インターネットは人々に多彩な情報を獲得することができます.ということは無線のネットと個人の通信ネット(PCN)は21世紀通信するネットワーク技術の発展の方向を代表しました。CWNP認証も自然には無線のLANの1種の選択になった。CWNP は国内唯一の専門の無線のネットの育成訓練と認証です。主要な内容は無線ネットの基礎知識、各種無線ネットの標準と周到な内容、無線ネットの実際的な応用と工事の実施です.
PW0-300 Exam:Certified Wireless Network Expertの問題集です

1. In a Split MAC wireless network architecture, lightweight APs map user priorities (UPs) specified by the
QoS STA on incoming frames to ___________.
A. IEEE 802.1D Frame Precedence Values
B. GRE Priority Bits
C. IEEE 802.1Q Tag Protocol Identifiers
D. IP Differentiated Services Code Points
E. QoS Control Header Values
Answer: D
2. Given: An ingress frame arrives on the Ethernet port of an autonomous AP marked with an IEEE
802.1D user priority value.
Which IEEE 802.1D user priority values (by name) will assure the data payload carried by the Ethernet
frame gets assigned to the highest priority WMM queue?
A. Controlled Load
B. Network Control
C. Video
D. Voice
E. Best Effort
F. Excellent Effort
Answer: BD
3. Given: When the delayed Block Ack policy is used between two QoS STAs, the recipient must
respond to a BlockAckReq frame with an ACK frame. The recipient must then send its BlockAck
response frame in a subsequently obtained TXOP.
Once the contents of the BlockAck frame have been prepared, the recipient must _______________.
A. Send the BlockAck response frame to the originator in the earliest possible TXOP using the highest
priority AC.
B. Send an ATIM to the originator signifying that the BlockAck response frame is ready for transmission.
C. Include the TID of the BlockAckReq in the next TXOP Request to the HC.
D. Wait for one PIFS after the next Beacon and transmit the BlockAck response to the originator using the
same AC as the BlockAckReq frame.
Answer: A
4. A QoS STA obtains a TXOP for an access category (AC) after what two parameters are met?
A. After a scheduled service period ends
B. The medium is idle at the AIFS[AC] slot boundary
C. The backoff time for that AC has expired
D. After a Block ACK Response
E. After a Target Beacon Transmission Time (TBTT)
Answer: BC
5. When using a protocol analyzer to capture conversations over a WLAN, you may often encounter
encrypted data frames. Most WLAN protocol analyzers have a feature that allows the analyst to save
and reload the captured frames into memory at a later time. Using this functionality, what task can be
performed?
A. When IEEE 802.1X/LEAP is being used as the WLAN security mechanism, the authentication
response frame can be replayed from a saved trace file at a later time to successfully authenticate a
hacker.
B. If a user name and password for an IEEE 802.1X/EAP-TTLS security implementation can be obtained
through social engineering tactics, the user name and password can be entered into the analyzer to
decrypt the frames from a saved trace file.
C. An analyst can search through the captured frames looking for RADIUS frames that will disclose the
user's password.
D. Encrypted frames may be decrypted offline, after they are captured, by entering a WEP key or WPA
passphrase into the analyzer.
Answer: D