Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

CWDP-305 Exam Dumps - Certified Wireless Design Professional

Go to page:
Question # 57

When installing access points (APs) on high ceilings, what is the most common personal protective equipment (PPE) that should be used?

A.

Hardhat, high visibility vest and body belt

B.

Glasses, gloves and jacket

C.

Clean suits, masks and glasses

D.

Clean suits, gloves and jacket

Full Access
Question # 58

Main Topic:Designing for Specific Applications

Question:

What are some common problems with short (12 or fewer characters) ASCII passphrases in WPA/WPA2-Personal networks?

A.

They are more susceptible to dictionary attacks than longer passphrases.

B.

They lead to weak group keys in a BSS.

C.

They only produce a 64-bit PMK instead of a 256-bit PMK.

D.

Very few AP and client vendors support entry of an ASCII-based passphrase.

Full Access
Question # 59

In a PC-based spectrum analyzer, what data chart identifies the overall RF utilization of a specific frequency in the environment being surveyed?

A.

FFT Max Hold

B.

FFT Average

C.

Swept Spectrogram

D.

Duty Cycle

Full Access
Question # 60

What are some advantages of designing guest access with all guest users tunneled directly into the DMZ?

Response:

A.

Minimizes configuration requirements for segmentation and filtering of guest traffic across internal LAN

B.

Enhances performance of web proxy servers in the DMZ for guest Internet traffic

C.

Allows a single SSID with different authentication/encryption models to be used for all WLAN services for corporate users and guests

D.

The border firewall configuration will not require any additional rules to pass guest traffic to the DMZ controller

Full Access
Question # 61

ABC Company has a WLAN controller with 10 controller-based APs; the Voice SSID is configured for centralized data forwarding. Each AP is connected to an access port on a layer-2 Ethernet switch. Each layer-2 switch is uplinked to a single layer-3 core Ethernet switch. The WLAN controller is connected directly to the layer-3 core Ethernet switch. Layer-3 tunnels are created between all controller-based APs and the WLAN controller. A voice server is connected to the layer-3 Ethernet switch.

When a voice-enabled QoS STA sends an IP data packet to a voice server in this scenario, the DSCP value carried in the STA's IP data packet gets mapped to what and by which device?

A.

The DSCP value is mapped to an IEEE 802.1Q priority tag value by the WLAN controller.

B.

The DSCP value is mapped to the DSCP value in the encapsulating IP header by the layer-3 switch.

C.

The DSCP value is mapped to an IEEE 802.1p (802.1D-2004) UP value by the access point.

D.

The DSCP value is mapped to an IEEE 802.1Q VLAN tag by the access point.

Full Access
Question # 62

You have determined the best mounting locations for APs in a given installation. The facilities manager has asked you to change the locations for several APs due to aesthetic concerns. You suggest mounting the APs in the ideal locations and painting them so they go unnoticed in the environment. What is a valid recommendation or consideration when painting APs?

A.

Always use paints with metallic dye in them to prevent potential RF propagation impact.

B.

Painting APs will significantly reduce the output power.

C.

Painting APs may void the product manufacturer's warranty.

D.

Most AP models for indoor environments come in a variety of form factors and colors. Painting is never recommended.

Full Access
Question # 63

When performing an active site survey in an existing WLAN infrastructure, in addition to gathering throughput data, what other important function are you typically testing simultaneously?

A.

Application filtering

B.

Internet bandwidth

C.

Roaming

D.

ACL configuration

Full Access
Question # 64

In your company’s WLAN, you expect to have a mixed client PHY environment and plan to use protection mechanisms. The protection mechanism used by your client devices is configurable.

What is the best protection mechanism for backward compatibility of 802.11n devices with 802.11b devices?

Response:

A.

WMM Protection

B.

SMPS

C.

CTS-to-Self

D.

Dual-CTS

E.

RTS/CTS

Full Access
Go to page: