Winter Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

CWNP Certification CWDP-304 Release Date

Page: 7 / 21
Total 281 questions

Certified Wireless Design Professional Questions and Answers

Question 25

What functions do the control plane of centralized and distributed WLAN architectures help solve?(Choose all that apply.)

Response:

Options:

A.

Channel reuse plans

B.

Mobility management

C.

Transmit power

D.

Load balancing

Question 26

During a validation site survey, you realize that the installers mounted some of the APs above the ceiling. They said that this was a request from the building architect due to aesthetics constraints.

During the requirements gathering, you weren't advised about any aesthetics constraints from the main stakeholder of the project. What should you do in this case?

Response:

Options:

A.

Remove all external antennas and use only the internal antennas to reduce multipath.

B.

Advise the stakeholder that WLAN performance requirements will not be met and a new design process will be needed to meet the requirements.

C.

Leave it as it is and allow automatic channel management to correct any issues.

D.

Increase the output power on all APs by 6 dB immediately.

Question 27

A museum wants to offer Wi-Fi to its visitors. One of their requirements is to have the APs blend into the design of the museum. What should you do to meet this requirement?

Response:

Options:

A.

Use a plastic cover that could blend in with the environment

B.

Lock the AP inside of a metal box

C.

Place the APs in between walls and I-beams

D.

Use an 802.11b AP, so it looks old enough to be in a museum

Question 28

In the enterprise, when is WPA/WPA2-Personal generally a recommended solution?(Choose all that apply.)

Response:

Options:

A.

When client devices do not support 802.1X/EAP

B.

When mobile device applications require high-latency roaming times between APs

C.

When client devices are provisioned in bulk and would otherwise share 802.1X credentials

D.

When the network security policy demands that each user have unique access credentials

Page: 7 / 21
Total 281 questions