Exam questions Flashcards

0
Q

What happens when client exclusion is set with a timeout value of zero?

A

Clients are excluded indefinitely

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

Maximum range of wireless PAN

A

50ft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What WCS cli command displays information like Show Run does?

A

Show running-config

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What attacks does Management Frame Protection help to mitigate?

A

Man-in-the-middle

DoS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which device(s) will Lightweight access points send control traffic to?

A

Wireless controller

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

For the following elements, which three define the 802.11n implementation of MIMO? (Choose
three.)

A. Channel Bonding
B. Maximal Ratio Combining
C. Spatial Multiplexing
D. Transmit Beam Forming

A

B. Maximal Ratio Combining
C. Spatial Multiplexing
D. Transmit Beam Forming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What action makes a client show up as a “Rogue Client”?

A

It sends unexpected frames

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

When is a workstation considered a client?

A

When it sends a probe request to an access point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What happens if a DHCP scope is not defined?

A

It becomes a DHCP Relay

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the default DHCP timer?

A

1 Day

86,400 seconds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

WPA uses TKIP and is a subset of the 802.11i standard. True or False?

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The central office is currently using a combination of 4400 and 2100 series WLAN controllers
running v4.2 and a variety of LWAPP-enabled access points servicing both 2.4 GHz and 5 GHz.
The WLAN deployment has been extended to each remote office by implementing a 526 WLAN
controller running v4.1 and several 521 access points. Wireless client deployment uses EAP-TLS
authentication by use of a centralized RADIUS server plus 802.11n for performance. After the first
remote office deployment, remote office users complain that they are not connecting via 802.11n.
Which will most likely cause this problem?

A. The 521 AP does not support 5 GHz, which prohibits 802.11n.
B. The 521 AP and 526 WLAN controllers do not support AES, which prohibits 802.11n.
C. The 526 WLAN controller does not support external authentication via RADIUS, prohibiting
authentication.
D. The 526 WLAN controller does not support 802.11n with either v4.1 or v4.2.
Pg 169

A

D. The 526 WLAN controller does not support 802.11n with either v4.1 or v4.2.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How do the characteristics that are available on the Cisco WCS for Linux version differ from those
of the Cisco WCS for Windows version?

A. Cisco WCS for Linux is required for deployments.
B. Assuming that there are no differences in hardware, a Cisco WCS for Linux can support up to
750 wireless LAN controllers. A Cisco WCS for Windows can support up to 250 wireless LAN
controllers.
C. Cisco WCS for Windows includes support for Cisco Spectrum Expert clients. Cisco WCS for
Linux does not support Cisco Spectrum Expert clients.
D. There are no differences in features between the Linux and Windows versions of Cisco WCS.

A

D. There are no differences in features between the Linux and Windows versions of Cisco WCS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

True or false: A wireless PAN consumes little power from small handheld computer devices.
T/F?

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

In the AP Layer 3 controller discovery process, after the LWAPP Discovery Request is broadcast
on a local subnet, which action will AP take next?

A. Send an LWAPP response to the master controller if known.
B. Send an LWAPP discovery request to controllers learned via OTAP if operational.
C. Wait 5 seconds and resend a Discovery Request to the local subnet.
D. Determine whether the controller responses are the primary controller.

A

B. Send an LWAPP discovery request to controllers learned via OTAP if operational.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which three values will be used to calculate Effective Isotropic Radiated Power? (Choose three.)

A. Antenna bandwidth
B. Antenna gain
C. Cable loss
D. Transmission power

A

B. Antenna gain
C. Cable loss
D. Transmission power

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

When importing a single campus map into the Cisco WCS 5.0, which four file formats will be
used? (Choose four.)

A. BMP 
B. PNG 
C. GIF 
D. JPEG 
E. JPG
A

B. PNG
C. GIF
D. JPEG
E. JPG

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

You are a network engineer at Company.com, when creating a wireless profile in the Cisco ADU
and you have selected the WPA/WPA2/CCKM radio button option, what other decision will you
make and then configure on this same screen?

A. The SSID of the wireless client
B. The length and value of the pre-shared key
C. The EAP type to be used for authentication
D. The encryption type

A

C. The EAP type to be used for authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is a common standard for wireless LANs?(Choose two)

A. IEEE 802.11
B. IEEE 802.3z
C. Wi-Fi
D. IEEE 802.16

A

A. IEEE 802.11

C. Wi-Fi

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Match the proper relationship between interface description and the appropriate.

  1. Designed to be analogous to VLANs for wireless LAN client device
  2. The only port that is active when the controller is in boot mode
  3. This interface is the only consistentlypingable in-band interface IP address on the Cisco WLC
  4. Used for Layer 3 communications between the Cisco WLC and the lightweight access points
  5. Used to support mobility management. DHCP relay, and guest web authencation.
I.AP Manager 
II.Dynamic 
III.Management 
IV.Service Port 
V.Virtual 

A. I-4,II-1,III-5,IV-2,V-3
B. I-4,II-1,III-2,IV-5,V-3
C. I-4,II-1,III-5,IV-3,V-2
D. I-4,II-1,III-2,IV-3,V-5

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which roaming situation using controllers in a Cisco Unified Wireless Network requires a client by
use of WPA2 with PKC to reauthenticate to the network?

A. A wireless client roams to another AP on the same controller.
B. A wireless client roams to another AP after being out of range of the network for 2 minutes.
C. A wireless client roams to another AP on a different controller in the same mobility domain.
D. A wireless client roams to another AP on a controller in a different mobility domain.

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which three methods of authentication are usually used in enterprise wireless networks? (Choose
three.)

A. AES 
B. CCKM 
C. PEAP 
D. EAP-FAST 
E. EAP-TLS
A

C D E

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

You are a network technician at Company.com, study the options carefully.A client is attached to
the Cisco Unified Wireless network by use of controllers. When the client is using WPA2
and EAP authentication, where are the wireless encryption keys located during the active user
session? (Choose two.)

A. On the client
B. On the Cisco WCS
C. On the RADIUS server
D. On the access point

A

A D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What relatively new standard applies to wireless MANs?

A. IEEE 802.11
B. IEEE 802.3z
C. Wi-Fi
D. IEEE 802.16.

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Which statement best describes an infrastructure basic service set according to IEEE 802.11 specifications? A. No relaying of signals from one client to another client. B. Also called an Ad Hoc Network. C. Enables the use of ESS. D. The BSSID is generated from the first wireless client that starts up in the IBSS.
C
25
Which of the following items increases bandwidth and resists multipath problems by carrying data in subcarriers? A. Narrow Band Frequency B. Direct Sequence Spread Spectrum C. Frequency Hopping Spread Spectrum D. Orthogonal Frequency Division Multiplexing
D
26
In which format are the files saved, when creating new configuration profiles in Cisco Secure Services Client? A. TXT B. RTF C. HTML D. XML
D XML
27
A controller is connected to a Cisco IOS Catalyst switch. The following is the switch port configuration: ``` interface GigabitEthernet 1/0/10 switchport switchport trunk encapsulation dot1q switchport trunk allowed vlan 1,20,30,50 switchport trunk native vlan 20 switchport mode trunk ``` Which one of the controller CLI commands assigns its management interface to the Cisco IOS Catalyst switch native vlan interface? A. Config interface vlan management 0 B. Config interface vlan management 20 C. Config interface vlan management 30 D. Config interface vlan management 1
``` A. Config interface vlan management 0 Pg 337 here’s an important command you’ll want to commit to memory now that assigns the management interface of the WLC to the switch’s native VLAN: ```
28
True or false: A computer device stores data in analog form. A. True B. False
False | Digital
29
Which two statements correctly describe beacon frames used by access points? (Choose two.) A. Provides vendor proprietary information B. Contains SSIDs if this feature is enabled C. Sent in response to a probe frame D. Is another name for an associated request
A. Provides vendor proprietary information | B. Contains SSIDs if this feature is enabled
30
What is the reason that Cisco recommends using Tftpd32 version 3.0 or later when upgrading wireless LAN controller software to release 4.1 or later? A. Tftpd32 is Cisco Compatible Extensions version 4 compliant B. Tftpd32 supports TFTP file transfers larger than 32 MB C. Tftpd32 is a component of CiscoWorks LMS D. Tftpd32 supports EoIP tunneling which is required for remote Cisco WLC upgrades
B. Tftpd32 supports TFTP file transfers larger than 32 MB
31
``` For the following options, which set of commands assigns a standalone access point an IP address of 10.0.0.24 with a 27-bit subnet mask and a gateway of 10.0.0.1? A. Config t interface Dot11Radio0 ip address 10.0.0.24 255.255.255.224 exit ip default-gateway 10.0.0.1 B. config t interface BVI1 ip address 10.0.0.24 255.255.255.224 exit ip default-gateway 10.0.0.1 C. config t interface BVI1 ip address 10.0.0.24 255.255.255.192 exit ip default-gateway 10.0.0.1 D. config t interface FastEthernet1 ip address 10.0.0.24 255.255.255.224 exit ip default-gateway 10.0.0.1 ```
``` B. config t interface BVI1 ip address 10.0.0.24 255.255.255.224 exit ip default-gateway 10.0.0.1 ```
32
you have the Cisco ADU installed but wish to use the Windows Zero Config utility to configure a wireless network profile, which action should you take first? A. Uninstall the Cisco ADU. B. Define a common profile in both the Cisco ADU and WZC. C. In the WZC utility, make sure that the box labeled "Use Windows to configure my Wireless Network Settings" is checked. D. Define the wireless profile in the Wireless Networks tab in WZC.
C. In the WZC utility, make sure that the box labeled "Use Windows to configure my Wireless Network Settings" is checked.
33
On what layers of the OSI reference model do wireless networks operate?(Choose two) A. Physical layer B. Network layer C. Data link layer. D. Session layer
A. Physical layer | C. Data link layer.
34
How to differ application-specific devices from laptop computers in the way they support Cisco Compatible Extensions? A. There is no differentiation. ASDs and laptops must both support the same CCX features. B. ASDs are required to support only CCXv1 and v2 features. Laptops must support all CCX features. C. Several features that are required for laptops are not required for ASDs. D. ASDs are required to support only CCXv5 management features, while laptops are optional features.
C. Several features that are required for laptops are not required for ASDs.
35
When choosing an EAP type for your Cisco ADU security profile, in order to authenticate successfully, what must you ensure? A. That the time set on the clocks for the wireless client and the authenticator are close to the same time B. That the client and authentication server support the same encryption protocol C. That the EAP type that you selected is supported by the authentication server D. That the EAP type selected is known not to exchange any of its credentials in the clear
C. That the EAP type that you selected is supported by the authentication server
36
EAP-FAST is an authentication protocol that creates a secure tunnel without using certificates. EAP-FAST was first supported where? A. CCXv4 B. CCXv1 C. CCXv3 D. CCXv2
C. CCXv3
37
For the following items, which is derived from measuring the RF duty cycle? A. LWAPP header length B. Dynamic channel selection C. RF utilization D. Transmit power control
C. RF utilization
38
RF signals offer relatively short range as compared to light signals. True or false? A. True B. False
B. False
39
Which security benefit is enabled by use of Management Frame Protection? A. Prevents the formation of client ad hoc networks within the RF coverage domain. B. Protects the network infrastructure from denial-of-service attacks that attempt to flood the network with associations and probes. C. Detects network reconnaissance probes, like those used by tools like NetStumbler, that attempt to discover the wireless network topology. D. Provides encryption of administrator sessions between a wireless client and a wireless LAN controller.
B. Protects the network infrastructure from denial-of-service attacks that attempt to flood the network with associations and probes.
40
Observe the following items carefully, In 802.1X, which is the supplicant? A. The device that performs the authentication B. The point of access C. The machine that attempts to access the network D. The machine in the network that keeps a list of conditions
C. The machine that attempts to access the network
41
Which three primary components describe TKIP? (Choose three.) A. Message Integrity Check B. Dynamic WEP C. Per-Packet Key Hashing D. Broadcast Key Rotation
A. Message Integrity Check C. Per-Packet Key Hashing D. Broadcast Key Rotation
42
802.1X defined which three roles? (Choose three.) ``` A. Authenticatee B. AAA Server C. Authentication Server D. Supplicant E. Authenticator ```
C. Authentication Server D. Supplicant E. Authenticator
43
Spread spectrum generally requires user licenses. True or false? A. True B. False
B. False
44
Which one of the following CLI commands would be used on a Cisco WLC to troubleshoot mobility, rogue detection, and load-balancing events? A. Debug dot11 B. Debug lwapp C. Show dot11 details D. Show lwapp details
A. Debug dot11
45
Examine the following items carefully, which three Cisco Unified Wireless Network capabilities use information that Radio Resource Management neighbor messages provide? (Choose 3) A. Aggressive Load Balancing B. Over-the-Air Provisioning C. Hybrid Remote Edge Access Point D. Inter-controller Mobility (that is, Mobility Groups) E. Rogue AP Classification F. Dynamic Channel Assignment
B. Over-the-Air Provisioning E. Rogue AP Classification F. Dynamic Channel Assignment
46
What is the effect of configuring a single SSID to simultaneously support both TKIP and AES encryption? A. This is a common configuration for migrating from WPA to WPA2. There is no problem associated with using this configuration. B. Some wireless client drivers might not handle complex SSID settings and may be unable to associate to the WLAN. C. The overhead associated with supporting both encryption methods will significantly degrade client throughput. D. This is an unsupported configuration and the Cisco Wireless Control System will continuously generate alarms until the configuration is corrected.
B. Some wireless client drivers might not handle complex SSID settings and may be unable to associate to the WLAN.
47
For the following items, which is the Default Local Database size for authenticating local users? A. 512 entries B. 4096 entries C. 1024 entries D. 2048 entries
A. 512 entries
48
Approximately up to what range do direct infrared systems operate? A. 0.5 mile B. 1 mile C. 1.5 mile D. 2.0 mile
B. 1 mile
49
Which statement is true about the authorization aspect of AAA? A. Authorization takes place after a successful authentication and provides the Cisco WLC the information needed to allow client access to network resources. B. Successful authorization will provide encryption keys that will be used to secure the wireless communications between client and AP. C. Authorization is the validation of successful DHCP address delivery to the wireless client. D. Authorization must be successfully completed in order to proceed with the authentication phase.
A. Authorization takes place after a successful authentication and provides the Cisco WLC the information needed to allow client access to network resources.
50
Which two descriptions are correct about LWAPP? (Choose two.) A. Communication between the AP and the WLC B. Lightweight Access Point provisioning C. Cisco proprietary D. Communication between the AP and client
A. Communication between the AP and the WLC | C. Cisco proprietary
51
Which type of Extensible Authentication Protocol is supported by the Cisco Unified Wireless Network? A. LEAP and EAP-FAST only B. EAP-TLS, PEAP-MSCHAPv2 and PEAP-GTC only C. EAP-TLS, PEAP-MSCHAPv2, PEAP-GTC, LEAP, EAP-FAST only D. Any EAP supported by the RADIUS authentication server
D. Any EAP supported by the RADIUS authentication server
52
Observe the following options, can you tell me which modulation technique allows you to achieve a data rate of 54Mb/s in the 2.4GHz-band? A. Differential Binary Phase Shift Keying B. Differential Quadrature Phase Shift Keying C. Complimentary Code Keying D. Quadrature Amplitude Modulation
D. Quadrature Amplitude Modulation
53
What is the general maximum coverage area of a wireless PAN? A. Within 30 feet B. Within 35 feet C. Within 40 feet D. Within 45 feet
A. Within 30 feet
54
Omni antennas are very easy to install. How are omni antennae in a wireless network most commonly polarized? A. Horizontally B. circularly C. Vertically D. Both horizontally and vertically
C. Vertically
55
As a network technician, can you tell me which two services are offered on Cisco Unified Wireless Networks running controller v5.0 but not offered on Cisco Mobility Express Solution by use of 526 controllers with v4.2 code? (Choose two.) ``` A. GUI management B. Authentication using 802.1X C. Guest access D. Location services E. IDS/IPS ```
D. Location services | E. IDS/IPS
56
During the WPA authentication process, which key is the 4-way handshake used to establish? A. Pairwise Session Key B. Pairwise Master Key C. Pairwise Multiple Key D. Pairwise Transient Key
D. Pairwise Transient Key
57
Which condition must exist in order to seamlessly roam between two wireless cells in a Cisco Unified Wireless Network using controllers? A. The client's password must be the same on both APs. B. The next cell should be on the same channel as the client's current cell. C. The wireless client must use an EAP authentication method with the infrastructure authenticator. D. The next cell should provide the same SSID as the client's current cell.
D. The next cell should provide the same SSID as the client's current cell.
58
Which IEEE standards group uses Bluetooth as the basis for the standard? A. IEEE 802.15 B. IEEE 802.11 C. IEEE 802.13 D. IEEE 802.16
A. IEEE 802.15
59
RRM plays a critical role in optimizing, fairly allocating and adaptively reusing the scarce resources in wireless communication. Which two tasks does RRM routinely perform? (Choose two.) ``` A. Antenna selection B. AP address assignment C. Transmit power control D. Encryption method assignment E. Channel assignment ```
C. Transmit power control | E. Channel assignment
60
Which four parameters need to be configured for local EAP-FAST on the controller? (Choose four.) ``` A. Server Key B. TTL for PAC C. Client Key D. PAC E. Authority ID F. Authority ID Information ```
A. Server Key B. TTL for PAC E. Authority ID F. Authority ID Information
61
More often than not, what is the difference in transmit power between an AP operating at Tx Power Level 1 and the same AP operating at Tx Power Level 3? A. 11 dB B. 2 dB C. 6 dB D. 3 dB
C. 6 dB
62
Which governing body analyzes the applications and environments in which wireless networks are used? A. FCC B. EIRP C. ETSI D. IEEE
D. IEEE
63
In what frequency band does Bluetooth operate? A. 2.2 GHz B. 2.4 GHz C. 2.6 GHz D. 3.0 GHz
B. 2.4 GHz
64
When using the enterprise-based authentication method for WPA2, a bidirectional handshake exchange occurs between the client and the authenticator. Which five options will be the results of that exchange by use of controller based network? A. Proof that each side is alive B. Creation of the Pairwise Transient Key C. Distribution of the Group Transient Key D. Binding of a Pairwise Master Key at the client and the controller E. A bidirectional exchange of a nonce used for key generation
All
65
Which four features are of WPA? (Choose four.) A. Unicast and broadcast key management B. Authenticated key management using 802.1X C. A message integrity check protocol to prevent forgeries D. Support for a key caching mechanism E. A larger initialization vector, increased to 48 bits
A. Unicast and broadcast key management B. Authenticated key management using 802.1X C. A message integrity check protocol to prevent forgeries E. A larger initialization vector, increased to 48 bits
66
Which two actions will you take to begin to troubleshoot an access point that fails to successfully join a wireless LAN controller? (Choose two.) A. SSH to the Cisco WCS B. SSH to the AP C. Cisco WLC command: debug lwapp events enable D. SSH to the Cisco WLC
C. Cisco WLC command: debug lwapp events enable | D. SSH to the Cisco WLC
67
ETSI produces globally-applicable standards for Information and Communications Technologies (ICT). What does the current European Telecommunications Standards Institute rule state is the 2.4-GHz maximum transmitter output power for point-to-point installations? A. 20 dBm B. 17 dBm C. 30 dBm D. 16 dBm
B. 17 dBm
68
A Bluetooth-enabled device is always transmitting. True or false?
False
69
The office is now operational using one 2106 WLAN controller with six 1131 APs and one 526 WLAN controller with three 521 APs. When the 526 loses power, the 521 APs do not build up a connection with the 2106 WLAN controller. What will most likely cause this problem? A. The 2106 controller and 526 controller do not share the same mobility group name. B. The 521 APs were not configured with the 2106 controller as the secondary controller. C. The 2106 controller and 526 controller were not configured correctly using the sysname and MAC address for a mobility group. D. The 2106 controller does not support the 521 APs.
D. The 2106 controller does not support the 521 APs.
70
ons: 72 Which CLI command will be used on the Cisco WLC to show detailed information for a client related to a lightweight access point? A. Show exclusionlist B. Debug dot11 C. Show client detailed D. Show arp switch
C. Show client detailed
71
Which two attributes are used to characterize antenna performance? (Choose two.) A. Harmony B. Gain C. Beamwidth D. Attenuation
B. Gain C. Beamwidth Antenna performance can be measured with respect to its beamwidth (narrowly focused or widely focused) and its gain (range). The more gain, the tighter the beamwidth.
72
For the following interfaces, which one is considered a dynamic interface? A. The LAG interface B. The AP manager interface C. The virtual interface D. A WLAN client data interface
D. A WLAN client data interface
73
What is the highest possible data rate of an IrDA device? A. 2 Mbps B. 4 Mbps C. 6 Mbps D. 8 Mbps
B. 4 Mbps
74
Which statement is true about the procedure for a lightweight AP to successfully establish a connection to a controller? A. AP sends its certificate to the RADIUS server. AP then authenticates the controller certificate as valid. B. AP sends its certificate to the controller. AP then authenticates the received Cisco WLC certificate as valid. C. AP sends its certificate to the RADIUS server. AP then authenticates the RADIUS certificate as valid. D. AP authenticates the received Cisco WLC certificate as valid. AP then sends its certificate to the controller.
B. AP sends its certificate to the controller. AP then authenticates the received Cisco WLC certificate as valid.
75
Which of the following options has Bluetooth RF characteristics? A. Frequency hopping - 5-GHz range B. Continuous transmitting - 5-GHz range C. Continuous transmitting - 2.4-GHz range D. Frequency hopping - 2.4-GHz range
D. Frequency hopping - 2.4-GHz range
76
Which description is correct about an Ad Hoc Network? A. Mesh Network B. Basic Service Set C. Independent Basic Service Set D. Extended Service Set
C. Independent Basic Service Set
77
Which command path is correct regarding how to access the Cisco WCS 5.0 ability to troubleshoot clients? A. Monitor -> Clients -> select displayed client's MAC address B. Tools -> Clients -> select displayed client's MAC address C. Tools -> Clients -> enter client's MAC address D. Monitor -> Clients -> enter client's MAC address
D. Monitor -> Clients -> enter client's MAC address
78
EP is a mandatory encryption mechanism. True or false? A. True B. false
False
79
What two statements best describe AES-CCMP? (Choose two.) A. It is required in WPA2. B. It is required in WPA. C. It is defined in 802.1X. D. It is the encryption algorithm used in TKIP implementations. E. It is an encryption algorithm used in the 802.11i security protocol.
A. It is required in WPA2. | E. It is an encryption algorithm used in the 802.11i security protocol.
80
As a network technician, can you tell me when would rate shifting down by a client occur? A. When the distance to the AP has increased and the missed-symbol rate has increased B. When the noise level has decreased and the signal level has increased C. When the distance to the AP has increased and the signal level has increased D. When multipath has decreased and the missed-symbol rate has decreased
A. When the distance to the AP has increased and the missed-symbol rate has increased
81
By doing what is the configuration of a wireless LAN controller as a RADIUS client ensured? A. Implementing an EAP exchange between the CiscoSecure RADIUS server and the controller B. Using an encrypted tunnel between the CiscoSecure RADIUS server and the controller C. Defining a RADIUS server secret at both the CiscoSecure RADIUS server and the controller D. Adding the MAC address of the physical port of the controller into the trusted client table of the CiscoSecure RADIUS server
C. Defining a RADIUS server secret at both the CiscoSecure RADIUS server and the controller
82
For the following physical layer encoding technologies, which one is common to both the IEEE 802.11g and the IEEE 802.11a standards? A. DSSS B. BPSK C. CCK D. OFDM
D. OFDM
83
In what frequency band does 802.11a operate in? A. 2.2 GHz B. 2.4 GHz C. 2.6 GHz D. 5 GHz
D. 5 GHz
84
Which primary method is of configuration management for the Mobility Express Solution? A. CLI and Web GUI B. CCA and Web GUI C. CCA and CLI D. CLI, Web GUI, and CCA
B. CCA and Web GUI
85
On a Cisco Unified Wireless Controller, which three Access Point modes allow for client connectivity? (Choose three.) A. Local Mode B. Bridge Mode C. H-REAP Mode D. Monitor Mode
A. Local Mode B. Bridge Mode C. H-REAP Mode
86
What information is needed to add a Cisco WLC into the Cisco WCS? A. IP address of virtual interface B. IP address of AP manager interface C. IP address of management interface D. IP address of service port
C. IP address of management interface
87
Observe the following items, which open standard defines the combination of Extensible Authentication Protocol with Advanced Encryption Standard to provide strong wireless LAN client security? A. WEP B. IEEE 802.11i C. WPA D. IEEE 802.1X
B. IEEE 802.11i
88
How many non-overlapping channels are available with 802.11b wireless LANs? A. One B. Two C. Three D. Four
C. Three
89
What is the reason that wireless analog video signals that are operating in the 2.4-GHz band are particularly harmful to Wi-Fi service? A. Analog Video modulation is the same as Wi-Fi and causes interference. B. Analog video is a constant signal with 100% duty cycle. C. Analog video is a strong signal and increases the SNR. D. Analog video signals are slow frequency hopping and tend to affect the entire band.
B. Analog video is a constant signal with 100% duty cycle.
90
One of the advantages of implementing EAP-FAST is that it is not necessary to implement which item as part of your authentication infrastructure? A. A RADIUS server B. A Certificate Authority infrastructure C. A client that supports EAP-FAST D. An access control server
B. A Certificate Authority infrastructure
91
An indoor 1240 AP is booting and has obtained an IP address by use of DHCP. The AP has confirmed prior controller IP addresses from a previously joined mobility group stored in NVRAM. Which action will AP take next? A. DHCP option 43. B. Layer 2 LWAPP discovery broadcast. C. Layer 3 LWAPP discovery broadcast. D. DNS resolution of CISCO-LWAPP-CONTROLLER.localdomain.
A. DHCP option 43.
92
You work as a network engineer at Company.com, study the subject carefully.A WLAN deployment will use a combination of Cisco Aironet AP 1240s and multiple Cisco 4404 Wireless LAN Controllers to provide wireless LAN access to end-users. The network administrator has decided to use DHCP Option 43 to enable the APs to discover the wireless LAN controllers. When configuring the DHCP scope, which format should be used for the Cisco WLC addresses? A. A comma-separated ASCII string of Cisco WLC virtual IP addresses B. A comma-separated ASCII string of Cisco WLC AP-manager addresses C. A comma-separated ASCII string of Cisco WLC management addresses D. A hexadecimal string of Cisco WLC management addresses
D. A hexadecimal string of Cisco WLC management addresses
93
True of false: 802.11g operates at up to 54 Mbps and interoperates with 802.11b. A. True B. False
True
94
Which maximum number is of lightweight APs that can be supported from a single Cisco WCS Navigator management console with Cisco WCS and Cisco WLC running v5.0 code? A. 20,000 B. 5,000 C. 10,000 D. 30,000
D. 30,000
95
A lightweight AP has been deployed in local mode in a network consisting of 10 wireless LAN controllers in a single mobility group. The AP has been configured to use primary, secondary, and tertiary WLCs. Because of a major power failure, the AP's primary, secondary, and tertiary Cisco WLCs are all unavailable. Which action will be taken next by the AP? A. The AP will attempt to join the Cisco WLC with the greatest amount of available capacity. B. The AP will attempt to join a Cisco WLC configured as a "Master Controller." C. The AP state will transition to AP Fallback Mode and continue providing limited WLAN services (that is, no new client authentications) until a WLC is again available. D. The AP will reboot and repeatedly attempt to join the configured primary, secondary, and tertiary Cisco WLCs in that order. The process will continue until one of the configured WLCs is again available.
B. The AP will attempt to join a Cisco WLC configured as a "Master Controller."
96
Which two functions are the pre-shared key used for when using the Pre-Shared Key authentication method for WPA or WPA2? (Choose two.) A. To derive the nonce at each side of the exchange B. To derive the Pairwise Transient Key C. To act as the Group Transient Key during the bidirectional handshake D. To act as the Pairwise Master Key during the bidirectional handshake
B. To derive the Pairwise Transient Key | D. To act as the Pairwise Master Key during the bidirectional handshake
97
Which client application utility allows wireless configuration on Linux platforms? A. Cisco Secure Services Client B. Airport Extreme C. Cisco Aironet Desktop Utility D. NetworkManager
D. NetworkManager
98
Which 802.11 frequencies are available almost worldwide? A. 2.2 GHz B. 2.4 GHz C. 2.6 GHz D. 5 GHz
B. 2.4 GHz
99
Which authentication method best supports a large enterprise deployment where over the air security is a necessity? A. PSK with WEP B. WPA with PSK C. Open Authentication with Web Authentication D. WPA2 with EAP-FAST
D. WPA2 with EAP-FAST
100
Which three elements compose the Cisco Secure Services Client suite? (Choose three.) A. Cisco Secure Services Client Administration Utilities B. Cisco Secure Services Client C. Cisco Secure Services Client Auditor D. Cisco Secure Services Client Log Packager
A. Cisco Secure Services Client Administration Utilities B. Cisco Secure Services Client D. Cisco Secure Services Client Log Packager
101
Which one of the following items applies to TKIP? A. Is used to encrypt a WEP authenticated session B. Is part of the initial key exchange used to derive a pairwise temporal key C. Is used to encrypt the data for WPA sessions D. is used to secure the initial authentication credential exchange between client and authenticator
C. Is used to encrypt the data for WPA sessions
102
Cisco wireless requires that controllers within a mobility group have which three common characteristics? (Choose three.) A. Controllers must be in the same subnet B. Virtual interface IP address C. Mobility group name D. Version of controller code
B. Virtual interface IP address C. Mobility group name D. Version of controller code
103
A learning bridge forwards all packets. True or false? A. True B. False
False
104
Which two statements best describe WiMAX technology? (Choose two.) A. WiMAX works only for licensed frequencies. B. WiMAX is capable of working as a long-range system over several miles. C. Typically, fixed WiMAX networks have a higher gain direction antenna installed near the client. D. WiMAX is defined by 802.11i.
B. WiMAX is capable of working as a long-range system over several miles. C. Typically, fixed WiMAX networks have a higher gain direction antenna installed near the client.
105
You work as a network technician at Company.com, study the situation carefully, then answer the question.The corporate network locates all RADIUS servers at the centralized data center for authentication. The remote offices use access points operating in H-REAP mode using v5.0 code with various local and central switch WLANs. When a remote office has lost connectivity to the main corporate network due to a WAN outage, which two statements are true about the status of that remote office when H-REAP access points are operating in standalone mode? (Choose two.) A. All clients will continue association until the respective authentication timers expire. B. All Cisco APs with 16 MB of RAM or more can operate as standalone H-REAP. C. If configured, clients using WPA or WPA2 with PSK and locally switched WLANs will continue to operate. D. If configured, locally switched WLANs will continue operation using Local-EAP for EAP-LEAP and EAP-FAST for up to twenty users.
C. If configured, clients using WPA or WPA2 with PSK and locally switched WLANs will continue to operate. D. If configured, locally switched WLANs will continue operation using Local-EAP for EAP-LEAP and EAP-FAST for up to twenty users.
106
The Cisco 526 Wireless Express Mobility Controller is a network appliance that automatically optimizes the basic wireless network and supports advanced mobility services on top of that network. A new Cisco Mobility Express 526 controller using v4.2 code direct from the factory is accessible by which default IP address? A. 172.16.100.1 B. 10.10.1.1 C. 172.16.1.1 D. 192.168.1.1
D. 192.168.1.1
107
Using Cisco WCS v5.0, which configuration command option allows you to see a summary of all access points in the Cisco WCS database? A. Configure -> Config Groups B. Configure -> Access Points C. Configure -> Chokepoints D. Configure -> Controllers
B. Configure -> Access Points
108
Which standards do wireless MANs employ?(Choose three) A. Wi-Fi B. IEEE 802.11 C. IEEE 802.13 D. IEEE 802.16
A. Wi-Fi B. IEEE 802.11 C. IEEE 802.13
109
Which four file formats will be used when importing a single campus map into the Cisco WCS 5.0? (Choose four.) ``` A. BMP B. JPEG C. JPG D. PNG E. GIF ```
B. JPEG C. JPG D. PNG E. GIF
110
For the following options, which AP to Wireless LAN Controller discovery process requires a previous association of the AP with a Cisco WLC? A. AP priming B. DHCP Option 6 C. DHCP Option 43 D. Defining a master controller
A. AP priming
111
What unit of measurement is used for representing the strength of an antenna's radiation pattern? A. dBi B. mW C. dBm D. GHz
A. dBi
112
A controller-based wireless solution can avoid interference by dynamically adjusting which two access point transmission features? (Choose two.) A. Transmit power levels B. switch PORT PARAMETERS C. Operating RF channel D. SSID names
A. Transmit power levels | C. Operating RF channel
113
True or false: FDMA requires users to take turns transmitting signals. A. True B. False
False
114
WPA uses TKIP and is a subset of the 802.11i standard. True or false? A. True B. False
True
115
Two types of AP configuration software that enable supercool features. A. ADU B. CSSC C. EAP D. SSL
A. Aironet Desktop Utility | B. Cisco Secure Services Client
116
Two types of AP configuration software that enable supercool features. A. ADU B. CSSC C. EAP D. SSL
A. Aironet Desktop Utility | B. Cisco Secure Services Client
117
Two types of AP configuration software that enable supercool features. A. ADU B. CSSC C. EAP D. SSL
A. Aironet Desktop Utility | B. Cisco Secure Services Client
118
Two types of AP configuration software that enable supercool features. A. ADU B. CSSC C. EAP D. SSL
A. Aironet Desktop Utility | B. Cisco Secure Services Client