CWNP CWDP-305 - Certified Wireless Design Professional
What term refers to the security practice of obfuscating actual data from unintended receivers as the data crosses the transmission medium?
Aesthetics are very important in some environments. What common installation technique can be used to best meet this requirement in a stadium?
When conducting information gathering for a WLAN design, which document ensures your customer's proprietary information remains confidential and protected from unauthorized disclosure?
When performing an indoor predictive site survey to make the WLAN planning and design cycle more efficient, what is a best practice for configuration of the simulated APs in the predictive modeling software?
What is the purpose of a Physical Installation Guide document?
What document can be useful when determining client capabilities in a WLAN design project?
A table of VLANs in a _________ document should include what device performs ________ services.
What service must be implemented on your customers' network to authenticate users against an LDAP database prior to access to the WLAN infrastructure being granted?
You're about to deploy an Enterprise-class VoWLAN infrastructure. You need to ensure that QoS is properly configured throughout the network. What Access Category (AC) should voice frames/packets use?
You are conducting a physical site survey where heavy machinery is repaired. What is a common item required specifically for this type of survey?
