Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Certified Wireless Design Professional

Last Update 4 hours ago Total Questions : 319

The Certified Wireless Design Professional content is now fully updated, with all current exam questions added 4 hours ago. Deciding to include CWDP-305 practice exam questions in your study plan goes far beyond basic test preparation.

You'll find that our CWDP-305 exam questions frequently feature detailed scenarios and practical problem-solving exercises that directly mirror industry challenges. Engaging with these CWDP-305 sample sets allows you to effectively manage your time and pace yourself, giving you the ability to finish any Certified Wireless Design Professional practice test comfortably within the allotted time.

Question # 21

To ensure that your design meets the requirements of the WLAN, what should be defined in your WLAN design software that will result in different requirements at varying locations on the floor plan?

A.

Requirement areas

B.

Cable runs

C.

Heatmap colors

D.

Project name

Question # 22

What service must be implemented on your customer's network to authenticate users against an LDAP database before granting access to the WLAN infrastructure?

A.

SSH

B.

RADIUS

C.

SFTP

D.

TLS

Question # 23

When designing a wireless bridge to connect two offices 13 kilometers (approximately 8 miles) apart, which factor must the Wireless Engineer consider to account for Fresnel Zone clearance?

A.

Earth bulge

B.

Antenna gain

C.

FSPL

D.

Receive sensitivity

Question # 24

What might limit the ability to locate 802.11 clients using a WLAN infrastructure without an 802.11 tag?

A.

Lack of 802.11k support

B.

When its radio is disabled

C.

When its radio is disabled

D.

When it is off(Note: Options B and C are duplicates. This appears to be a typo. We'll treat C as intended to be unique.)Corrected Options:

E.

Lack of 802.11k support

F.

When its radio is disabled

G.

When it is not authenticated

Question # 25

During a validation site survey, you realize that the installers mounted some of the APs above the ceiling. They said that this was a request from the building architect due to aesthetics constraints. During the requirements gathering, you weren't advised about any aesthetics constraints from the main stakeholder of the project. What should you do in this case?

A.

Advise the stakeholder that WLAN performance requirements will not be met and a new design process will be needed to meet the requirements.

B.

Leave it as it is and allow automatic channel management to correct any issues.

C.

Increase the output power on all APs by 6 dB immediately.

D.

Remove all external antennas and use only the internal antennas to reduce multipath.

Question # 26

When live video streaming solutions that transmit simultaneously to more than one recipient are used, what special capability should be considered and configured in all affected WLAN implementations?

A.

IPSec

B.

IPv6

C.

Multicasting

D.

Secure TCP

Question # 27

Main Topic:ProtocolandSpectrum Analysis

Question:

What two 802.11 amendments deal with regulatory and transmission requirements?

A.

802.11k

B.

802.11i

C.

802.11d

D.

802.11f

E.

802.11h

Question # 28

What limitation exists when WMM is not enabled on an 802.11n WLAN?

A.

The maximum channel-width will be 20MHz

B.

Only two ACs will be available

C.

EDCA values will change

D.

802.11 QoS will not be available

Question # 29

You are designing a WLAN and have been asked to recommend a security solution for the network. The organization requires that 802.1X/EAP be implemented, but they do not have a PKI and do not wish to deploy one. They suggest that mostly Windows clients, Apple phones, and Android phones will be used. What do you recommend?

A.

Use CCMP AES with a PSK

B.

Use EAP-PEAP for the authentication solution

C.

Use EAP-TLS for the authentication solution

D.

Use TKIP RC4 with a PSK

Question # 30

Main Topic:Designing for Specific Applications

Question:

For what purpose is SSID hiding generally useful? (Choose all that apply.)

A.

Preventing guests from attempting to join the secured corporate network

B.

Obscuring the network name from potential attackers

C.

Minimizing help desk calls from users and guests attempting to join the wrong network

D.

Preventing legitimate corporate users from finding the guest network

Go to page: