Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = getmirror

Pass the CWNP CWAP Wi-Fi Analysis CWAP-405 Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam CWAP-405 Premium Access

View all detail and faqs for the CWAP-405 exam


735 Students Passed

87% Average Score

96% Same Questions
Viewing page 3 out of 4 pages
Viewing questions 21-30 out of questions
Questions # 21:

You have been asked to recommend a solution for protocol capture of 802.11 frames consisting of 3x3:3 802.11ac communications. The requirement specifies that you gain a general view of a coverage area and does not require that you capture from specific user locations. The solution must be the least expensive practical solution possible that does not disrupt user access to the WLAN and it must be based on enterprise WLAN hardware.

What solution would you recommend so that any coverage area could be monitored on demand?

Options:

A.

Install laptop-based protocol analyzer near each AP

B.

Install Wireshark on the Aps natively to allow dynamic capture while serving clients

C.

Install the minimum number of Aps required for coverage and use these Aps for protocol analysis as needed

D.

Install sufficient Aps so that an AP can be taken offline to perform protocol analysis as needed

Questions # 22:

When performing protocol analysis, you notice a high number of RTS/CTS frames being transmitted on an HT network. You suspect this may be due to HT protection mechanisms. Where in the Beacon frame would you look to determine which one of the four HT protection modes the AP is operating in?

Options:

A.

HT Protection Element

B.

HT Information Element

C.

HT Operation Element

D.

Non-HT Present Element

Questions # 23:

Where would you look in a packet trace file to identify the configured Minimum Basic Rate (MBR) of a BSS?

Options:

A.

Supported Rates & Extended Supported Rates elements in a Beacon frame

B.

In the MBR Action frame

C.

In the MBR Information Element in an Association Response frame

D.

In the Minimum Basic Rate Element in a Beacon frame

Questions # 24:

When performing protocol analysis, you capture an 802.1 lac data frame on channel 52, transmitted at MCS 8. At what data rate was the PHY Preamble transmitted?

Options:

A.

54 Mbps

B.

86.7 Mbps

C.

6 Mbps

D.

78 Mbps

Questions # 25:

As the WLAN administrator in your organization you are responsible for troubleshooting connection issues. Several STAs are connecting to the network, but are unable to communicate after connection. You suspect a DHCP problem. After capturing traffic on the wired-side of the AP, you want to view only DHCP traffic.

What filter in Wireshark can be used for this purpose?

Options:

A.

DHCPv6

B.

DHCP

C.

BOOTP

D.

DHCPv4

Questions # 26:

You are explaining capacity planning to another engineer assisting you on a WLAN implementation project. As part of the explanation, you provide the following formula: C = B * log2(1 + S/N).

What does this formula define?

Options:

A.

Bandwidth capabilities of a channel

B.

The WEP encryption algorithm

C.

Minimum signal strength for a data rate

D.

Maximum signal strength of a channel

Questions # 27:

VoIP is used heavily in your organization. You must troubleshoot problems with dropped calls on the WLAN.

What is a common cause of dropped calls when using Wi-Fi VoIP phones?

Options:

A.

Use of WMM

B.

Data rates below 54 Mbps

C.

Data rates below 75 Mbps

D.

Slow roaming

Questions # 28:

As a wireless network consultant you have been called in to troubleshoot a high-priority issue for one of your customers. The customer's office is based on two floors within a multi-tenant office block. On one of these floors (floor 5) users cannot connect to the wireless network. During their own testing the customer has discovered that users can connect on floor 6 but not when they move to the floor 5. This issue is affecting all users on floor 5 and having a negative effect on productivity.

To troubleshoot this issue, you perform both Spectrum and Protocol Analysis. The Spectrum Analysis shows the presence of Bluetooth signals which you have identified as coming from wireless mice. In the protocol analyzer you see the top frame on the network is Deauthentication frames. On closer investigation you see that the Deauthentication frames' source addresses match the BSSIDs of your customers APs and the destination address is FF:FF:FF:FF:FF:FF:FF.

What do you conclude from this troubleshooting exercise?

Options:

A.

The customer should replace all their Bluetooth wireless mice as they are stopping the users on floor 5 from connecting to the wireless network

B.

The users on floor 5 are being subjected to a denial of service attack, as this is happening across the entire floor it is likely to be a misconfigured WIPS solution belonging to the tenants on the floor below

C.

The customers APs are misbehaving and a technical support case should be open with the vendor

D.

The CCI from the APs on the floor 4 is the problem and you need to ask the tenant below to turn down their APs Tx power

Questions # 29:

Which one of the following portions of information is communicated by bits in the PHY Header?

Options:

A.

SNR

B.

Noise

C.

Data rate

D.

Signal strength

Questions # 30:

You have implemented centralized, infrastructure-based spectrum analysis. The Aps are configured to perform spectrum analysis in an ad-hoc manner and will go offline as Aps to perform this duty when needed.

What unique method of spectrum analysis monitoring is provided by this solution that is not typically available in a laptop-based analyzer?

Options:

A.

Web-based viewing

B.

Real-time FFT

C.

Band selection

D.

RBW adjustments

Viewing page 3 out of 4 pages
Viewing questions 21-30 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.