Pass the CWNP CWDP Wi-Fi Design CWDP-305 Questions and answers with CertsForce

Viewing page 7 out of 10 pages
Viewing questions 61-70 out of questions
Questions # 61:

What statement is true of a WLAN design that supports Real-Time Location Services (RTLS) with 802.11 RFID asset tags?

Options:

A.

When passive tags are implemented, the AP density should be increased by 25% to make up for the shorter transmit range of passive tags as compared to active tags.


B.

Active RFID tags periodically transmit 802.11 beacon management frames that must be synchronized with the AP for proper location of the tagged asset.


C.

With passive tags, AP transmit gain should be increased to supply extra power for near-field coupling or backscatter modulation from the tag to the AP since the passive tag lacks an internal power source.


D.

Passive tags do not communicate directly with the WLAN infrastructure, but instead they rely on the tag reader to communicate tag information to the location server.


Expert Solution
Questions # 62:

After deploying a 5 GHz-only WLAN infrastructure in the USA, using 20 MHz channel-widths and all 25 available channels, one of the managers of the company brings his 802.11n tablet to the office to test the Guest SSID. While testing, there were several spots where he would get poor RSSI (below -80 dBm) or none at all. You checked the WLAN infrastructure and all APs are up and running and you've validated coverage after deployment. What is causing this issue?

Options:

A.

His tablet doesn't support the 5 GHz band


B.

His tablet only supports a 40 MHz channel-width


C.

His tablet does not support one or more of the 5 GHz channels


D.

His tablet doesn't support MU-MIMO


Expert Solution
Questions # 63:

Your customer's 802.11n laptops cannot detect the SSID in the 5 GHz band in a conference room, but your 802.11ac laptop connects without issue. What is the most likely explanation for this discrepancy?

Options:

A.

The AP is configured to use channel 36


B.

The customer laptop does not support OFDM


C.

The AP is on channel 144


D.

Their laptops are SISO clients


Expert Solution
Questions # 64:

Prior to meeting with the customer for the first time, you should do which of the following?

Options:

A.

Decide which vendor they will benefit most from.


B.

Research the customer as much as possible. Try to understand what their business is, who their customers are, and any other information you can find regarding product lines and recent press announcements.


C.

Find out what vendor their competitors use.


D.

Plan an initial design to present to them.


Expert Solution
Questions # 65:

As a device starts to shift to lower PHY rates, what factors usually influence a device's decision to shift to lower PHY rates? (Choose all that apply.)

Options:

A.

Signal degradation


B.

Packet loss


C.

Interference


D.

Retransmissions


Expert Solution
Questions # 66:

What service must be implemented on your customer's network to authenticate users against an LDAP database before granting access to the WLAN infrastructure?

Options:

A.

SSH


B.

RADIUS


C.

SFTP


D.

TLS


Expert Solution
Questions # 67:

In high-density environments, such as stadiums and convention centers, what extra factor has to be taken into account that can attenuate Wi-Fi signals when these environments are having an event?

Options:

A.

Thick walls


B.

I-Beams


C.

People


D.

Fire doors


Expert Solution
Questions # 68:

Which document provides detailed instructions for installation technicians on how to properly mount and configure access points (APs)?

Options:

A.

Hold Harmless


B.

Statement of Work


C.

Bill of Materials


D.

Physical installation guide


Expert Solution
Questions # 69:

When deploying access points (APs) outdoors, which additional component needs to be used that is typically not required in most indoor office deployments?

Options:

A.

Antennas


B.

NEMA enclosures


C.

Ethernet cables


D.

PoE


Expert Solution
Questions # 70:

What functions may be performed by a WIPS? (Choose all that apply.)

Options:

A.

Distributed protocol analysis


B.

Client access to the distribution system


C.

Performance monitoring and response


D.

Data forensics and analysis


E.

Automated threat mitigation


Expert Solution
Viewing page 7 out of 10 pages
Viewing questions 61-70 out of questions