Practice Free CWDP-305 Exam Online Questions
A designer has created a WLAN design that has been implemented in an organization. The network exists in a four-story building Because each floor has an Identical floor plan, the designer designed only one floor and had the installers duplicate the design on each floor. Now. in validation, it is not performing well.
What best explains the problem caused by this process?
- A . The result was that APs were above and below each other on the same channel, resulting in excessive CCI The APs should have been deployed so that they were not directly above and below each other and so that they used varying channels between floors
- B . The result was that clients could only connect to APs on their floor and, in a multi-floor deployment, you want clients to connect to APs on other floors in case they roam between floors.
- C . The result was that AC) was increased because the APs were deployed above and below each other on the same channels.
- D . The result was that the frequency utilization was too low for the clients to capture RF waves on which to transmit their signals.
What kind of antenna results in a nearly circular pattern on the azimuth chart but a very flat donut shape on the elevation chart?
- A . High gain omni-directional
- B . 20 degree vertical yagi
- C . 120 degree horizontal sector
- D . 60 degree horizontal patch
B
9 1. What is a radome?
One of your warehouse customers called you reporting problems with their WLAN in some locations that you designed and installed over a year ago.
What should be one of your first considerations for your line of questioning?
- A . DHCP lease exhaustion
- B . Changes in receive gain
- C . Inventory changes
- D . Rogue APs from neighbors
In an RSN requiring low-latency reassociations and no fast secure roaming protocols, what security solutions are ideal for protecting VoWiFi communication? (Choose all that apply.)
- A . WPA2-Personal
- B . WPA-Personal
- C . WPA2-Enterprise
- D . WEP
- E . 802.1X/EAP
A, C
Explanation:
WPA2-Personal and WPA2-Enterprise are ideal security solutions for protecting VoWiFi communication in an RSN requiring low-latency reassociations and no fast secure roaming protocols.
WPA2-Personal uses a pre-shared key (PSK) to authenticate and encrypt the communication between the VoWiFi device and the access point. WPA2-Enterprise uses 802.1X/EAP to authenticate the VoWiFi device and the RADIUS server, and then derives a unique encryption key for each session.
Both WPA2-Personal and WPA2-Enterprise use AES-CCMP as the encryption algorithm, which provides strong security and low overhead. WPA2-Personal and WPA2-Enterprise also support key caching and pre-authentication mechanisms, which reduce the latency and disruption during reassociations. These features are essential for maintaining the quality of service and user experience for VoWiFi communication.
WPA-Personal, WEP, and 802.1X/EAP are not ideal security solutions for protecting VoWiFi communication in an RSN requiring low-latency reassociations and no fast secure roaming protocols. WPA-Personal uses TKIP as the encryption algorithm, which is less secure and more computationally intensive than AES-CCMP. WPA-Personal also does not support key caching and pre-authentication mechanisms, which increase the latency and disruption during reassociations. WEP is an outdated and insecure encryption algorithm that can be easily cracked by attackers. WEP also does not support any authentication or key management mechanisms, which expose the VoWiFi communication to various attacks. 802.1X/EAP is an authentication framework, not a security solution. 802.1X/EAP alone does not provide any encryption or key management for the VoWiFi communication.
You have initiated a site survey to be performed and the team has been onsite and is halfway through gathering the necessary data.
The project sponsor just asked you to make sure the WLAN supports radio frequency identification (RFID) location tracking.
How would you possibly characterize this situation? A. Scope creep has occurred.
B. The 802.3af RTLS standard should be incorporated into the AP configuration.
C. The 802.11g standard incorporates location tracking.
D. Any WLAN will support location tracking.
E. The power requirements on the UPS need to be evaluated.
Answer: A
27 1. Name the audience type not addressed in this chapter for HLDs.
- A . Operations
- B . Executives
- C . Designers
- D . Engineering
Your customer’s 802.11n laptops cannot detect the SSID in the 5 GHz band in a conference room, but your 802.11ac laptop connects without issue.
What is the most likely explanation for this discrepancy?
- A . The AP is configured to use channel 36
- B . The customer laptop does not support OFDM
- C . The AP is on channel 144
- D . Their laptops are SISO clients
ABC Company has a WLAN controller with 10 controller-based APs; the Voice SSID is configured for centralized data forwarding. Each AP is connected to an access port on a layer-2 Ethernet switch. Each layer-2 switch is uplinked to a single layer-3 core Ethernet switch. The WLAN controller is connected directly to the layer-3 core Ethernet switch. Layer-3 tunnels are created between all controller-based APs and the WLAN controller. A voice server is connected to the layer-3 Ethernet switch.
When a voice-enabled QoS STA sends an IP data packet to a voice server in this scenario, the DSCP value carried in the STA’s IP data packet gets mapped to what and by which device?
- A . The DSCP value is mapped to an IEEE 802.1Q priority tag value by the WLAN controller.
- B . The DSCP value is mapped to the DSCP value in the encapsulating IP header by the layer-3 switch.
- C . The DSCP value is mapped to an IEEE 802.1p (802.1D-2004) UP value by the access point.
- D . The DSCP value is mapped to an IEEE 802.1Q VLAN tag by the access point.
Aesthetics are critical in some environments.
What common installation technique can best meet this requirement in a stadium while not voiding manufacturer warranties?
- A . Painting to match team colors
- B . Using enclosures under the seats
- C . Mounting on a non-fixed pole
- D . Mounting on the walls
When viewing channel utilization information from a protocol analyzer, if high channel utilization is occurring, what should you ensure does not exist?
- A . A high percentage of low PHY rates
- B . An RF signal generator causing an RF DoS
- C . High levels of workload
- D . High frames per second
In your company’s WLAN, you expect to have a mixed client PHY environment and plan to use protection mechanisms. The protection mechanism used by your client devices is configurable.
What is the best protection mechanism for backward compatibility of 802.11n devices with 802.11b devices?
- A . WMM Protection
- B . SMPS
- C . CTS-to-Self
- D . Dual-CTS
- E . RTS/CTS
E
Explanation:
RTS/CTS is the best protection mechanism for backward compatibility of 802.11n devices with 802.11b devices because it prevents collisions and interference between different modulation types.