Labour Day Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CWDP-304 Exam Dumps - Certified Wireless Design Professional

Question # 4

What are some significant drawbacks that are present with WPA/WPA2-Enterprise that are not present with WPA/WPA2-Personal?(Choose all that apply.)

Response:

A.

WPA/WPA2-Enterprise does not support the use of usernames/passwords for client authentication.

B.

WPA/WPA2-Enterprise often requires additional backend infrastructure components that are not required with WPA/WPA2-Personal.

C.

WPA/WPA2-Enterprise often requires more administrative overhead for configuration than WPA/WPA2-Personal.

D.

WPA/WPA2-Enterprise always requires X.509 certificates for server authentication.

E.

WPA/WPA2-Enterprise does not provide a way to perform per-user authorization and access control.

Full Access
Question # 5

After designing a WLAN infrastructure using predictive design software. What's the best way to validate the predictive design in the physical space before deployment, if time and budget allow for it?

A.

Perform an AP-on-a-Stick survey using AP locations based upon the predictive design to confirm each AP's placement.

B.

Deploy all of the APs as they're shown in the predictive design and perform a passive site survey.

C.

Deploy all of the APs as they're shown in the predictive design and perform an active site survey.

D.

Use a client device positioned where the APs will be installed and measure the signal from the client device.

Full Access
Question # 6

While performing a validation site survey, you realize that overlapping channels are being used on the 2.4 GHz bad due to the automatic channel assignment algorithm of the WLAN infrastructure.

What should you do to prevent this?

A.

Reconfigure the network to use static channel plans because automatic channel assignment algorithms are all broken

B.

Purchase and deploy new APs from a different vendor

C.

Reconfigure the automatic channel assignment settings to use only channels 1, 6, and 11

D.

Leave it as it is; sometimes using all 11 channels in 2.4 GHz gives the optimum performance result

Full Access
Question # 7

In what circumstance would you not enable DFS channels on a WLAN infrastructure?

A.

In any stadium

B.

In any office complex

C.

In an airport

D.

In any home office

Full Access
Question # 8

You are validating association capabilities from clients to an 802.1X/EAP secure SSID. The RADIUS server's IP address is 10.100.50.25 and the

default RADIUS authentication port is used. When testing them, none of the clients are able to associate to the SSID. Troubleshooting the WLAN

infrastructure, you found out that the server is up and the RADIUS service is up as well, but the authenticator is not able to communicate properly

with the server. What's your next troubleshooting step?

A.

Verify that the shared secret between the authenticator and the RADIUS server is correct

B.

Reboot the clients

C.

Reboot the server

D.

Restart the RADIUS service

Full Access
Question # 9

Who should be in the final meeting from the customer-side after successfully implementing a WLAN infrastructure?

A.

CEO or CFO

B.

End-users

C.

The customer's customers

D.

Remote workers

Full Access
Question # 10

As a device starts to shift to lower PHY rates, what factors usually influence a device decision to shift to lower PHY rates?(Choose all that apply.)

A.

Signal degradation

B.

Packet loss

C.

Interference

D.

Retransmissions

Full Access
Question # 11

A table of VLANs in a _________ document should include what device performs ________ services.(Fill in the blanks)

A.

HLD, routing

B.

LLD, bridging

C.

LLD, routing

D.

HLD, QoS

Full Access
Question # 12

What kind of antenna results in a nearly circular pattern on the azimuth chart but a very flat donut shape on the elevation chart?

A.

High gain omni-directional

B.

20 degree vertical yagi

C.

120 degree horizontal sector

D.

60 degree horizontal patch

Full Access
Question # 13

When analyzing published competitive tests by equipment vendors, what items are the tests usually lacking?(Choose all that apply.)

Response:

A.

Client devices and configurations

B.

Audit by a third party

C.

Detailed test methodology

D.

Detailed configurations of each vendor’s equipment

Full Access
Question # 14

What advantages are provided by per-user PSKs when compared with ESS-wide PSKs?(Choose all that apply.)

Response:

A.

Per-user PSKs allow easier user-based access control with WPA/WPA2-Personal security.

B.

Per-user PSKs are easier to manage if a PSK is compromised or an employee leaves a company.

C.

Per-user PSKs are standardized and certified by the Wi-Fi Alliance.

D.

Per-user PSKs are more secure than ESS-wide PSKs because they support mutual authentication.

Full Access
Question # 15

What strategy can be used to ensure efficient cell overlap for VoIP site surveys?

Response:

A.

Measure the percentage of cell overlap using the cell overlap feature in the site survey software.

B.

Increase the output power of the radio in all APs.

C.

Install higher gain antennas in the APs.

D.

Ensure at least two APs can be seen with appropriate signal strengths from each location.

Full Access
Question # 16

Before performing a pre-deployment passive RF survey of a new deployment using survey mapping software, which of the following must be performed?

Response:

A.

Determining AP transmit power

B.

Scaling the map

C.

Selecting antennas

D.

Checking client DTPC settings

Full Access
Question # 17

What are the two types of WLAN discovery/scanning?

Response:

A.

Manual

B.

Hidden

C.

Active

D.

Passive

E.

Probe

F.

Automatic

Full Access
Question # 18

What action should be taken after implementing a WLAN based on the design developed from the site survey process?

A.

Post-installation survey

B.

Requirements analysis

C.

Gathering facility documentation

D.

Design the infrastructure services

Full Access
Question # 19

After deploying a 5 GHz-only WLAN infrastructure in the USA, using 20 MHz channel-widths and all 25 available channels, one of the managers of

the company brings his 802.11n tablet to the office to test the Guest SSID. While testing, therewere several spots where we would get poor RSSI

(below -80dBM) or none at all. You checked the WLAN infrastructure and all APs are up and running and you've validated coverage after

deployment. What is causing this issue?

A.

His tablet doesn't support the 5 GHz band

B.

His tablet only supports a 40 MHz channel-width

C.

His tablet does not support one or more of the 5 GHz channels

D.

His tablet doesn't support MU-MIMO

Full Access
Question # 20

In high-density environments, such as stadiums and convention centers, what extra factor has to be taken into account that can attenuate Wi-Fi

signals when these environments are having an event?

A.

Thick walls

B.

I-Beams

C.

People

D.

Fire doors

Full Access
Question # 21

What two 802.11 amendments deal with regulatory and transmission requirements?

Response:

A.

802.11k

B.

802.11i

C.

802.11d

D.

802.11f

E.

802.11h

Full Access
Question # 22

What are some common problems with short (12 or fewer characters) ASCII passphrases in WPA/WPA2-Personal networks?

Response:

A.

They are more susceptible to dictionary attacks than longer passphrases.

B.

They lead to weak group keys in a BSS.

C.

They only produce a 64-bit PMK instead of a 256-bit PMK.

D.

Very few AP and client vendors support entry of an ASCII-based passphrase.

Full Access
Question # 23

When preparing a floor plan graphic for use in predictive and manual site surveying, what calibration method will lead to the most accurate and

reliable RF data?

A.

Use the known size of a small object, such as a ceiling tile, and use a single instance of this object (e.g. a single ceiling tile) to scale the

floor plan.

B.

Measure the width of an actual office doorway with a tape measure and use this value to calibrate against a doorway graphic.

C.

Use the longest available measurement (like a straight exterior wall) to calibrate the graphic's scale.

D.

Calibrate the ceiling height of the floor plan first, then the survey software should be able to auto-calibrate the X and Y planes of the

graphic.

Full Access
Question # 24

SSID hiding is not generally recommended because some frames require inclusion of the SSID. In what frames is the SSID always included?

Response:

A.

Beacon

B.

Association request

C.

Probe response

D.

Probe request

E.

Authentication response

Full Access
Question # 25

Location technology (RTLS) can use which of the following methods?(Choose all that apply.)

Response:

A.

Sound

B.

802.11-capable laptops

C.

Active RFID

D.

Infrared

E.

UHV

F.

UWB

G.

Passive RFID

Full Access
Question # 26

An enterprise customer is subject to the highest standards for network uptime. When designing their wireless network, you should consider which of the following?(Choose all that apply)

Response:

A.

The failover of the wireless network only

B.

The failover of the wired network only

C.

The failover of the wireless and wired network

D.

The physical aspects such as power and cabling

Full Access
Question # 27

What might limit the ability to locate 802.11 clients using a WLAN infrastructure without an 802.11 tag?(Choose all that apply.)

A.

Lack of 802.11k support

B.

When its radio is disabled

C.

When it is off

D.

RF channel selection

Full Access
Question # 28

What is the chip rate of 1 Mbps 802.11b?

Response:

A.

11 Mchips/s

B.

2 Mchips/s

C.

1 Mchip/s

D.

22 Mchips/s

Full Access
Question # 29

What type of standards-based encryption is used by office extension APs for the traffic tunnel?(Choose all that apply.)

Response:

A.

CAPWAP

B.

LWAPP

C.

TKIP

D.

AES

E.

DTLS

Full Access
Question # 30

Assume that your network operates in a regulatory domain that allows use of the entire 5 GHz space allowed in the 802.11ac amendment. In your

upcoming

802.11ac deployment, you would like to take advantage of the performance improvements that result from channel bonding. However, after

extensive testing, you have determined that your mission-critical WLAN should not use channels requiring DFS support.

Given those two criteria (enable channel bonding and disable DFS channels), in the 5 GHz spectrum, how many non-overlapping 40 MHz channels

will your system be able to use?

A.

2

B.

3

C.

4

D.

6

Full Access
Question # 31

A customer is acquiring a new VoWLAN system to replace their existing wired phone system. When reading about his system's requirements, you

learned that is requires 25 db of SNR to work as expected. After surveying the environment, you discovered that the noise floor is -88 dBm. What

should be the minimum RSSI value to meet the system's requirements?

A.

-70 dBm

B.

-67 dBm

C.

-65 dBm

D.

-63 dBm

Full Access
Question # 32

Your new customer is concerned about maintaining privacy for their proprietary information when you conduct information gathering for their

WLAN design. Which document can you use to directly address their concern?

A.

NDA

B.

SoW

C.

BoM

D.

Hold Harmless

Full Access
Question # 33

In this question, you will compare the mobility processes of a network that supports WPA2-Personal and WPA2-Enterprise. Assume the use of a

15-character

ASCII passphrase for WPA2-Personal and EAP-TTLS/MSCHAPv2 with WPA2-Enterprise. Also, assume that proprietary roaming protocols are not

supported.

When a device transitions from one BSS to another within the same ESS, what step must be performed in the WPA2-Enterprise transition that are

not performed in the WPA2-Personal transition?

A.

Open System Authentication

B.

802.11 Reassociation

C.

802.1X authentication

D.

4-Way Handshake

Full Access
Question # 34

A high power radio system transmits at 40,000 Watts. What is this power in dBm? Solve this without a calculator.

Response:

A.

46 dBm

B.

76 dBm

C.

56 dBm

D.

66 dBm

Full Access
Question # 35

A company wants to connect its headquarters to its remote office that is 13 kilometers away using a wireless bridge. What requirement must not

be forgotten by their Wireless Engineer when considering the Fresnel Zone?

A.

Earth bulge

B.

Antenna gain

C.

FSPL

D.

Receive sensitivity

Full Access
Question # 36

You are conducting a physical site survey where heavy machinery is repaired. What is a common item required specifically for this type of survey?

A.

Personal Protective Equipment (PPE)

B.

Low gain antennas

C.

Low power APs

D.

Indoor APs

Full Access
Question # 37

What is the DSCP Per Hop Behavior equivalent classification of the 802.11 AC_VO priority level?

A.

AF31

B.

CS3

C.

VO

D.

EF

Full Access
Question # 38

You are creating an outdoor bridge link that spans more than 1000 yards. Which one of the following antenna types is more likely to be included in

the design?

A.

Yagi

B.

Omni

C.

Patch

D.

Panel

Full Access
Question # 39

Which operational plane would be responsible for performing automated RF management?

Response:

A.

Integration

B.

Data

C.

Distribution

D.

Control

E.

Management

Full Access
Question # 40

Given: A WLAN controller is connected to ABC Company's core layer 3 Ethernet switch with an IEEE 802.1Q trunk connection. The WLAN

controller's native

VLAN is VLAN 6 and its IP address is 10.0.14.2 /24. Lightweight APs supporting centralized forwarding are connected to the network on VLANs 7,

8, and 9, and they each build a Layer 3 tunnel back to the WLAN controller's IP address.

The dynamically assigned IP addresses received by each AP from a DHCP server will be ________________.

A.

Associated with the VLAN on which they are connected.

B.

Associated with the native VLAN of the WLAN controller.

C.

Associated with VLAN 1, the default VLAN for new APs

D.

Associated with a non-routable VLAN until the MAC address of the AP is removed from the controller's MAC filter

Full Access
Question # 41

A museum wants to offer Wi-Fi to its visitors. One of their requirements is to have the APs blend into the design of the museum. What should you do to meet this requirement?

Response:

A.

Use a plastic cover that could blend in with the environment

B.

Lock the AP inside of a metal box

C.

Place the APs in between walls and I-beams

D.

Use an 802.11b AP, so it looks old enough to be in a museum

Full Access
Question # 42

What are some advantages of designing guest access with all guest users tunneled directly into the DMZ?

Response:

A.

Minimizes configuration requirements for segmentation and filtering of guest traffic across internal LAN

B.

Enhances performance of web proxy servers in the DMZ for guest Internet traffic

C.

Allows a single SSID with different authentication/encryption models to be used for all WLAN services for corporate users and guests

D.

The border firewall configuration will not require any additional rules to pass guest traffic to the DMZ controller

Full Access
Question # 43

Using a SCA means that all APs will be using the same channel in a given layer. How is the AP with which the client associates determined?

Response:

A.

All APs share a virtual Multicast Address. A controller will tell the closest AP to the client to communicate with it, since it has a greater RSSI from the client.

B.

All APs share a virtual BSSID. A controller will tell the closest AP to the client to communicate with it, since it has a greater RSSI from the client.

C.

All APs share a virtual IP address. A controller will tell the closest AP to the client to communicate with it, since it has a greater RSSI from the client.

D.

The client selects the AP based on a known set of MAC to BSSID mappings stored in the clients authorized SSID listing.

Full Access
Question # 44

Given: The 802.11ac APs you have selected for your public access deployment support many of the PHY and MAC enhancements offered by the

802.11n and

802.11ac amendments. The AP is configured for a single-band (2.4 GHz) and only allows 20 MHz channels. The WLAN radio in the AP is a 3x3

802.11n chip that supports two spatial streams.

What is the maximum MCS rate that could be supported by this AP?

A.

54 Mbps

B.

65 Mbps

C.

108 Mbps

D.

144 Mbps

Full Access
Question # 45

In an RSN requiring low-latency reassociations and no fast secure roaming protocols, what security solutions are ideal for protecting VoWiFi communication?(Choose all that apply.)

Response:

A.

WPA2-Personal

B.

WPA-Personal

C.

WPA2-Enterprise

D.

WEP

E.

802.1X/EAP

Full Access
Question # 46

What is the most suitable antenna option to be used when designing a WLAN infrastructure with APs mounted on a ceiling with a height of more than 20 feet and having all of the client stations used from the floor?

Response:

A.

Patch

B.

Dish

C.

Low-gain dipole

D.

Grid

Full Access
Question # 47

Of the following antenna connector types, which one is the smallest?

A.

RP-TNC

B.

MC Connector

C.

N Connector

D.

Male N Connector

Full Access
Question # 48

If radar has reportedly been detected on your WLAN deployment, what bands would you consider avoiding?

Response:

A.

5 GHz UNII-2 and 2e

B.

5 GHz UNII-2 and 3

C.

5 GHz UNII-2, 2e, and 3

D.

5 GHz UNII-1 and 2

E.

5 GHz UNII-1, 2, and 3

Full Access
Question # 49

After designing and deploying a WLAN infrastructure, you realized the CCI is causing poor performance in the 2.4 GHz band. Primarily, you've

designed the

WLAN for 5 GHz and 2.4 GHz as a best effort. You found out that the implementers didn't follow your guidelines when configuring the WLAN

infrastructure. What can you do to minimize as much as possible the CCI impact in the 2.4 GHz band?

A.

Add more APs to the infrastructure

B.

Increase the transmit power on all APs

C.

Turn-off 2.4 GHz radios on some APs

D.

Use all channels available in the 2.4 GHz band

Full Access
Question # 50

When performing an indoor predictive site survey to make the WLAN planning and design cycle more efficient, what is a best practice for configuration of the simulated APs in the predictive modeling software?

Response:

A.

Always use the default 2.2 dBi omnidirectional antenna patterns for simulated APs.

B.

If dynamic RRM will be used, AP transmit power should be set to an estimated average level of the expected client devices, such as 25 mW.

C.

All simulated APs should be set to 20 MHz channels only.

D.

Defining custom AP and antenna patterns will yield more accurate prediction data than the pre-configured vendor AP/antenna combinations.

Full Access
Question # 51

A museum wants to offer Wi-Fi to its visitors. One of their requirements is to have the APs blend into the design of the museum. What should you do to meet this requirement?

A.

Use a plastic cover that could blend in with the environment

B.

Lock the AP inside of a metal box

C.

Place the APs in between walls and I-beams

D.

Use an 802.11b AP, so it looks old enough to be in a museum

Full Access
Question # 52

When surveying an existing WLAN infrastructure for a possible redesign, you use two Wi-Fi USB adapters to collect RSSI data and two USB

spectrum analysis adapters to collect RF spectrum data. Since your laptop doesn't have enough USB ports, you use a 4-port powered USB 3.0 hub.

What issues could be caused by the use of USB 3.0 that will impact your site survey?

A.

It does not give you enough bandwidth to collect data coming from all of the adapters.

B.

It does not give you enough power for all four of your adapters.

C.

It generates noise in the 2.4 GHz band, giving you a false perception of the noise floor.

D.

It generates noise in the 5 GHz band, giving you a false perception of the noise floor.

Full Access
Question # 53

Modulation can be defined as:

Response:

A.

The process of incorporating a chipping code to build resilience

B.

The process of encoding data symbols using a carrier frequency

C.

The process of modifying a carrier signal to represent data

D.

The process of representing data using RF coding

Full Access
Question # 54

What functions do the control plane of centralized and distributed WLAN architectures help solve?(Choose all that apply.)

Response:

A.

Channel reuse plans

B.

Mobility management

C.

Transmit power

D.

Load balancing

Full Access
Question # 55

When installing a cloud-based AP, what is the most common process used?

Response:

A.

Configure the AP as an autonomous AP and then, when it connects to the cloud, it will be reconfigured.

B.

Configure a profile for the AP in the cloud and then connect it for automatic configuration.

C.

Connect the AP to the network and configure it from the cloud assigning a configuration or policy set to the AP.

D.

Configure the AP with a local controller and then, when it connects to the cloud, it will be reconfigured.

Full Access
Question # 56

A signal passes through a 10-meter cable, an amplifier, and then a filter. The amplifier has an output that is eight times higher in power than its input. Each meter of cable reduces the signal level by a factor of 4. The filter has a loss of 5 dB.

What is the total loss/gain of the three elements in series?

Response:

A.

65 dB loss

B.

16 dB gain

C.

56 dB loss

D.

37 dB loss

Full Access
Question # 57

What part of the 802.11n preamble is used by the receiver to estimate the spatially multiplexed signal channel? What mode is this used in?

Response:

A.

HT-STF in Greenfield mode only

B.

HT-LTF in Mixed and Greenfield modes

C.

HT-LTF in Greenfield mode only

D.

HT-STF in Mixed and Greenfield modes

Full Access
Question # 58

Given: As the wireless network administrator for XYZ Company, you are planning to upgrade your aging wireless network infrastructure, as well as

some clients, to support 802.11ac. In your research, you have discovered that your new wireless client devices and infrastructure are 802.11ac,

WMM, and WMM-PS certified by the Wi-Fi Alliance. Some of your existing client devices are 802.11a/b/g devices that do not support WMM.

Given this information, what scenario is possible when your company's employees begin using both types of client devices on the new WLAN?

A.

All WMM-PS certified client devices will be prevented from utilizing WMM-PS features until all stations in use on the wireless medium are

WMM-PS certified.

B.

The WLAN infrastructure will set the dozing times of the WMM-PS certified client devices based upon their WMM access category, while the

non-WMM-PS client devices will continue to use PS-Poll frames.

C.

Performance and battery life will be inconsistent between WMM-PS and non-WMM-PS client devices when used with applications that

support WMM-PS.

D.

WMM-PS enabled APs will allow both WMM-PS and non-WMM-PS stations to use the trigger-and-delivery mechanism, but WMM-PS stationswil

Full Access
Question # 59

The installation crew for your WLAN project wants to install a few APs to locations nearby the ones specified in the RF design document. What next step should occur?

Response:

A.

Confirm the mounting hardware.

B.

Choose a different AP model.

C.

Update the documentation.

D.

Consult the RF designer.

Full Access
Question # 60

Switches and APs have already been chosen by your customer. All switches support 802.3bz MultiGig interfaces and APs are 4x4:4 802.11ac

wave 2 capable of using dual-5GHz and have one MultiGig interface. Some cable drops for the APs will run for more than 180.5 feet (or 55

meters). To support MultiGig, what is the best choice of cabling?

A.

Cat-5

B.

Cat-6

C.

Cat-5e

D.

Cat-6a

Full Access
Question # 61

During your first pre-deployment meeting with the deployment team, you hand out the full design documentation to all of them. What's your

primary goal during this meeting?

A.

To explain design decisions and ensure understanding of design documents.

B.

To discuss AP functionality.

C.

To explain how Wi-Fi works.

D.

To justify the budget.

Full Access
Question # 62

When designing a static channel plan for an office using voice devices near an airport, which range of channels should be avoided to ensure

optimal performance when implemented?

A.

36-40

B.

44-48

C.

116-124

D.

1-11

Full Access
Question # 63

You told your customer that multipath fading may be mitigated simply by moving one or both of the receivers antennas a small amount, usually by

one to four wavelengths away from its original position. Your customer is prepared to make the change, but does not know the wavelength for

802.11ac.

What is the approximate wavelength of an 802.11ac radio wave?

A.

5.5 cm (2.16 inches)

B.

12 cm (4.72 inches)

C.

15.24 cm (6 inches)

D.

45 cm (17.71 inches)

Full Access
Question # 64

During a customer walkthrough you notice an area of the CAD drawing where it is not accurate. What next step should you take?

Response:

A.

Redraw the portions of the map that have changed.

B.

Do not survey that area.

C.

Request a new version.

D.

Request the survey team to do their best to walk where necessary and use the references on the map.

Full Access
Question # 65

A wireless network with fewer APs at higher power levels to cover a large area is said to be which of the following?

Response:

A.

Capacity based

B.

Coverage based

C.

Destined for failure

D.

Ideal for roaming

Full Access
Question # 66

Given: As the wireless network administrator for XYZ Company, you are planning to upgrade your aging wireless network infrastructure, as well as some clients, to support 802.11ac.

In your research, you have discovered that your new wireless client devices and infrastructure are 802.11ac, WMM, and WMM-PS certified by the Wi-Fi Alliance. Some of your existing client devices are 802.11a/b/g devices that do not support WMM.

Given this information, what scenario is possible when your company's employees begin using both types of client devices on the new WLAN?

Response:

A.

All WMM-PS certified client devices will be prevented from utilizing WMM-PS features until all stations in use on the wireless medium are WMM-PS certified.

B.

Performance and battery life will be inconsistent between WMM-PS and non-WMM-PS client devices when used with applications that support WMM-PS.

C.

The WLAN infrastructure will set the dozing times of the WMM-PS certified client devices based upon their WMM access category, while the non-WMM-PS client devices will continue to use PSPoll frames.

D.

WMM-PS enabled APs will allow both WMM-PS and non-WMM-PS stations to use the triggerand- delivery mechanism, but WMM-PS stations will g

Full Access
Question # 67

ABC Company has a WLAN controller with 10 controller-based APs; the Voice SSID is configured for centralized data forwarding. Each AP is

connected to an access port on a layer-2 Ethernet switch. Each layer-2 switch is uplinked to a single layer-3 core Ethernet switch. The WLAN

controller is connected directly to the layer-3 core Ethernet switch. Layer-3 tunnels are created between all controller-based APs and the WLAN

controller. A voice server is connected to the layer-3

Ethernet switch.

When a voice-enabled QoS STA sends an IP data packet to a voice server in this scenario, the DSCP value carried in the STA's IP data packet gets

mapped to what and by which device?

A.

The DSCP value is mapped to an IEEE 802.1Q priority tag value by the WLAN controller.

B.

The DSCP value is mapped to the DSCP value in the encapsulating IP header by the layer-3 switch.

C.

The DSCP value is mapped to an IEEE 802.1p (802.1D-2004) UP value by the access point.

D.

The DSCP value is mapped to an IEEE 802.1Q VLAN tag by the access point.

Full Access
Question # 68

When doing some frame capturing over the air during a voice call, you realized that frames on the downlink (from the AP to the client) direction are

not being transmitted with the correct UP value for voice frames, but on the uplink (from the client to the AP) direction are being transmitted

correctly. What's the cause of this issue?

A.

Bad client driver

B.

AP is not receiving enough PoE, thus not using QoS features

C.

Somewhere on the wired network QoS markings aren't being trusted

D.

Faulty antenna on the AP

Full Access
Question # 69

During a post-validation assessment, you have configured a client for 802.1X/EAP but it is not passing authentication. Which areas should you check in the WLAN configuration?

Response:

A.

Whether the RADIUS server is online and configured for the matching port on the APs and WLAN controllers

B.

Whether the RADIUS shared secret is properly configured on the supplicant and authentication server

C.

Whether the authenticator is configured to support the EAP type(s) your client is configured for

D.

Whether the client has a fully valid certificate

Full Access