Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free CWNP CWDP-305 Practice Exam with Questions & Answers | Set: 6

Questions 51

What functions may be performed by a WIPS? (Choose all that apply.)

Options:
A.

Distributed protocol analysis

B.

Client access to the distribution system

C.

Performance monitoring and response

D.

Data forensics and analysis

E.

Automated threat mitigation

CWNP CWDP-305 Premium Access
Questions 52

What are some advantages of designing guest access with all guest users tunneled directly into the DMZ?

Response:

Options:
A.

Minimizes configuration requirements for segmentation and filtering of guest traffic across internal LAN

B.

Enhances performance of web proxy servers in the DMZ for guest Internet traffic

C.

Allows a single SSID with different authentication/encryption models to be used for all WLAN services for corporate users and guests

D.

The border firewall configuration will not require any additional rules to pass guest traffic to the DMZ controller

Questions 53

What frequency and power did 802.11y provide?

Options:
A.

3.65–3.7 GHz, 20W EIRP

B.

5.65–5.7 GHz, 5W EIRP

C.

5.25–5.35 GHz, 10W EIRP

D.

3.7–3.75 GHz, 15W EIRP

Questions 54

What is an advantage of centralized data forwarding?

Options:
A.

It reduces delay for user traffic

B.

It increases the encryption strength for user traffic

C.

It increases the signal strength for wireless client devices

D.

It allows for centralized filtering of wireless traffic

Questions 55

Main Topic:Designing for Specific Applications

Question:

What advantages are provided by per-user PSKs when compared with ESS-wide PSKs? (Choose all that apply.)

Options:
A.

Per-user PSKs allow easier user-based access control with WPA/WPA2-Personal security.

B.

Per-user PSKs are easier to manage if a PSK is compromised or an employee leaves a company.

C.

Per-user PSKs are standardized and certified by the Wi-Fi Alliance.

D.

Per-user PSKs are more secure than ESS-wide PSKs because they support mutual authentication.

Questions 56

What is the purpose of DHCP Option 43, and how is it used with WLANs?

Options:
A.

It provides clients with a temporary IP address on a restricted VLAN until 802.1X authentication is completed. Then the client receives its long-term IP address.

B.

It provides IP address bindings for specific network nodes that require long-term IP address assignments. WLAN controllers are configured to use Option 43 to receive long-term IP address leases that are centrally managed with DHCP.

C.

It supports vendor-specific IP address attributes for node discovery purposes. APs use Option 43 with vendor class identifiers to obtain the IP address of a centralized WLAN controller.

D.

It integrates a DHCP server with AAA servers and user databases to dynamically assign IP addresses to client devices. During 802.1X, the AAA server uses DHCP Option 43 to assign IP addresses based on user credentials.

Questions 57

What are the deliverables to your customer after successfully implementing a WLAN infrastructure?

Options:
A.

Digital or physical assets, guides, floorplans and configuration documents

B.

Project Charter

C.

Facility blueprints

D.

Nothing is required. The implemented WLAN was deliverable

Questions 58

When creating a long-distance bridge link, it is important to know the channels in use by other networks on both ends of the link and within a reasonable range. It is not as important to know the channels in use in the middle area of the link. Why is this the case?

Options:
A.

Interference happens at the receiver

B.

Interference happens at the transmitter

C.

The signals in the middle of the link will increase the amplitude of your signal as it passes through them

D.

Your RF LoS will always be far above any interference in the middle because the signal travels up and then back down to the remote 802.11 receiver

Questions 59

When designing a static channel plan for an office using voice devices near an airport, which range of channels should be avoided to ensure optimal performance when implemented?

Options:
A.

36-40

B.

44-48

C.

116-124

D.

1-11

Questions 60

Given:For this fill-in-the-blank question, each answer option contains an answer for the first and second blanks, separated by a dash "—". Choose the answer option that correctly fills in both blanks in the following sentence.

A WLAN may use 802.11 admission control to ________, and admission control requirements are configured separately for each ________.

Options:
A.

Block stations with inadequate security parameters — SSID

B.

Identify voice-enabled wireless devices — AP radio (that is, 2.4 GHz or 5 GHz)

C.

Regulate the available bandwidth resources — Access Category

D.

Mark ingress and egress frames with priority values — TCP/IP port