Practice Free CWDP-305 Exam Online Questions
In your company’s WLAN, you expect to have a mixed client PHY environment and plan to use protection mechanisms. The protection mechanism used by your client devices is configurable.
What is the best protection mechanism for backward compatibility of 802.11n devices with 802.11b devices?
- A . WMM Protection
- B . SMPS
- C . CTS-to-Self
- D . Dual-CTS
- E . RTS/CTS
E
Explanation:
RTS/CTS is the best protection mechanism for backward compatibility of 802.11n devices with 802.11b devices because it prevents collisions and interference between different modulation types.
In the enterprise, when is WPA/WPA2-Personal generally a recommended solution? (Choose all that
apply.)
- A . When client devices do not support 802.1X/EAP
- B . When mobile device applications require high-latency roaming times between APs
- C . When client devices are provisioned in bulk and would otherwise share 802.1X credentials
- D . When the network security policy demands that each user have unique access credentials
When selecting a centralized WLAN architecture, what new problem may arise when you change the data forwarding model from centralized to distributed?
- A . APs that were designed for a centralized forwarding model may not support all features in distributed forwarding mode.
- B . The router between the APs and the controller must be made aware of the APs as forwarding client STAs.
- C . All RRM controls will also need to be distributed to a master AP that acts as a channel and transmit power arbiter for other APs in the ESS.
- D . Centralized control functions, such as key management and distribution, RRM, and load balancing will no longer be supported.
A bandpass filter has a maximum in-band loss of 1. 5 dB, ripple of 0.4 dB, and a return loss of 15 dB.
What is the minimum in-band loss?
- A . 1. 1 dB
- B . 1. 5 dB
- C . 13.5 dB
- D . 1. 9 dB
What two 802.11 amendments deal with regulatory and transmission requirements?
- A . 802.11k
- B . 802.11i
- C . 802.11d
- D . 802.11f
- E . 802.11h
Excessive uplink RTP frame retransmissions can result in ____________.
- A . DE authentication of the transmitter by the receiver
- B . Lowering of the data transmission rate by the transmitting station
- C . Head-of-Line blocking at the receiver
- D . MOS scores in excess of 5
For what purpose is SSID hiding generally useful? (Choose all that apply.)
- A . Preventing guests from attempting to join the secured corporate network
- B . Obscuring the network name from potential attackers
- C . Minimizing help desk calls from users and guests attempting to join the wrong network
- D . Preventing legitimate corporate users from finding the guest network
In most WLAN design tools, after defining project parameters or during the project creation wizard what action will you take before you can begin the actual design process?
- A . Place APs
- B . Define cabling
- C . Import a floor plan
- D . Define wall materials
When a WLAN controller sends an 802.11 frame to a lightweight AP for transmission on the wireless medium, how does it mark the frame for 802.11 QoS priority?
- A . The WLAN controller will place the user priority (UP) value in the QoS Control field of the 802.11 frame header before passing it to the lightweight AP.
- B . The WLAN controller does not mark 802.11 frames with priority values only the APs can do this.
- C . The WLAN controller does not mark the 802.11 frames with priority values only the Layer 3 switches can do this.
- D . The WLAN controller does not mark the 802.11 frames with priority values only the Layer 3 routers can do this.
Who should be in the final meeting from the customer-side after successfully implementing a WLAN infrastructure?
- A . CEO or CFO
- B . End-users
- C . The customer’s customers
- D . Remote workers