Exam questions Flashcards

0
Q

What happens when client exclusion is set with a timeout value of zero?

A

Clients are excluded indefinitely

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

Maximum range of wireless PAN

A

50ft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What WCS cli command displays information like Show Run does?

A

Show running-config

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What attacks does Management Frame Protection help to mitigate?

A

Man-in-the-middle

DoS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which device(s) will Lightweight access points send control traffic to?

A

Wireless controller

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

For the following elements, which three define the 802.11n implementation of MIMO? (Choose
three.)

A. Channel Bonding
B. Maximal Ratio Combining
C. Spatial Multiplexing
D. Transmit Beam Forming

A

B. Maximal Ratio Combining
C. Spatial Multiplexing
D. Transmit Beam Forming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What action makes a client show up as a “Rogue Client”?

A

It sends unexpected frames

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

When is a workstation considered a client?

A

When it sends a probe request to an access point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What happens if a DHCP scope is not defined?

A

It becomes a DHCP Relay

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the default DHCP timer?

A

1 Day

86,400 seconds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

WPA uses TKIP and is a subset of the 802.11i standard. True or False?

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The central office is currently using a combination of 4400 and 2100 series WLAN controllers
running v4.2 and a variety of LWAPP-enabled access points servicing both 2.4 GHz and 5 GHz.
The WLAN deployment has been extended to each remote office by implementing a 526 WLAN
controller running v4.1 and several 521 access points. Wireless client deployment uses EAP-TLS
authentication by use of a centralized RADIUS server plus 802.11n for performance. After the first
remote office deployment, remote office users complain that they are not connecting via 802.11n.
Which will most likely cause this problem?

A. The 521 AP does not support 5 GHz, which prohibits 802.11n.
B. The 521 AP and 526 WLAN controllers do not support AES, which prohibits 802.11n.
C. The 526 WLAN controller does not support external authentication via RADIUS, prohibiting
authentication.
D. The 526 WLAN controller does not support 802.11n with either v4.1 or v4.2.
Pg 169

A

D. The 526 WLAN controller does not support 802.11n with either v4.1 or v4.2.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How do the characteristics that are available on the Cisco WCS for Linux version differ from those
of the Cisco WCS for Windows version?

A. Cisco WCS for Linux is required for deployments.
B. Assuming that there are no differences in hardware, a Cisco WCS for Linux can support up to
750 wireless LAN controllers. A Cisco WCS for Windows can support up to 250 wireless LAN
controllers.
C. Cisco WCS for Windows includes support for Cisco Spectrum Expert clients. Cisco WCS for
Linux does not support Cisco Spectrum Expert clients.
D. There are no differences in features between the Linux and Windows versions of Cisco WCS.

A

D. There are no differences in features between the Linux and Windows versions of Cisco WCS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

True or false: A wireless PAN consumes little power from small handheld computer devices.
T/F?

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

In the AP Layer 3 controller discovery process, after the LWAPP Discovery Request is broadcast
on a local subnet, which action will AP take next?

A. Send an LWAPP response to the master controller if known.
B. Send an LWAPP discovery request to controllers learned via OTAP if operational.
C. Wait 5 seconds and resend a Discovery Request to the local subnet.
D. Determine whether the controller responses are the primary controller.

A

B. Send an LWAPP discovery request to controllers learned via OTAP if operational.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which three values will be used to calculate Effective Isotropic Radiated Power? (Choose three.)

A. Antenna bandwidth
B. Antenna gain
C. Cable loss
D. Transmission power

A

B. Antenna gain
C. Cable loss
D. Transmission power

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

When importing a single campus map into the Cisco WCS 5.0, which four file formats will be
used? (Choose four.)

A. BMP 
B. PNG 
C. GIF 
D. JPEG 
E. JPG
A

B. PNG
C. GIF
D. JPEG
E. JPG

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

You are a network engineer at Company.com, when creating a wireless profile in the Cisco ADU
and you have selected the WPA/WPA2/CCKM radio button option, what other decision will you
make and then configure on this same screen?

A. The SSID of the wireless client
B. The length and value of the pre-shared key
C. The EAP type to be used for authentication
D. The encryption type

A

C. The EAP type to be used for authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is a common standard for wireless LANs?(Choose two)

A. IEEE 802.11
B. IEEE 802.3z
C. Wi-Fi
D. IEEE 802.16

A

A. IEEE 802.11

C. Wi-Fi

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Match the proper relationship between interface description and the appropriate.

  1. Designed to be analogous to VLANs for wireless LAN client device
  2. The only port that is active when the controller is in boot mode
  3. This interface is the only consistentlypingable in-band interface IP address on the Cisco WLC
  4. Used for Layer 3 communications between the Cisco WLC and the lightweight access points
  5. Used to support mobility management. DHCP relay, and guest web authencation.
I.AP Manager 
II.Dynamic 
III.Management 
IV.Service Port 
V.Virtual 

A. I-4,II-1,III-5,IV-2,V-3
B. I-4,II-1,III-2,IV-5,V-3
C. I-4,II-1,III-5,IV-3,V-2
D. I-4,II-1,III-2,IV-3,V-5

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which roaming situation using controllers in a Cisco Unified Wireless Network requires a client by
use of WPA2 with PKC to reauthenticate to the network?

A. A wireless client roams to another AP on the same controller.
B. A wireless client roams to another AP after being out of range of the network for 2 minutes.
C. A wireless client roams to another AP on a different controller in the same mobility domain.
D. A wireless client roams to another AP on a controller in a different mobility domain.

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which three methods of authentication are usually used in enterprise wireless networks? (Choose
three.)

A. AES 
B. CCKM 
C. PEAP 
D. EAP-FAST 
E. EAP-TLS
A

C D E

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

You are a network technician at Company.com, study the options carefully.A client is attached to
the Cisco Unified Wireless network by use of controllers. When the client is using WPA2
and EAP authentication, where are the wireless encryption keys located during the active user
session? (Choose two.)

A. On the client
B. On the Cisco WCS
C. On the RADIUS server
D. On the access point

A

A D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What relatively new standard applies to wireless MANs?

A. IEEE 802.11
B. IEEE 802.3z
C. Wi-Fi
D. IEEE 802.16.

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which statement best describes an infrastructure basic service set according to IEEE 802.11
specifications?

A. No relaying of signals from one client to another client.
B. Also called an Ad Hoc Network.
C. Enables the use of ESS.
D. The BSSID is generated from the first wireless client that starts up in the IBSS.

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Which of the following items increases bandwidth and resists multipath problems by carrying data
in subcarriers?

A. Narrow Band Frequency
B. Direct Sequence Spread Spectrum
C. Frequency Hopping Spread Spectrum
D. Orthogonal Frequency Division Multiplexing

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

In which format are the files saved, when creating new configuration profiles in Cisco Secure
Services Client?

A. TXT
B. RTF
C. HTML
D. XML

A

D XML

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

A controller is connected to a Cisco IOS Catalyst switch. The following is the switch port
configuration:

interface GigabitEthernet 1/0/10 
switchport 
switchport trunk encapsulation dot1q 
switchport trunk allowed vlan 1,20,30,50 
switchport trunk native vlan 20 
switchport mode trunk 

Which one of the controller CLI commands assigns its management interface to the Cisco IOS
Catalyst switch native vlan interface?

A. Config interface vlan management 0
B. Config interface vlan management 20
C. Config interface vlan management 30
D. Config interface vlan management 1

A
A. Config interface vlan management 0
Pg 337
 here’s an important 
command you’ll want to commit to memory now that assigns the management interface of 
the WLC to the switch’s native VLAN:
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

True or false: A computer device stores data in analog form.

A. True
B. False

A

False

Digital

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Which two statements correctly describe beacon frames used by access points? (Choose two.)

A. Provides vendor proprietary information
B. Contains SSIDs if this feature is enabled
C. Sent in response to a probe frame
D. Is another name for an associated request

A

A. Provides vendor proprietary information

B. Contains SSIDs if this feature is enabled

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What is the reason that Cisco recommends using Tftpd32 version 3.0 or later when upgrading
wireless LAN controller software to release 4.1 or later?

A. Tftpd32 is Cisco Compatible Extensions version 4 compliant
B. Tftpd32 supports TFTP file transfers larger than 32 MB
C. Tftpd32 is a component of CiscoWorks LMS
D. Tftpd32 supports EoIP tunneling which is required for remote Cisco WLC upgrades

A

B. Tftpd32 supports TFTP file transfers larger than 32 MB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q
For the following options, which set of commands assigns a standalone access point an IP 
address of 10.0.0.24 with a 27-bit subnet mask and a gateway of 10.0.0.1? 
A. Config t
interface Dot11Radio0 
ip address 10.0.0.24 255.255.255.224 
exit 
ip default-gateway 10.0.0.1 
B. config t 
interface BVI1 
ip address 10.0.0.24 255.255.255.224 
exit 
ip default-gateway 10.0.0.1 
C. config t 
interface BVI1 
ip address 10.0.0.24 255.255.255.192 
exit 
ip default-gateway 10.0.0.1 
D. config t 
interface FastEthernet1 
ip address 10.0.0.24 255.255.255.224 
exit 
ip default-gateway 10.0.0.1
A
B. config t 
interface BVI1 
ip address 10.0.0.24 255.255.255.224 
exit 
ip default-gateway 10.0.0.1
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

you have the Cisco ADU installed but wish to use the Windows Zero Config utility to configure a
wireless network profile, which action should you take first?

A. Uninstall the Cisco ADU.
B. Define a common profile in both the Cisco ADU and WZC.
C. In the WZC utility, make sure that the box labeled “Use Windows to configure my Wireless
Network Settings” is checked.
D. Define the wireless profile in the Wireless Networks tab in WZC.

A

C. In the WZC utility, make sure that the box labeled “Use Windows to configure my Wireless
Network Settings” is checked.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

On what layers of the OSI reference model do wireless networks operate?(Choose two)

A. Physical layer
B. Network layer
C. Data link layer.
D. Session layer

A

A. Physical layer

C. Data link layer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

How to differ application-specific devices from laptop computers in the way they support Cisco
Compatible Extensions?

A. There is no differentiation. ASDs and laptops must both support the same CCX features.
B. ASDs are required to support only CCXv1 and v2 features. Laptops must support all CCX
features.
C. Several features that are required for laptops are not required for ASDs.
D. ASDs are required to support only CCXv5 management features, while laptops are optional
features.

A

C. Several features that are required for laptops are not required for ASDs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

When choosing an EAP type for your Cisco ADU security profile, in order to authenticate
successfully, what must you ensure?

A. That the time set on the clocks for the wireless client and the authenticator are close to the
same time
B. That the client and authentication server support the same encryption protocol
C. That the EAP type that you selected is supported by the authentication server
D. That the EAP type selected is known not to exchange any of its credentials in the clear

A

C. That the EAP type that you selected is supported by the authentication server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

EAP-FAST is an authentication protocol that creates a secure tunnel without using certificates.
EAP-FAST was first supported where?

A. CCXv4
B. CCXv1
C. CCXv3
D. CCXv2

A

C. CCXv3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

For the following items, which is derived from measuring the RF duty cycle?

A. LWAPP header length
B. Dynamic channel selection
C. RF utilization
D. Transmit power control

A

C. RF utilization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

RF signals offer relatively short range as compared to light signals. True or false?

A. True
B. False

A

B. False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Which security benefit is enabled by use of Management Frame Protection?

A. Prevents the formation of client ad hoc networks within the RF coverage domain.
B. Protects the network infrastructure from denial-of-service attacks that attempt to flood the
network with associations and probes.
C. Detects network reconnaissance probes, like those used by tools like NetStumbler, that
attempt to discover the wireless network topology.
D. Provides encryption of administrator sessions between a wireless client and a wireless LAN
controller.

A

B. Protects the network infrastructure from denial-of-service attacks that attempt to flood the
network with associations and probes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Observe the following items carefully, In 802.1X, which is the supplicant?

A. The device that performs the authentication
B. The point of access
C. The machine that attempts to access the network
D. The machine in the network that keeps a list of conditions

A

C. The machine that attempts to access the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Which three primary components describe TKIP? (Choose three.)

A. Message Integrity Check
B. Dynamic WEP
C. Per-Packet Key Hashing
D. Broadcast Key Rotation

A

A. Message Integrity Check
C. Per-Packet Key Hashing
D. Broadcast Key Rotation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

802.1X defined which three roles? (Choose three.)

A. Authenticatee 
B. AAA Server 
C. Authentication Server 
D. Supplicant 
E. Authenticator
A

C. Authentication Server
D. Supplicant
E. Authenticator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Spread spectrum generally requires user licenses. True or false?

A. True
B. False

A

B. False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Which one of the following CLI commands would be used on a Cisco WLC to troubleshoot
mobility, rogue detection, and load-balancing events?

A. Debug dot11
B. Debug lwapp
C. Show dot11 details
D. Show lwapp details

A

A. Debug dot11

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Examine the following items carefully, which three Cisco Unified Wireless Network capabilities
use information that Radio Resource Management neighbor messages provide? (Choose 3)
A. Aggressive Load Balancing
B. Over-the-Air Provisioning
C. Hybrid Remote Edge Access Point
D. Inter-controller Mobility (that is, Mobility Groups)
E. Rogue AP Classification
F. Dynamic Channel Assignment

A

B. Over-the-Air Provisioning
E. Rogue AP Classification
F. Dynamic Channel Assignment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

What is the effect of configuring a single SSID to simultaneously support both TKIP and AES
encryption?

A. This is a common configuration for migrating from WPA to WPA2. There is no problem
associated with using this configuration.
B. Some wireless client drivers might not handle complex SSID settings and may be unable to
associate to the WLAN.
C. The overhead associated with supporting both encryption methods will significantly degrade
client throughput.
D. This is an unsupported configuration and the Cisco Wireless Control System will continuously
generate alarms until the configuration is corrected.

A

B. Some wireless client drivers might not handle complex SSID settings and may be unable to
associate to the WLAN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

For the following items, which is the Default Local Database size for authenticating local users?

A. 512 entries
B. 4096 entries
C. 1024 entries
D. 2048 entries

A

A. 512 entries

48
Q

Approximately up to what range do direct infrared systems operate?

A. 0.5 mile
B. 1 mile
C. 1.5 mile
D. 2.0 mile

A

B. 1 mile

49
Q

Which statement is true about the authorization aspect of AAA?

A. Authorization takes place after a successful authentication and provides the Cisco WLC the
information needed to allow client access to network resources.
B. Successful authorization will provide encryption keys that will be used to secure the wireless
communications between client and AP.
C. Authorization is the validation of successful DHCP address delivery to the wireless client.
D. Authorization must be successfully completed in order to proceed with the authentication
phase.

A

A. Authorization takes place after a successful authentication and provides the Cisco WLC the
information needed to allow client access to network resources.

50
Q

Which two descriptions are correct about LWAPP? (Choose two.)

A. Communication between the AP and the WLC
B. Lightweight Access Point provisioning
C. Cisco proprietary
D. Communication between the AP and client

A

A. Communication between the AP and the WLC

C. Cisco proprietary

51
Q

Which type of Extensible Authentication Protocol is supported by the Cisco Unified Wireless
Network?

A. LEAP and EAP-FAST only
B. EAP-TLS, PEAP-MSCHAPv2 and PEAP-GTC only
C. EAP-TLS, PEAP-MSCHAPv2, PEAP-GTC, LEAP, EAP-FAST only
D. Any EAP supported by the RADIUS authentication server

A

D. Any EAP supported by the RADIUS authentication server

52
Q

Observe the following options, can you tell me which modulation technique allows you to achieve
a data rate of 54Mb/s in the 2.4GHz-band?

A. Differential Binary Phase Shift Keying
B. Differential Quadrature Phase Shift Keying
C. Complimentary Code Keying
D. Quadrature Amplitude Modulation

A

D. Quadrature Amplitude Modulation

53
Q

What is the general maximum coverage area of a wireless PAN?

A. Within 30 feet
B. Within 35 feet
C. Within 40 feet
D. Within 45 feet

A

A. Within 30 feet

54
Q

Omni antennas are very easy to install. How are omni antennae in a wireless network most
commonly polarized?

A. Horizontally
B. circularly
C. Vertically
D. Both horizontally and vertically

A

C. Vertically

55
Q

As a network technician, can you tell me which two services are offered on Cisco Unified
Wireless Networks running controller v5.0 but not offered on Cisco Mobility Express Solution by
use of 526 controllers with v4.2 code? (Choose two.)

A. GUI management 
B. Authentication using 802.1X 
C. Guest access 
D. Location services 
E. IDS/IPS
A

D. Location services

E. IDS/IPS

56
Q

During the WPA authentication process, which key is the 4-way handshake used to establish?

A. Pairwise Session Key
B. Pairwise Master Key
C. Pairwise Multiple Key
D. Pairwise Transient Key

A

D. Pairwise Transient Key

57
Q

Which condition must exist in order to seamlessly roam between two wireless cells in a Cisco
Unified Wireless Network using controllers?

A. The client’s password must be the same on both APs.
B. The next cell should be on the same channel as the client’s current cell.
C. The wireless client must use an EAP authentication method with the infrastructure
authenticator.
D. The next cell should provide the same SSID as the client’s current cell.

A

D. The next cell should provide the same SSID as the client’s current cell.

58
Q

Which IEEE standards group uses Bluetooth as the basis for the standard?

A. IEEE 802.15
B. IEEE 802.11
C. IEEE 802.13
D. IEEE 802.16

A

A. IEEE 802.15

59
Q

RRM plays a critical role in optimizing, fairly allocating and adaptively reusing the scarce
resources in wireless communication. Which two tasks does RRM routinely perform? (Choose
two.)

A. Antenna selection 
B. AP address assignment 
C. Transmit power control 
D. Encryption method assignment 
E. Channel assignment
A

C. Transmit power control

E. Channel assignment

60
Q

Which four parameters need to be configured for local EAP-FAST on the controller? (Choose
four.)

A. Server Key 
B. TTL for PAC 
C. Client Key 
D. PAC 
E. Authority ID 
F. Authority ID Information
A

A. Server Key
B. TTL for PAC
E. Authority ID
F. Authority ID Information

61
Q

More often than not, what is the difference in transmit power between an AP operating at Tx
Power Level 1 and the same AP operating at Tx Power Level 3?

A. 11 dB
B. 2 dB
C. 6 dB
D. 3 dB

A

C. 6 dB

62
Q

Which governing body analyzes the applications and environments in which wireless networks
are used?

A. FCC
B. EIRP
C. ETSI
D. IEEE

A

D. IEEE

63
Q

In what frequency band does Bluetooth operate?

A. 2.2 GHz
B. 2.4 GHz
C. 2.6 GHz
D. 3.0 GHz

A

B. 2.4 GHz

64
Q

When using the enterprise-based authentication method for WPA2, a bidirectional handshake
exchange occurs between the client and the authenticator. Which five options will be the results
of that exchange by use of controller based network?

A. Proof that each side is alive
B. Creation of the Pairwise Transient Key
C. Distribution of the Group Transient Key
D. Binding of a Pairwise Master Key at the client and the controller
E. A bidirectional exchange of a nonce used for key generation

A

All

65
Q

Which four features are of WPA? (Choose four.)

A. Unicast and broadcast key management
B. Authenticated key management using 802.1X
C. A message integrity check protocol to prevent forgeries
D. Support for a key caching mechanism
E. A larger initialization vector, increased to 48 bits

A

A. Unicast and broadcast key management
B. Authenticated key management using 802.1X
C. A message integrity check protocol to prevent forgeries
E. A larger initialization vector, increased to 48 bits

66
Q

Which two actions will you take to begin to troubleshoot an access point that fails to successfully
join a wireless LAN controller? (Choose two.)

A. SSH to the Cisco WCS
B. SSH to the AP
C. Cisco WLC command: debug lwapp events enable
D. SSH to the Cisco WLC

A

C. Cisco WLC command: debug lwapp events enable

D. SSH to the Cisco WLC

67
Q

ETSI produces globally-applicable standards for Information and Communications Technologies
(ICT). What does the current European Telecommunications Standards Institute rule state is the
2.4-GHz maximum transmitter output power for point-to-point installations?

A. 20 dBm
B. 17 dBm
C. 30 dBm
D. 16 dBm

A

B. 17 dBm

68
Q

A Bluetooth-enabled device is always transmitting. True or false?

A

False

69
Q

The office is now operational using one 2106 WLAN controller with six 1131 APs and one 526
WLAN controller with three 521 APs. When the 526 loses power, the 521 APs do not build up a
connection with the 2106 WLAN controller. What will most likely cause this problem?

A. The 2106 controller and 526 controller do not share the same mobility group name.
B. The 521 APs were not configured with the 2106 controller as the secondary controller.
C. The 2106 controller and 526 controller were not configured correctly using the sysname and
MAC address for a mobility group.
D. The 2106 controller does not support the 521 APs.

A

D. The 2106 controller does not support the 521 APs.

70
Q

ons: 72
Which CLI command will be used on the Cisco WLC to show detailed information for a client
related to a lightweight access point?

A. Show exclusionlist
B. Debug dot11
C. Show client detailed
D. Show arp switch

A

C. Show client detailed

71
Q

Which two attributes are used to characterize antenna performance? (Choose two.)

A. Harmony
B. Gain
C. Beamwidth
D. Attenuation

A

B. Gain
C. Beamwidth
Antenna performance can be measured with respect
to its beamwidth (narrowly focused or widely focused) and its gain (range). The more gain,
the tighter the beamwidth.

72
Q

For the following interfaces, which one is considered a dynamic interface?

A. The LAG interface
B. The AP manager interface
C. The virtual interface
D. A WLAN client data interface

A

D. A WLAN client data interface

73
Q

What is the highest possible data rate of an IrDA device?

A. 2 Mbps
B. 4 Mbps
C. 6 Mbps
D. 8 Mbps

A

B. 4 Mbps

74
Q

Which statement is true about the procedure for a lightweight AP to successfully establish a
connection to a controller?

A. AP sends its certificate to the RADIUS server. AP then authenticates the controller certificate
as valid.
B. AP sends its certificate to the controller. AP then authenticates the received Cisco WLC
certificate as valid.
C. AP sends its certificate to the RADIUS server. AP then authenticates the RADIUS certificate
as valid.
D. AP authenticates the received Cisco WLC certificate as valid. AP then sends its certificate to
the controller.

A

B. AP sends its certificate to the controller. AP then authenticates the received Cisco WLC
certificate as valid.

75
Q

Which of the following options has Bluetooth RF characteristics?

A. Frequency hopping - 5-GHz range
B. Continuous transmitting - 5-GHz range
C. Continuous transmitting - 2.4-GHz range
D. Frequency hopping - 2.4-GHz range

A

D. Frequency hopping - 2.4-GHz range

76
Q

Which description is correct about an Ad Hoc Network?

A. Mesh Network
B. Basic Service Set
C. Independent Basic Service Set
D. Extended Service Set

A

C. Independent Basic Service Set

77
Q

Which command path is correct regarding how to access the Cisco WCS 5.0 ability to
troubleshoot clients?

A. Monitor -> Clients -> select displayed client’s MAC address
B. Tools -> Clients -> select displayed client’s MAC address
C. Tools -> Clients -> enter client’s MAC address
D. Monitor -> Clients -> enter client’s MAC address

A

D. Monitor -> Clients -> enter client’s MAC address

78
Q

EP is a mandatory encryption mechanism. True or false?

A. True
B. false

A

False

79
Q

What two statements best describe AES-CCMP? (Choose two.)

A. It is required in WPA2.
B. It is required in WPA.
C. It is defined in 802.1X.
D. It is the encryption algorithm used in TKIP implementations.
E. It is an encryption algorithm used in the 802.11i security protocol.

A

A. It is required in WPA2.

E. It is an encryption algorithm used in the 802.11i security protocol.

80
Q

As a network technician, can you tell me when would rate shifting down by a client occur?

A. When the distance to the AP has increased and the missed-symbol rate has increased
B. When the noise level has decreased and the signal level has increased
C. When the distance to the AP has increased and the signal level has increased
D. When multipath has decreased and the missed-symbol rate has decreased

A

A. When the distance to the AP has increased and the missed-symbol rate has increased

81
Q

By doing what is the configuration of a wireless LAN controller as a RADIUS client ensured?

A. Implementing an EAP exchange between the CiscoSecure RADIUS server and the controller
B. Using an encrypted tunnel between the CiscoSecure RADIUS server and the controller
C. Defining a RADIUS server secret at both the CiscoSecure RADIUS server and the controller
D. Adding the MAC address of the physical port of the controller into the trusted client table of the
CiscoSecure RADIUS server

A

C. Defining a RADIUS server secret at both the CiscoSecure RADIUS server and the controller

82
Q

For the following physical layer encoding technologies, which one is common to both the IEEE
802.11g and the IEEE 802.11a standards?

A. DSSS
B. BPSK
C. CCK
D. OFDM

A

D. OFDM

83
Q

In what frequency band does 802.11a operate in?

A. 2.2 GHz
B. 2.4 GHz
C. 2.6 GHz
D. 5 GHz

A

D. 5 GHz

84
Q

Which primary method is of configuration management for the Mobility Express Solution?

A. CLI and Web GUI
B. CCA and Web GUI
C. CCA and CLI
D. CLI, Web GUI, and CCA

A

B. CCA and Web GUI

85
Q

On a Cisco Unified Wireless Controller, which three Access Point modes allow for client
connectivity? (Choose three.)

A. Local Mode
B. Bridge Mode
C. H-REAP Mode
D. Monitor Mode

A

A. Local Mode
B. Bridge Mode
C. H-REAP Mode

86
Q

What information is needed to add a Cisco WLC into the Cisco WCS?

A. IP address of virtual interface
B. IP address of AP manager interface
C. IP address of management interface
D. IP address of service port

A

C. IP address of management interface

87
Q

Observe the following items, which open standard defines the combination of Extensible
Authentication Protocol with Advanced Encryption Standard to provide strong wireless LAN client
security?

A. WEP
B. IEEE 802.11i
C. WPA
D. IEEE 802.1X

A

B. IEEE 802.11i

88
Q

How many non-overlapping channels are available with 802.11b wireless LANs?

A. One
B. Two
C. Three
D. Four

A

C. Three

89
Q

What is the reason that wireless analog video signals that are operating in the 2.4-GHz band are
particularly harmful to Wi-Fi service?

A. Analog Video modulation is the same as Wi-Fi and causes interference.
B. Analog video is a constant signal with 100% duty cycle.
C. Analog video is a strong signal and increases the SNR.
D. Analog video signals are slow frequency hopping and tend to affect the entire band.

A

B. Analog video is a constant signal with 100% duty cycle.

90
Q

One of the advantages of implementing EAP-FAST is that it is not necessary to implement which
item as part of your authentication infrastructure?

A. A RADIUS server
B. A Certificate Authority infrastructure
C. A client that supports EAP-FAST
D. An access control server

A

B. A Certificate Authority infrastructure

91
Q

An indoor 1240 AP is booting and has obtained an IP address by use of DHCP. The AP has
confirmed prior controller IP addresses from a previously joined mobility group stored in NVRAM.
Which action will AP take next?

A. DHCP option 43.
B. Layer 2 LWAPP discovery broadcast.
C. Layer 3 LWAPP discovery broadcast.
D. DNS resolution of CISCO-LWAPP-CONTROLLER.localdomain.

A

A. DHCP option 43.

92
Q

You work as a network engineer at Company.com, study the subject carefully.A WLAN
deployment will use a combination of Cisco Aironet AP 1240s and multiple Cisco 4404 Wireless
LAN Controllers to provide wireless LAN access to end-users. The network administrator has
decided to use DHCP Option 43 to enable the APs to discover the wireless LAN controllers.
When configuring the DHCP scope, which format should be used for the Cisco WLC addresses?

A. A comma-separated ASCII string of Cisco WLC virtual IP addresses
B. A comma-separated ASCII string of Cisco WLC AP-manager addresses
C. A comma-separated ASCII string of Cisco WLC management addresses
D. A hexadecimal string of Cisco WLC management addresses

A

D. A hexadecimal string of Cisco WLC management addresses

93
Q

True of false: 802.11g operates at up to 54 Mbps and interoperates with 802.11b.

A. True
B. False

A

True

94
Q

Which maximum number is of lightweight APs that can be supported from a single Cisco WCS
Navigator management console with Cisco WCS and Cisco WLC running v5.0 code?

A. 20,000
B. 5,000
C. 10,000
D. 30,000

A

D. 30,000

95
Q

A lightweight AP has been deployed in local mode in a network consisting of 10 wireless LAN
controllers in a single mobility group. The AP has been configured to use primary, secondary, and
tertiary WLCs. Because of a major power failure, the AP’s primary, secondary, and tertiary Cisco
WLCs are all unavailable. Which action will be taken next by the AP?

A. The AP will attempt to join the Cisco WLC with the greatest amount of available capacity.
B. The AP will attempt to join a Cisco WLC configured as a “Master Controller.”
C. The AP state will transition to AP Fallback Mode and continue providing limited WLAN services
(that is, no new client authentications) until a WLC is again available.
D. The AP will reboot and repeatedly attempt to join the configured primary, secondary, and
tertiary Cisco WLCs in that order. The process will continue until one of the configured WLCs
is again available.

A

B. The AP will attempt to join a Cisco WLC configured as a “Master Controller.”

96
Q

Which two functions are the pre-shared key used for when using the Pre-Shared Key
authentication method for WPA or WPA2? (Choose two.)

A. To derive the nonce at each side of the exchange
B. To derive the Pairwise Transient Key
C. To act as the Group Transient Key during the bidirectional handshake
D. To act as the Pairwise Master Key during the bidirectional handshake

A

B. To derive the Pairwise Transient Key

D. To act as the Pairwise Master Key during the bidirectional handshake

97
Q

Which client application utility allows wireless configuration on Linux platforms?

A. Cisco Secure Services Client
B. Airport Extreme
C. Cisco Aironet Desktop Utility
D. NetworkManager

A

D. NetworkManager

98
Q

Which 802.11 frequencies are available almost worldwide?

A. 2.2 GHz
B. 2.4 GHz
C. 2.6 GHz
D. 5 GHz

A

B. 2.4 GHz

99
Q

Which authentication method best supports a large enterprise deployment where over the air
security is a necessity?

A. PSK with WEP
B. WPA with PSK
C. Open Authentication with Web Authentication
D. WPA2 with EAP-FAST

A

D. WPA2 with EAP-FAST

100
Q

Which three elements compose the Cisco Secure Services Client suite? (Choose three.)

A. Cisco Secure Services Client Administration Utilities
B. Cisco Secure Services Client
C. Cisco Secure Services Client Auditor
D. Cisco Secure Services Client Log Packager

A

A. Cisco Secure Services Client Administration Utilities
B. Cisco Secure Services Client
D. Cisco Secure Services Client Log Packager

101
Q

Which one of the following items applies to TKIP?

A. Is used to encrypt a WEP authenticated session
B. Is part of the initial key exchange used to derive a pairwise temporal key
C. Is used to encrypt the data for WPA sessions
D. is used to secure the initial authentication credential exchange between client and
authenticator

A

C. Is used to encrypt the data for WPA sessions

102
Q

Cisco wireless requires that controllers within a mobility group have which three common
characteristics? (Choose three.)

A. Controllers must be in the same subnet
B. Virtual interface IP address
C. Mobility group name
D. Version of controller code

A

B. Virtual interface IP address
C. Mobility group name
D. Version of controller code

103
Q

A learning bridge forwards all packets. True or false?

A. True
B. False

A

False

104
Q

Which two statements best describe WiMAX technology? (Choose two.)

A. WiMAX works only for licensed frequencies.
B. WiMAX is capable of working as a long-range system over several miles.
C. Typically, fixed WiMAX networks have a higher gain direction antenna installed near the client.
D. WiMAX is defined by 802.11i.

A

B. WiMAX is capable of working as a long-range system over several miles.
C. Typically, fixed WiMAX networks have a higher gain direction antenna installed near the client.

105
Q

You work as a network technician at Company.com, study the situation carefully, then answer the
question.The corporate network locates all RADIUS servers at the centralized data center for
authentication. The remote offices use access points operating in H-REAP mode using v5.0 code
with various local and central switch WLANs. When a remote office has lost connectivity to the
main corporate network due to a WAN outage, which two statements are true about the status of
that remote office when H-REAP access points are operating in standalone mode? (Choose two.)

A. All clients will continue association until the respective authentication timers expire.
B. All Cisco APs with 16 MB of RAM or more can operate as standalone H-REAP.
C. If configured, clients using WPA or WPA2 with PSK and locally switched WLANs will continue
to operate.
D. If configured, locally switched WLANs will continue operation using Local-EAP for EAP-LEAP
and EAP-FAST for up to twenty users.

A

C. If configured, clients using WPA or WPA2 with PSK and locally switched WLANs will continue
to operate.
D. If configured, locally switched WLANs will continue operation using Local-EAP for EAP-LEAP
and EAP-FAST for up to twenty users.

106
Q

The Cisco 526 Wireless Express Mobility Controller is a network appliance that automatically
optimizes the basic wireless network and supports advanced mobility services on top of that
network. A new Cisco Mobility Express 526 controller using v4.2 code direct from the factory is
accessible by which default IP address?

A. 172.16.100.1
B. 10.10.1.1
C. 172.16.1.1
D. 192.168.1.1

A

D. 192.168.1.1

107
Q

Using Cisco WCS v5.0, which configuration command option allows you to see a summary of all
access points in the Cisco WCS database?

A. Configure -> Config Groups
B. Configure -> Access Points
C. Configure -> Chokepoints
D. Configure -> Controllers

A

B. Configure -> Access Points

108
Q

Which standards do wireless MANs employ?(Choose three)

A. Wi-Fi
B. IEEE 802.11
C. IEEE 802.13
D. IEEE 802.16

A

A. Wi-Fi
B. IEEE 802.11
C. IEEE 802.13

109
Q

Which four file formats will be used when importing a single campus map into the Cisco WCS
5.0? (Choose four.)

A. BMP 
B. JPEG 
C. JPG 
D. PNG 
E. GIF
A

B. JPEG
C. JPG
D. PNG
E. GIF

110
Q

For the following options, which AP to Wireless LAN Controller discovery process requires a
previous association of the AP with a Cisco WLC?

A. AP priming
B. DHCP Option 6
C. DHCP Option 43
D. Defining a master controller

A

A. AP priming

111
Q

What unit of measurement is used for representing the strength of an antenna’s radiation pattern?

A. dBi
B. mW
C. dBm
D. GHz

A

A. dBi

112
Q

A controller-based wireless solution can avoid interference by dynamically adjusting which two
access point transmission features? (Choose two.)

A. Transmit power levels
B. switch PORT PARAMETERS
C. Operating RF channel
D. SSID names

A

A. Transmit power levels

C. Operating RF channel

113
Q

True or false: FDMA requires users to take turns transmitting signals.

A. True
B. False

A

False

114
Q

WPA uses TKIP and is a subset of the 802.11i standard. True or false?

A. True
B. False

A

True

115
Q

Two types of AP configuration software that enable supercool features.

A. ADU
B. CSSC
C. EAP
D. SSL

A

A. Aironet Desktop Utility

B. Cisco Secure Services Client

116
Q

Two types of AP configuration software that enable supercool features.

A. ADU
B. CSSC
C. EAP
D. SSL

A

A. Aironet Desktop Utility

B. Cisco Secure Services Client

117
Q

Two types of AP configuration software that enable supercool features.

A. ADU
B. CSSC
C. EAP
D. SSL

A

A. Aironet Desktop Utility

B. Cisco Secure Services Client

118
Q

Two types of AP configuration software that enable supercool features.

A. ADU
B. CSSC
C. EAP
D. SSL

A

A. Aironet Desktop Utility

B. Cisco Secure Services Client