Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmaspas7

Easiest Solution 2 Pass Your Certification Exams

CWDP-305 CWNP Certified Wireless Design Professional Free Practice Exam Questions (2025 Updated)

Prepare effectively for your CWNP CWDP-305 Certified Wireless Design Professional certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 2 / 5
Total 319 questions

When implementing WLAN security according to common best practices, what feature should be enabled when configuring an EAP type?

A.

The "Use WEP if RADIUS server unavailable" option

B.

The "Validate server certificate" option

C.

The "Trusted Root Certification Authorities" list

D.

The "Do not prompt user to authorize new servers or trusted certification authorities" option

During a validation site survey, you realize that the installers mounted some of the APs on the wall when the design called for a ceiling mount. They said this was done because the cabling company did not have the right tools to run the cables above the ceiling. You know this will cause a difference in how the Wi-Fi signal radiates throughout the environment. What should you do in this case?

A.

Leave it as it is because it will not have a significant impact

B.

Blame the cabling company if the Wi-Fi doesn't work since they didn’t do their job correctly

C.

Turn up the power on the APs to accommodate for the difference

D.

Advise the stakeholder that requirements will not be met and a new design process will be needed to meet the requirements

Given: In a site survey deliverable report, you are expected to explain the spectrum measurements taken at the customer's site. What portion of a spectrum analyzer view can be used to determine if a given channel is too active for use as the active channel for a new AP?

A.

Device list

B.

Frame decode

C.

Real-time FFT

D.

Duty Cycle

Main Topic:ProtocolandSpectrum Analysis

Question:

What part of the 802.11n preamble is used by the receiver to estimate the spatially multiplexed signal channel? What mode is this used in?

A.

HT-STF in Greenfield mode only

B.

HT-LTF in Mixed and Greenfield modes

C.

HT-LTF in Greenfield mode only

D.

HT-STF in Mixed and Greenfield modes

You are being asked to design a WLAN for a number of WLAN clients that will use Telnet as the primary application. The customer has asked that you use only the number of APs necessary because of the complex installation and construction costs each AP installation will incur in this particular environment. What design factors do you consider?

A.

Omnidirectional antennas should be used to maximize cell overlap.

B.

Use 11 Mbps as the lowest basic rate.

C.

Clients could benefit from RTS/CTS mode for all transmissions.

D.

AP transmit power should be turned down to minimize co-channel interference.

In this question, you will compare the mobility processes of a network that supports WPA2-Personal and WPA2-Enterprise. Assume the use of a 15-character ASCII passphrase for WPA2-Personal and EAP-TTLS/MSCHAPv2 with WPA2-Enterprise. Also, assume that proprietary roaming protocols are not supported. When a device transitions from one BSS to another within the same ESS, what step must be performed in the WPA2-Enterprise transition that is not performed in the WPA2-Personal transition?

A.

Open System Authentication

B.

802.11 Reassociation

C.

802.1X authentication

D.

4-Way Handshake

What basic RF math formula should be used as a baseline to convert an RF value in units of dBm into a value of mW?

Note: "dBm" in the formulas represents the known dBm value

A.

0 dBm = 1 mW

B.

mW = dBm × 10

C.

mW = 10 + dBm

D.

mW = 10^(dBm / 10)

Main Topic:Designing for Specific Applications

Question:

What are some common problems with short (12 or fewer characters) ASCII passphrases in WPA/WPA2-Personal networks?

A.

They are more susceptible to dictionary attacks than longer passphrases.

B.

They lead to weak group keys in a BSS.

C.

They only produce a 64-bit PMK instead of a 256-bit PMK.

D.

Very few AP and client vendors support entry of an ASCII-based passphrase.

What is the most appropriate antenna which will require the least Intentional Radiator power for a point-to-point bridge link spanning 1200 meters?

A.

2.2 dBi omnidirectional

B.

11 dBi omnidirectional

C.

11 dBi dish

D.

5 dBi patch

What differences exist between VLANs in wireless and wired domains?

A.

Wireless VLANs are not effective for segmenting the available services and network permissions available to clients. Wired VLANs are effective for this purpose.

B.

Wireless VLANs are never carried in 802.11 frames that cross the wireless medium. VLAN identifiers are always carried in Ethernet frames to indicate the proper VLAN.

C.

Wireless VLANs do not always segment traffic into separate broadcast domains on the wireless medium. Wired VLANs do segment broadcast domains on the wired network.

D.

Wireless VLANs are ineffective for utilizing a single set of infrastructure equipment to provide different services to different client groups. Wired VLANs are effective for this purpose.

When performing an indoor predictive site survey to make the WLAN planning and design cycle more efficient, what is a best practice for configuration of the simulated APs in the predictive modeling software?

A.

All simulated APs should be set to 20 MHz channels only.

B.

Always use the default 2.2 dBi omnidirectional antenna patterns for simulated APs.

C.

If dynamic RRM will be used, AP transmit power should be set to an estimated average level of the expected client devices, such as 25 mW.

D.

Defining custom AP and antenna patterns will yield more accurate prediction data than the pre-configured vendor AP/antenna combinations.

What functions may be performed by a WIPS? (Choose all that apply.)

A.

Distributed protocol analysis

B.

Client access to the distribution system

C.

Performance monitoring and response

D.

Data forensics and analysis

E.

Automated threat mitigation

What is the most cost-effective way to accurately measure the height of a ceiling when the use of a ladder is not permitted?

A.

Estimate the height based on known object sizes

B.

Gather measurements from other objects and do the math

C.

Rent a lift-cart to lift you up to the ceiling

D.

Use a laser measure to measure the distance from the floor to the ceiling

Looking at a client radio specification sheet that states Receive Sensitivity of −82 dBm @ 18 Mbps would mean:

A.

It would need to hear a signal <−82 dBm in order to use the 24 Mbps PHY rate.

B.

It is only capable of transmitting at 18 Mbps PHY rates at −82 dBm.

C.

It must hear a signal >−82 dBm in order to demodulate the 18 Mbps PHY rate.

D.

It must hear a signal <−82 dBm in order to demodulate the 18 Mbps PHY rate.

Main Topic:Post-Design ValidationandTroubleshooting

Question:

For what types of systems should you request read-only access to in order to perform an analysis of the customer’s existing infrastructure? (Choose all that apply.)

A.

Clients

B.

RADIUS

C.

Switches

D.

Active Directory

E.

Routers

As an implementation engineer, you have just received initial design specs from a network designer for your dual-band 802.11n deployment. The network design documents prescribe the following data rate configuration for the 2.4 GHz radio:

Basic Rates: 5.5, 6, 11, 12 Mbps

Supported Rates: 9, 18, 24, 36, 48, and 54 Mbps as well as MCS 0-15

What will result from this design strategy?

A.

By disabling support for 1 and 2 Mbps while allowing 5.5 and 11 Mbps, the network will force 802.11b clients to use these higher data rates.

B.

Protection mechanisms will always be in use on this network to support 5.5 and 11 Mbps as basic rates.

C.

HR/DSSS (802.11b) stations will not be able to associate to the service set.

D.

This configuration violates the IEEE specification that defines 6, 12, and 24 Mbps as mandatory data rates for 802.11g/n.

Main Topic:Infrastructure Design

Question:

What is the minimum PoE budget needed on a switch to support 6 (six) APs that can only be powered using IEEE 802.3at if no other details are provided?

A.

320 W

B.

60 W

C.

180 W

D.

240 W

Using a Single Channel Architecture (SCA) means that all APs will be using the same channel in a given layer. How is the AP with which the client associates determined?

A.

All APs share a virtual IP address. A controller will tell the closest AP to the client to communicate with it, since it has a greater RSSI from the client.

B.

All APs share a virtual Multicast Address. A controller will tell the closest AP to the client to communicate with it, since it has a greater RSSI from the client.

C.

All APs share a virtual BSSID. A controller will tell the closest AP to the client to communicate with it, since it has a greater RSSI from the client.

D.

The client selects the AP based on a known set of MAC to BSSID mappings stored in the client's authorized SSID listing.

While using a USB adapter attached to a USB hub and your laptop for protocol analysis, you notice that the SNR is lower than expected. The USB adapter is an 802.11ac 3x3:3 adapter and is connected to a USB 3 hub. What is likely causing the SNR variation?

A.

USB 2.0 interference

B.

USB 3.0 interference

C.

EMI from the battery in the device

D.

RF incidental energy generated by the cooling fans in the laptop

Main Topic:ProtocolandSpectrum Analysis

Question:

How are EAP messages transported over 802.11 wireless LANs?

A.

EAP-Fast

B.

PEAP

C.

EAPOL

D.

EAP_TLS

Page: 2 / 5
Total 319 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved