has specified PEAPv0/EAP-MSCHAPv2 as the only authorized WLAN authentication mechanism. Since an LDAP-compliant user

database was already in use, a RADIUS server was installed and is querying authentication requests to the LDAP server. Where must the X.509 server certificate
and private key be installed in this network?

What security controls would you suggest?

Given:
ABC Company has a WLAN controller using WPA2-Enterprise with PEAPv0/MS-CHAPv2 and AES-CCMP to secure their corporate wireless data. They wish to
implement a guest WLAN for guest users to have Internet access, but want to implement some security controls. The security requirements for the hot-spot include:

-Cannot access corporate network resources
-Network permissions are limited to Internet access
-All stations must be authenticated

What security controls would you suggest? (Choose the single best answer.)


Page 3 of 1112345...10...Last »