Exam questions Flashcards
What happens when client exclusion is set with a timeout value of zero?
Clients are excluded indefinitely
Maximum range of wireless PAN
50ft
What WCS cli command displays information like Show Run does?
Show running-config
What attacks does Management Frame Protection help to mitigate?
Man-in-the-middle
DoS
Which device(s) will Lightweight access points send control traffic to?
Wireless controller
For the following elements, which three define the 802.11n implementation of MIMO? (Choose
three.)
A. Channel Bonding
B. Maximal Ratio Combining
C. Spatial Multiplexing
D. Transmit Beam Forming
B. Maximal Ratio Combining
C. Spatial Multiplexing
D. Transmit Beam Forming
What action makes a client show up as a “Rogue Client”?
It sends unexpected frames
When is a workstation considered a client?
When it sends a probe request to an access point
What happens if a DHCP scope is not defined?
It becomes a DHCP Relay
What is the default DHCP timer?
1 Day
86,400 seconds
WPA uses TKIP and is a subset of the 802.11i standard. True or False?
True
The central office is currently using a combination of 4400 and 2100 series WLAN controllers
running v4.2 and a variety of LWAPP-enabled access points servicing both 2.4 GHz and 5 GHz.
The WLAN deployment has been extended to each remote office by implementing a 526 WLAN
controller running v4.1 and several 521 access points. Wireless client deployment uses EAP-TLS
authentication by use of a centralized RADIUS server plus 802.11n for performance. After the first
remote office deployment, remote office users complain that they are not connecting via 802.11n.
Which will most likely cause this problem?
A. The 521 AP does not support 5 GHz, which prohibits 802.11n.
B. The 521 AP and 526 WLAN controllers do not support AES, which prohibits 802.11n.
C. The 526 WLAN controller does not support external authentication via RADIUS, prohibiting
authentication.
D. The 526 WLAN controller does not support 802.11n with either v4.1 or v4.2.
Pg 169
D. The 526 WLAN controller does not support 802.11n with either v4.1 or v4.2.
How do the characteristics that are available on the Cisco WCS for Linux version differ from those
of the Cisco WCS for Windows version?
A. Cisco WCS for Linux is required for deployments.
B. Assuming that there are no differences in hardware, a Cisco WCS for Linux can support up to
750 wireless LAN controllers. A Cisco WCS for Windows can support up to 250 wireless LAN
controllers.
C. Cisco WCS for Windows includes support for Cisco Spectrum Expert clients. Cisco WCS for
Linux does not support Cisco Spectrum Expert clients.
D. There are no differences in features between the Linux and Windows versions of Cisco WCS.
D. There are no differences in features between the Linux and Windows versions of Cisco WCS.
True or false: A wireless PAN consumes little power from small handheld computer devices.
T/F?
True
In the AP Layer 3 controller discovery process, after the LWAPP Discovery Request is broadcast
on a local subnet, which action will AP take next?
A. Send an LWAPP response to the master controller if known.
B. Send an LWAPP discovery request to controllers learned via OTAP if operational.
C. Wait 5 seconds and resend a Discovery Request to the local subnet.
D. Determine whether the controller responses are the primary controller.
B. Send an LWAPP discovery request to controllers learned via OTAP if operational.
Which three values will be used to calculate Effective Isotropic Radiated Power? (Choose three.)
A. Antenna bandwidth
B. Antenna gain
C. Cable loss
D. Transmission power
B. Antenna gain
C. Cable loss
D. Transmission power
When importing a single campus map into the Cisco WCS 5.0, which four file formats will be
used? (Choose four.)
A. BMP B. PNG C. GIF D. JPEG E. JPG
B. PNG
C. GIF
D. JPEG
E. JPG
You are a network engineer at Company.com, when creating a wireless profile in the Cisco ADU
and you have selected the WPA/WPA2/CCKM radio button option, what other decision will you
make and then configure on this same screen?
A. The SSID of the wireless client
B. The length and value of the pre-shared key
C. The EAP type to be used for authentication
D. The encryption type
C. The EAP type to be used for authentication
What is a common standard for wireless LANs?(Choose two)
A. IEEE 802.11
B. IEEE 802.3z
C. Wi-Fi
D. IEEE 802.16
A. IEEE 802.11
C. Wi-Fi
Match the proper relationship between interface description and the appropriate.
- Designed to be analogous to VLANs for wireless LAN client device
- The only port that is active when the controller is in boot mode
- This interface is the only consistentlypingable in-band interface IP address on the Cisco WLC
- Used for Layer 3 communications between the Cisco WLC and the lightweight access points
- Used to support mobility management. DHCP relay, and guest web authencation.
I.AP Manager II.Dynamic III.Management IV.Service Port V.Virtual
A. I-4,II-1,III-5,IV-2,V-3
B. I-4,II-1,III-2,IV-5,V-3
C. I-4,II-1,III-5,IV-3,V-2
D. I-4,II-1,III-2,IV-3,V-5
A
Which roaming situation using controllers in a Cisco Unified Wireless Network requires a client by
use of WPA2 with PKC to reauthenticate to the network?
A. A wireless client roams to another AP on the same controller.
B. A wireless client roams to another AP after being out of range of the network for 2 minutes.
C. A wireless client roams to another AP on a different controller in the same mobility domain.
D. A wireless client roams to another AP on a controller in a different mobility domain.
D
Which three methods of authentication are usually used in enterprise wireless networks? (Choose
three.)
A. AES B. CCKM C. PEAP D. EAP-FAST E. EAP-TLS
C D E
You are a network technician at Company.com, study the options carefully.A client is attached to
the Cisco Unified Wireless network by use of controllers. When the client is using WPA2
and EAP authentication, where are the wireless encryption keys located during the active user
session? (Choose two.)
A. On the client
B. On the Cisco WCS
C. On the RADIUS server
D. On the access point
A D
What relatively new standard applies to wireless MANs?
A. IEEE 802.11
B. IEEE 802.3z
C. Wi-Fi
D. IEEE 802.16.
D
Which statement best describes an infrastructure basic service set according to IEEE 802.11
specifications?
A. No relaying of signals from one client to another client.
B. Also called an Ad Hoc Network.
C. Enables the use of ESS.
D. The BSSID is generated from the first wireless client that starts up in the IBSS.
C
Which of the following items increases bandwidth and resists multipath problems by carrying data
in subcarriers?
A. Narrow Band Frequency
B. Direct Sequence Spread Spectrum
C. Frequency Hopping Spread Spectrum
D. Orthogonal Frequency Division Multiplexing
D
In which format are the files saved, when creating new configuration profiles in Cisco Secure
Services Client?
A. TXT
B. RTF
C. HTML
D. XML
D XML
A controller is connected to a Cisco IOS Catalyst switch. The following is the switch port
configuration:
interface GigabitEthernet 1/0/10 switchport switchport trunk encapsulation dot1q switchport trunk allowed vlan 1,20,30,50 switchport trunk native vlan 20 switchport mode trunk
Which one of the controller CLI commands assigns its management interface to the Cisco IOS
Catalyst switch native vlan interface?
A. Config interface vlan management 0
B. Config interface vlan management 20
C. Config interface vlan management 30
D. Config interface vlan management 1
A. Config interface vlan management 0 Pg 337 here’s an important command you’ll want to commit to memory now that assigns the management interface of the WLC to the switch’s native VLAN:
True or false: A computer device stores data in analog form.
A. True
B. False
False
Digital
Which two statements correctly describe beacon frames used by access points? (Choose two.)
A. Provides vendor proprietary information
B. Contains SSIDs if this feature is enabled
C. Sent in response to a probe frame
D. Is another name for an associated request
A. Provides vendor proprietary information
B. Contains SSIDs if this feature is enabled
What is the reason that Cisco recommends using Tftpd32 version 3.0 or later when upgrading
wireless LAN controller software to release 4.1 or later?
A. Tftpd32 is Cisco Compatible Extensions version 4 compliant
B. Tftpd32 supports TFTP file transfers larger than 32 MB
C. Tftpd32 is a component of CiscoWorks LMS
D. Tftpd32 supports EoIP tunneling which is required for remote Cisco WLC upgrades
B. Tftpd32 supports TFTP file transfers larger than 32 MB
For the following options, which set of commands assigns a standalone access point an IP address of 10.0.0.24 with a 27-bit subnet mask and a gateway of 10.0.0.1? A. Config t interface Dot11Radio0 ip address 10.0.0.24 255.255.255.224 exit ip default-gateway 10.0.0.1 B. config t interface BVI1 ip address 10.0.0.24 255.255.255.224 exit ip default-gateway 10.0.0.1 C. config t interface BVI1 ip address 10.0.0.24 255.255.255.192 exit ip default-gateway 10.0.0.1 D. config t interface FastEthernet1 ip address 10.0.0.24 255.255.255.224 exit ip default-gateway 10.0.0.1
B. config t interface BVI1 ip address 10.0.0.24 255.255.255.224 exit ip default-gateway 10.0.0.1
you have the Cisco ADU installed but wish to use the Windows Zero Config utility to configure a
wireless network profile, which action should you take first?
A. Uninstall the Cisco ADU.
B. Define a common profile in both the Cisco ADU and WZC.
C. In the WZC utility, make sure that the box labeled “Use Windows to configure my Wireless
Network Settings” is checked.
D. Define the wireless profile in the Wireless Networks tab in WZC.
C. In the WZC utility, make sure that the box labeled “Use Windows to configure my Wireless
Network Settings” is checked.
On what layers of the OSI reference model do wireless networks operate?(Choose two)
A. Physical layer
B. Network layer
C. Data link layer.
D. Session layer
A. Physical layer
C. Data link layer.
How to differ application-specific devices from laptop computers in the way they support Cisco
Compatible Extensions?
A. There is no differentiation. ASDs and laptops must both support the same CCX features.
B. ASDs are required to support only CCXv1 and v2 features. Laptops must support all CCX
features.
C. Several features that are required for laptops are not required for ASDs.
D. ASDs are required to support only CCXv5 management features, while laptops are optional
features.
C. Several features that are required for laptops are not required for ASDs.
When choosing an EAP type for your Cisco ADU security profile, in order to authenticate
successfully, what must you ensure?
A. That the time set on the clocks for the wireless client and the authenticator are close to the
same time
B. That the client and authentication server support the same encryption protocol
C. That the EAP type that you selected is supported by the authentication server
D. That the EAP type selected is known not to exchange any of its credentials in the clear
C. That the EAP type that you selected is supported by the authentication server
EAP-FAST is an authentication protocol that creates a secure tunnel without using certificates.
EAP-FAST was first supported where?
A. CCXv4
B. CCXv1
C. CCXv3
D. CCXv2
C. CCXv3
For the following items, which is derived from measuring the RF duty cycle?
A. LWAPP header length
B. Dynamic channel selection
C. RF utilization
D. Transmit power control
C. RF utilization
RF signals offer relatively short range as compared to light signals. True or false?
A. True
B. False
B. False
Which security benefit is enabled by use of Management Frame Protection?
A. Prevents the formation of client ad hoc networks within the RF coverage domain.
B. Protects the network infrastructure from denial-of-service attacks that attempt to flood the
network with associations and probes.
C. Detects network reconnaissance probes, like those used by tools like NetStumbler, that
attempt to discover the wireless network topology.
D. Provides encryption of administrator sessions between a wireless client and a wireless LAN
controller.
B. Protects the network infrastructure from denial-of-service attacks that attempt to flood the
network with associations and probes.
Observe the following items carefully, In 802.1X, which is the supplicant?
A. The device that performs the authentication
B. The point of access
C. The machine that attempts to access the network
D. The machine in the network that keeps a list of conditions
C. The machine that attempts to access the network
Which three primary components describe TKIP? (Choose three.)
A. Message Integrity Check
B. Dynamic WEP
C. Per-Packet Key Hashing
D. Broadcast Key Rotation
A. Message Integrity Check
C. Per-Packet Key Hashing
D. Broadcast Key Rotation
802.1X defined which three roles? (Choose three.)
A. Authenticatee B. AAA Server C. Authentication Server D. Supplicant E. Authenticator
C. Authentication Server
D. Supplicant
E. Authenticator
Spread spectrum generally requires user licenses. True or false?
A. True
B. False
B. False
Which one of the following CLI commands would be used on a Cisco WLC to troubleshoot
mobility, rogue detection, and load-balancing events?
A. Debug dot11
B. Debug lwapp
C. Show dot11 details
D. Show lwapp details
A. Debug dot11
Examine the following items carefully, which three Cisco Unified Wireless Network capabilities
use information that Radio Resource Management neighbor messages provide? (Choose 3)
A. Aggressive Load Balancing
B. Over-the-Air Provisioning
C. Hybrid Remote Edge Access Point
D. Inter-controller Mobility (that is, Mobility Groups)
E. Rogue AP Classification
F. Dynamic Channel Assignment
B. Over-the-Air Provisioning
E. Rogue AP Classification
F. Dynamic Channel Assignment
What is the effect of configuring a single SSID to simultaneously support both TKIP and AES
encryption?
A. This is a common configuration for migrating from WPA to WPA2. There is no problem
associated with using this configuration.
B. Some wireless client drivers might not handle complex SSID settings and may be unable to
associate to the WLAN.
C. The overhead associated with supporting both encryption methods will significantly degrade
client throughput.
D. This is an unsupported configuration and the Cisco Wireless Control System will continuously
generate alarms until the configuration is corrected.
B. Some wireless client drivers might not handle complex SSID settings and may be unable to
associate to the WLAN.