CISCO EXAM QUESTIONS & ANSWERS

Size: px
Start display at page:

Download "CISCO EXAM QUESTIONS & ANSWERS"

Transcription

1 CISCO EXAM QUESTIONS & ANSWERS Number: Passing Score: 800 Time Limit: 120 min File Version: CISCO EXAM QUESTIONS & ANSWERS Exam Name: CCIE Wireless Written Exam (v2.0)

2 Examsoon QUESTION 1 Which two options are correct according to debug output presented in the following exhibit? (Choose two.) A. The wireless client uses a static IP address, so " START (0)" can be found in the logs. B. The wireless client has been successfully authenticated. Reauthentication is set to occur on an extremely

3 aggressive schedule (every five seconds). C. The wireless client "hangs" in probes (does not proceed with authentication and PassGuide.com- Make You Succeed To Pass IT Exams association). It is likely that the "encryption" or "key-management" advertised in the probe response does not match. D. Since the AP receives a probe request from the wireless client, the Access Point Functions state for the machine changes from "Idle" to "Probe." Correct Answer: CD /Reference: QUESTION 2 Lightweight Access Point Protocol or LWAPP is the name of a protocol that can control multiple Wi-Fi wireless access points at once. How does the Cisco WCS know what has happened in an LWAPP system when an AP's interface goes down and then comes up again? A. The Cisco WCS polls the APs and when the AP is unreachable, reports "Max retransmissions reached on AP <name>". B. The AP sends a linkdown then linkup trap to the Cisco WCS; these are two of the six traps defined in RFC 1215, A Convention for Defining Traps for use with the SNMP. C. The AP cannot send a linkdown trap, as per RFC 1215, because the link is down; when the link comes back up, the AP sends a linkup trap to the Cisco WLC, which then forwards the trap to the Cisco WCS. D. The Cisco WLC sends a trap to the Cisco WCS when it detects that an AP is down. Correct Answer: D /Reference: QUESTION 3 When using the enterprise-based authentication method for WPA2, a bidirectional handshake exchange occurs between the client and the authenticator. Which five options will be the results of that exchange by use of controller based network? (Choose five.) A. proof that each side is alive B. creation of the Pairwise Transient Key C. distribution of the Group Transient Key D. binding of a Pairwise Master Key at the client and the controller E. distribution of the Pairwise Master key for caching at the access point F. a bidirectional exchange of a nonce used for key generation BCDF /Reference: Answer: A, B, C, D, F QUESTION 4

4 You can click on the buttons at the bottom of the screen to access resources associated with this item. The following resources are available to you: show run - show run on AP-1 debug logs - Logs/debugs on AP-1 Radius sniffer trace taken betwen AP-1 and AAA-Server. packet-overview frame-1 frame-2 frame-3 frame-4 Given: Wireless-Client (CB21) configured for SSID "CCIE-2" Standalone AP (autonomous), configured with 3 SSID's and 3 Data-Vlan plus the native VLAN. AAA server configured for LEAP and EAP-FAST authentication and dynamic VLAN assignment. Question: Why is this wireless client not able to associate to the network? A. Pending /Reference: QUESTION 5 Study the exhibit carefully. You are deploying a site survey for a new implementation and see this information in Cisco Spectrum Expert. Which option is true?

5 A. The capture shows radar. It is most probably military radar because of the frequency hopping in the "Swept Spectrogram." The workaround is to disable DFS on the AP. B. There is general background noise of -70dBm, which is not an issue at all for an b/g deployment. C. The location of this capture is most likely near a kitchen, because it is clear that there is a microwave oven disrupting channel There will be some packet loss while cooking, which is not a problem, because employees will not be working during lunch time. D. This is a typical Bluetooth pattern. The source needs to be identified and eliminated because it will affect an b/g deployment. Correct Answer: D /Reference: QUESTION 6 ETSI produces globally-applicable standards for Information and Communications Technologies (ICT). What does the current European Telecommunications Standards Institute rule state is the 2.4-GHz maximum transmitter output power for point-to-point installations? A. 20 dbm B. 17 dbm C. 30 dbm D. 16 dbm

6 Correct Answer: B /Reference: QUESTION 7 Which three statements best describe the communication between the Cisco Catalyst 6500 Series Supervisor Engine and the Cisco WiSM module? (Choose three.) A. The communication between the Catalyst Supervisor Engine and Cisco WiSM goes to the service port on the Cisco WiSM. B. WLCCP is used to communicate between the Cisco WiSM and Catalyst Supervisor Engine. C. WCP runs on UDP/IP port D. WCP is used to communicate between the Cisco WiSM and Catalyst Supervisor Engine. CD /Reference: QUESTION 8 Key Encryption Key is used for the group key handshake to send to the Group Transient Key, so it can be delivered securely to the client. A. True B. False /Reference: QUESTION 9 The office is now operational using one 2106 WLAN controller with six 1131 APs and one 526 WLAN controller with three 521 APs. When the 526 loses power, the 521 APs do not build up a connection with the 2106 WLAN controller. What will most likely cause this problem? A. The 2106 controller and 526 controller do not share the same mobility group name. B. The 521 APs were not configured with the 2106 controller as the secondary controller. C. The 2106 controller and 526 controller were not configured correctly using the sysname and MAC address for a mobility group. D. The 2106 controller does not support the 521 APs. Correct Answer: D

7 /Reference: QUESTION 10 You have been called to a customer's site to troubleshoot an EAP-FAST deployment by use of a Cisco 7921G wireless IP phone within the Cisco Unified Wireless Network. After examining the logs, you discover the following error: [SECURITY] 1x_auth_pae.c 2417: Reached Max EAP-Identity Request retries (#) for STA ##:##:##:##:##:##: Which command is the best solution to this problem? A. config advanced eap identity-request-timeout 0 B. config advanced eap request-retries 20 C. config advanced eap identity-request-timeout 20 D. config advanced eap request-retries 0 Correct Answer: B /Reference: QUESTION 11 The PassGuide company has a WLC at on network /24 with a default gateway of It also has a network /24 with a default gateway of There is a GRE tunnel on the WAN between the two default gateways. Which ACL would allow encrypted management of the WLC from host on the /24 network, but deny other traffic when applied inbound on the interface? A. access-list 101 permit gre host host B. access-list 101 permit tcp host eq 443 host C. access-list 101 permit tcp host host eq 443 access-list 101 permit tcp host host eq 22 D. access-list 101 permit tcp host host eq 80 Correct Answer: C /Reference: QUESTION 12 The Wi-Fi Alliance develops testing and certification programs to help ensure the best user experience with Wi- Fi technology. Which three options are correct? (Choose three.) A. WPA2 includes interoperability tests of WEP, TKIP, and AES-CCMP functionality B. WPA2-Enterprise uses 802.1X and does not include EAP interoperability tests C. WPA2-Personal uses pre-shared keys D. WPA2-Enterprise uses 802.1X and includes EAP interoperability tests

8 CD /Reference: QUESTION 13 Which components are required to generate a visual diagram such as the exhibit below? A. Cisco WCS with a location license and a controller B. Cisco WCS with base license, Cisco 2700 Series Wireless Location Appliance, and a controller C. Cisco 2700 Series Wireless Location Appliance and a controller D. Cisco WCS with a location license, Cisco 2700 Series Wireless Location Appliance, and a controller Correct Answer: D /Reference: QUESTION 14 Which is the most likely cause that an autonomous AP does not have IP connectivity? A. no IP address on the BVI interface

9 B. all radio interfaces are shut down C. no IP address on the Fast Ethernet interface D. no IP address on the radio interface /Reference: QUESTION 15 Which statement is true about the procedure for a lightweight AP to successfully establish a connection to a controller? A. AP sends its certificate to the RADIUS server. AP then authenticates the controller certificate as valid. B. AP sends its certificate to the controller. AP then authenticates the received Cisco WLC certificate as valid. C. AP sends its certificate to the RADIUS server. AP then authenticates the RADIUS certificate as valid. D. AP authenticates the received Cisco WLC certificate as valid. AP then sends its certificate to the controller. Correct Answer: B /Reference: QUESTION 16 You work as a network administrator for Company A. This company has a network with multiple controllers and wants to have the most cost-effective controller redundancy. In order to accomplish this, which option will you recommend? A. 1+1 B. N+1 C. N+N D. N+N+1 Correct Answer: B /Reference: QUESTION 17 You are running the initial configuration of a particular AP in a Cisco WLC on menu Wireless > Access Points > B/G Radio. The Cisco WLC has three SSIDs: A, B, and C. How to use the WLAN override option on this Cisco WLC? A. If the AP is part of a group of APs, WLAN override will allow you to configure a particular interface associated with the SSID. B. If WLAN override is selected for SSID A, only SSID A will send beacons. The other SSIDs, B and C, will respond to probes and allow associations, but there will be no beacons.

10 C. If WLAN override is selected for SSID A, SSID A will be operational on that AP but the other SSIDs will not be. D. If all three SSIDs are configured but disabled globally, by choosing 'WLAN override' for SSID A, you can make SSID A operational on this AP, as well as any other AP where WLAN override for SSID A has been chosen. Correct Answer: C /Reference: QUESTION 18 What is the reason that wireless analog video signals that are operating in the 2.4-GHz band are particularly harmful to Wi-Fi service? A. Analog Video modulation is the same as Wi-Fi and causes interference. B. Analog video is a constant signal with 100% duty cycle. C. Analog video is a strong signal and increases the SNR. D. Analog video signals are slow frequency hopping and tend to affect the entire band. Correct Answer: B /Reference: QUESTION 19 Which description about Cisco 7920 wireless IP phones is correct? A. Voice quality is inversely related to channel utilization value sent within QBSS-Load-Element: the lower the value, the higher the voice quality. B. Voice quality is inversely related to RSSI: the lower the RSSI, the higher the voice quality. C. These phones have exactly the same characteristics as the newer Cisco 7921 and 7925 wireless IP phones, and do not needs special care when you are configuring security and QoS. D. WPA2 is the recommended security method for deployment, along with Cisco Centralized Key Management for fast and secure roaming. /Reference: QUESTION 20 IEEE h-2003, or just h, refers to the amendment added to the IEEE standard for Spectrum and Transmit Power Management Extensions. IEEE h was originally defined to provide spectrum management for Europe in the 5-GHz band. Which three uses does IEEE h now support? (Choose three.) A. TPC for the protection of radars from interference

11 B. TPC for the protection of satellites from interference C. Mechanisms to reduce power consumption D. DFS for the protection of radars from interference Correct Answer: BCD /Reference: QUESTION 21 One of the advantages of implementing EAP-FAST is that it is not necessary to implement which item as part of your authentication infrastructure? A. a RADIUS server B. a Certificate Authority infrastructure C. a client that supports EAP-FAST D. an access control server Correct Answer: B /Reference: QUESTION 22 What is the reason that omnidirectional antennas pick up noise from more sources than directional antennas? A. An omnidirectional antenna's main lobe is wider, causing it to detect signals from every direction. B. It is incorrect that omnidirectional antennas pick up noise from more sources than directional antennas. C. A directional antenna is an active RF element therefore it has less dbi. D. The ratio of the height to width of an omnidirectional antenna makes it more likely to receive noise than a directional antenna. /Reference: QUESTION 23

12 Assuming that the antenna system characteristics (for example, gain VSWR, polarization, and beam width) are similar for a 5-GHz and 2.4-GHz radio. While conducting a dual-band site survey, how to configure the 5-GHz radio, relative to the 2.4-GHz radio, in order to achieve similar cell size? A. The 5-GHz radio power level should be higher than the 2.4-GHz radio. B. The 5-GHz radio should use BPSK modulation and the 2.4-GHz radio should use CCK modulation. C. The 5-GHz radio power level should be lower than the 2.4-GHz radio. D. The 5-GHz radio should use CCK modulation and the 2.4-GHz radio should use BPSK modulation. /Reference: QUESTION 24 An indoor 1240 AP is booting and has obtained an IP address by use of DHCP. The AP has confirmed prior controller IP addresses from a previously joined mobility group stored in NVRAM. Which action will AP take next? A. DHCP option 43. B. Layer 2 LWAPP discovery broadcast. C. Layer 3 LWAPP discovery broadcast. D. DNS resolution of CISCO-LWAPP-CONTROLLER.localdomain. /Reference: QUESTION 25 How to secure the LWAPP control channel? A. IPsec B i C. GRE D. AES-CCM Correct Answer: D /Reference: QUESTION i is a forthcoming specification that will clear up a number of security problems in For the following items, which i key can provide data origin authenticity during the four-way handshake and the group key handshake messages? A. Key Caching Key

13 B. Key Encryption Key C. Groupwise Master Key D. Key Confirmation Key Correct Answer: D /Reference: QUESTION 27 The IEEE standards define different encryption mechanisms. Which is the basic of defining the most secure encryption solution in IEEE standards? A. IPSEC B. WEP C. AES-CCMP D. TKIP Correct Answer: C /Reference: QUESTION 28 Comparing with LEAP, which is the advantage of EAP-FAST? A. EAP-FAST allows authenticated in-band PAC provisioning, whereas LEAP uses anonymous in-band PAC provisioning, which is transparent to the user. B. LEAP only supports user and password changes in conjunction with MS-CHAPv2, whereas EAP-FAST supports user and password changes when using MS-CHAPv2 or OTP or PAC. C. EAP-FAST exchanges user credentials within a TLS tunnel whereas LEAP exchanges credentials information in clear, which allows possible offline "dictionary attacks." D. EAP-FAST works with the authentication algorithm "open eap," and also with "network- eap," whereas LEAP is limited to the authentication algorithm "network-eap" only. Correct Answer: C /Reference: QUESTION 29 You work as a network engineer at certways.com, study the subject carefully.a WLAN deployment will use a combination of Cisco Aironet AP 1240s and multiple Cisco 4404 Wireless LAN Controllers to provide wireless LAN access to end-users. The network administrator has decided to use DHCP Option 43 to enable the APs to discover the wireless LAN controllers. When configuring the DHCP scope, which format should be used for the Cisco WLC addresses? A. a comma-separated ASCII string of Cisco WLC virtual IP addresses B. a comma-separated ASCII string of Cisco WLC AP-manager addresses

14 C. a comma-separated ASCII string of Cisco WLC management addresses PassGuide.com-Make You Succeed To Pass IT Exams D. a hexadecimal string of Cisco WLC management addresses Correct Answer: D /Reference: QUESTION 30 For the following cipher suites, which were defined in the IEEE i-2004 standard, and then again in the standard? A. AES-CCMP B. WEP-40 C. TKIP D. WEP-104 BCD /Reference: QUESTION 31 What type of EAP will the diagram below illustrate? A. EAP-MD5

15 B. PEAP C. EAP-GTC D. EAP-FAST Correct Answer: D /Reference: QUESTION 32 Understanding the distances between the access points is very important while designing a WLAN network. Which two tools could measure the distances on floor plans? (Choose two.) A. AutoCAD B. Cisco WCS Planning Mode C. Cisco WCS Map Editor D. Cisco Spectrum Expert C /Reference: QUESTION 33 A lightweight AP has been deployed in local mode in a network consisting of 10 wireless LAN controllers in a single mobility group. The AP has been configured to use primary, secondary, and tertiary WLCs. Because of a major power failure, the AP's primary, secondary, and tertiary Cisco WLCs are all unavailable. Which action will be taken next by the AP? A. The AP will attempt to join the Cisco WLC with the greatest amount of available capacity. B. The AP will attempt to join a Cisco WLC configured as a "Master Controller." C. The AP state will transition to AP Fallback Mode and continue providing limited WLAN services (that is, no new client authentications) until a WLC is again available. D. The AP will reboot and repeatedly attempt to join the configured primary, secondary, and tertiary Cisco WLCs in that order. The process will continue until one of the configured WLCs is again available. Correct Answer: B /Reference: QUESTION 34 Which method can be used by the Cisco Wireless LAN Controller system to determine

16 whether there is a rogue AP or not? A. observation of unencrypted traffic that should be encrypted for an SSID that it owns B. detection of an organizationally unique identifier not assigned to Cisco devices C. detection of a AP MAC address not registered to it D. rejection of a SNMP poll by the rogue AP Correct Answer: C /Reference: QUESTION 35 RADIUS authentication requires that a shared secret be configured into the RADIUS server and RADIUS client. In your centralized or autonomous wireless system, users are authenticating through RADIUS to a certain WLAN/SSID. After each user connects, the authenticator sends an authentication request to the RADIUS server, and then what will happen? A. If the username and password are correct, it receives an access-accept in response. If the authentication operation was successful, the authenticator sends an authorization request to the RADIUS server with the WLAN/SSID information. B. If the username and password are correct, and the WLAN/SSID information that is sent in the request matches the information in the user profile, the RADIUS server sends back an access- accept in response. C. If the username and password are correct, it receives an access-accept in response, along with a list of check items for the user, including WLAN/SSID information. D. If the username and password are correct, it receives an access-accept in response, along with a list of reply attributes for the user, including WLAN/SSID information. Correct Answer: D /Reference: QUESTION 36 Which primary methods is of configuration management for the Mobility Express Solution? A. CLI and Web GUI B. CCA and Web GUI C. CCA and CLI D. CLI, Web GUI, and CCA Correct Answer: B /Reference: QUESTION 37

17 What is the major use of the Network Allocation Vector? A. The NAV is a value that indicates to a station the delivery traffic indication map information that is currently being provided by the MAC layer. B. The NAV is a value that indicates to a station the remaining time allocated prior to releasing access control. C. The NAV is a value that indicates to a station the amount of time that remains before a medium will become available. D. The NAV is a value that indicates to a station the present utilization of the access point through the information elements. Correct Answer: C /Reference: QUESTION 38 How does the Cisco Location Appliance locate a client or rogue access point? A. Use Time Difference of Arrival B. Use triangulation C. Use RF fingerprinting D. Use closest access point method Correct Answer: C /Reference: QUESTION 39 On a Cisco Unified Wireless Controller, which three Access Point modes allow for client connectivity? (Choose three.) A. Local Mode B. Bridge Mode C. H-REAP Mode D. Monitor Mode BC /Reference: QUESTION 40 Which one of the following commands could limit WLC output from subsequent debug commands to show only information associated with a specific wireless client device that has the MAC address 00:0c:41:07:33:a6? A. debug mac addr 00:0c:41:07:33:a6

18 B. debug mobility addr 00:0c:41:07:33:a6 C. debug mobility addr 00:0c:41:07:33:a6 enable D. debug mac addr 00-0c a6 enable /Reference: QUESTION 41 When performing a Layer 2 intra-controller roam on a WLC, an i client is experiencing greater latency than expected. You guess that PKC is not working correctly. Which two CLI commands can verify your theory? (Choose two.) A. show pmk-cache all will verify the existence of a valid PMK on the WLC. B. show advanced eap will show PKC state and timeout values. C. debug dot1x aaa enable will show the WLC communicating with the AAA server during client roaming, if PKC is not functioning. D. show advanced client-handoff will show which client has a PKC entry that can be used for PassGuide.com- Make You Succeed To Pass IT Exams roaming. C /Reference: QUESTION 42 What information is needed to add a Cisco WLC into the Cisco WCS? A. IP address of virtual interface B. IP address of AP manager interface C. IP address of management interface D. IP address of service port Correct Answer: C /Reference: QUESTION 43 The following message can be seen on a wireless LAN controller: Reached Max EAP Identity Request retries (5) for STA 00:11:22:33:44:55 What does this message indicate? A. The WLC has requested initial EAP authentication information from the NIC, but has not received a response after five tries. B. The initial access request from the WLC to the RADIUS server was successful, but the NIC at 00:11:22:33:44:55 did not respond to five subsequent access-challenges.

19 C. The RADIUS server was unresponsive to five WLC access requests to authenticate the user with the MAC address 00:11:22:33:44:55. D. The authentication sequence completed with an access-reject from the RADIUS server five times, after which the NIC card was excluded by the WLC. /Reference: QUESTION 44 In order to be able to communicate with the WDS master, what must be configured on the APs while setting up a WLAN for Wireless Domain Services? A. username and password valid on the AAA server B. multicast group for the WDS C. IP address of the master WDS and any backup master WDS D. pre-shared key which matches that of the master WDS /Reference: QUESTION 45 Which statement accurately describes AP power as related to Cisco 7921 wireless IP phone deployment? A. AP power should be set to a value that ensures 15-20% overlap between cells. B. A 7921 wireless IP phone will roam to the AP with the most powerful signal prior to an outgoing call only. C. AP power should be set to the maximum, in order to ensure good signal strength. D. A 7921 wireless IP phone will roam to the AP with the most powerful signal before or during an outgoing call. /Reference: QUESTION 46 The proper design of a VoWLAN network can be supported by which two guidelines? (Choose two.) A. In order to prevent multipathing, the distance between access points should not exceed the heights of the rooms in which they are installed. B. For an ideal voice-ready wireless cell size, the radius or size of each cell should be -67 dbm. C. A VoWLAN network using a radio needs an access point approximately every 4 meters (13 feet). A VoWLAN network using b/g radio needs an access point approximately every 8 meters (26 feet). D. If there are numerous clients in an area, or the supported data applications require significant bandwidth, capacity can be added to the network by using more access points on spectrally exclusive (in other words,

20 non-overlapping) channels. Correct Answer: BD /Reference: QUESTION 47 Which statements are true about noise in an b/g environment (2.4-GHz)? A. Noise is defined as a 2.4-GHz signal that is not in an DSSS format but is in the frequency range of the access point's configured channel. B. Microwave Oven, Cordless Phones, Jammers C. Any signal that the access point cannot decode is considered noise. D GHz frequency-hopping radio BCD /Reference: QUESTION 48 In the process of deploying a Cisco 7921G wireless IP phone within the Cisco Unified Wireless Network, which feature will be implemented between the phone and the access point to mitigate one-way audio? A. NMSP B. DTPC C. DCA and TPC D. AKM Correct Answer: B /Reference: QUESTION 49 Which statement correctly describes preambles? A. It may be necessary to configure an AP for long preambles, because some clients are not capable of using short preambles. B. Support for short preambles is mandatory. C. It may be necessary to configure an AP for short preambles, because some clients do not understand the additional information transmitted in long preambles. D. For maximum throughput for both types of cards, short preambles should be turned off when there is a mixture of b and g clients.

21 /Reference: QUESTION 50 Which feature should be provisioned on all controllers in order for Radio Resource Management to operate correctly amongst multiple controllers in which APs are able to hear each other? A. the same mobility group B. the same ASCII RF group name C. Layer 2 LWAPP only D. the same WEP Key Correct Answer: B /Reference: QUESTION 51 Cisco Client Management Frame Protection is running on a mobility group with two controllers. For the following options, which two MFP requirements protect the network? (Choose two.) A. requires the use of a nonbroadcast SSID B. requires CCXv5 C. implements the validation of wireless management frames D. forces clients to authenticate, using a secure EAP method only Correct Answer: BC /Reference: QUESTION 52 How to differ EAP-TLS from Microsoft PEAP? A. EAP-TLS requires a client certificate. B. EAP-TLS does not require a certificate. C. Both EAP-TLS and Microsoft PEAP require client certificates but Microsoft PEAP is described in RFC D. Microsoft PEAP is more secure. /Reference: QUESTION 53

22 Which four components are of CSMA/CA? A. fragmentation, PCF, collision, backoff B. carrier sense, DCF, acknowledgment frames, RTS/CTS medium reservation C. fragmentation, PCF, acknowledgment frames, RTS/CTS medium reservation D. carrier sense, collision, jam sequence, backoff Correct Answer: B /Reference: QUESTION 54 Observe the following error message carefully: Error Message DOT11-TKIP_MIC_FAILURE_REPEATED: Two TKIP Michael MIC failures were detected within [number] seconds on [interface] interface. The interface will be put on MIC failure hold state for next [number] seconds Which option is correct about this error message? A. Because MIC failures usually indicate an active attack on your network, the access point is throttled and put on hold for the configured time. Access by new stations is restricted until the timer expires. B. Because MIC failures usually indicate an active attack on your network, the interface will be put on hold for the configured time. During this hold time, stations using TKIP ciphers are disassociated and cannot reassociate until the hold time ends. Once the hold time ends, the interface will begin to operate normally again. C. Because MIC failures usually indicate a passive attack on your network, the interface input queues are placed on hold for the configured time. During this hold time, all traffic is dropped until the hold timer expires. Once the hold time ends, the interface will begin to operate normally again. D. Because MIC failures usually indicate a passive attack on your network, the interface MIB counter will be incremented. During hold time, stations using TKIP ciphers are still allowed to associate and establish authentication. Correct Answer: B /Reference: QUESTION 55 Which two items are the purposes of a pre-site survey walkthrough? (Choose two.) A. identify potential problem areas B. define intended coverage areas C. determine the final location of APs and antennas D. identify sources of RF signal attenuation and RF interference B /Reference:

23 QUESTION 56 For the following statements, what are the key RF deployment guidelines for WLAN phones? A. VoWLAN handsets should use static WEP, since it provides the fastest roam times and the security of VoWLAN calls is not a high priority. B. Follow standard WLAN site survey procedures to minimize cell overlap and interference. In addition, ensure that the cell edge has a minimum power level of -67 dbm and an error rate less than 1%. The power level of the APs and the handset should match, and should also provide sufficient call capacity. C. The RF deployment guidelines are the same as those for any other WLAN client: perform a site survey to ensure appropriate coverage for the required bit rate and minimize channel overlap. D. Use patch antennas to provide higher gain and better coverage and use the highest power on the AP. This will ensure maximum coverage and minimize the number of dropped calls. Correct Answer: B /Reference: QUESTION 57 Your company has just completed constructing a new automobile parts manufacturing facility. The facility IT manager would like to implement voice over WLAN. During your initial walkthrough, you see numerous highly reflective surfaces on the manufacturing equipment and in the building construction itself. What potential problem exists that should be accounted for during your site survey? A. RF signal absorption B. multipath distortion C. RF signal attenuation D. Fresnel zone impedance Correct Answer: B /Reference: QUESTION 58 Can you tell me which three of the following items are configurable settings on each SSID for the Cisco Access Point High Speed WAN Interface Card? (Choose three.) A. guest mode B. quality of service C. infrastructure SSID D. maximum number of client associations CD

24 /Reference: QUESTION 59 How to connect the new bridge to the old antenna while installing an outdoor bridge which is replacing another vendor's bridge? A. FCC and ETSI regulations do not permit the connection of disparate systems without certification. B. The standard requires that all connectors be N-type connectors, so the bridge and antenna will interoperate with no changes. C. The connectors are proprietary to the vendor, so using an adapter that is approved by the vendor would be necessary. D. The connectors are proprietary to the vendor, so using an adapter available from either vendor would be necessary, but no regulatory approval is required. /Reference: QUESTION 60 Refer to the following options, which two are long-term solutions to hidden node problems? (Choose two.) A. enable CTS to Self B. change the RF situation by increasing the power on client work stations (None-AP-STA) C. increase the radio speed to at least 24 Mb/s D. change the RF situation by adding additional access points Correct Answer: BD /Reference: QUESTION 61 According to FCC Rule # (h)(2), it is required that products operating in certain bands need to support Dynamic Frequency Selection to detect and automatically adjust channels to protect WLAN communications from interfering with military or weather radar systems. Which two 5-GHz bands must support Dynamic Frequency Selection? (Choose two.) A. UNII-1 B. UNII-0 C. UNII-2 D. UNII-2 Extended Correct Answer: CD /Reference: QUESTION 62

25 In order to provide end-to-end QoS, how to send traffic classification information between the LWAPP AP and the WLAN controller? A. There is no end-to-end QoS, only WMM on the WLAN. This is all that is required, because campus networks typically have greater than 1 Gb/s backbones and WLANs operate at only 11 or 54 Mb/s. B. LWAPP APs map the WMM CoS values of the client traffic to the Ethernet frames and the CoS value of the Ethernet frames sent to the AP to the WMM access category. The switch upstream from the AP is responsible for converting between 802.1D classification and DSCP. C. The WMM CoS values are carried within the LWAPP tunnels and translated from CoS to DSCP to ensure that the correct priority is given to different LWAPP packets. D. LWAPP packets from the controller and the AP are marked by DSCP based on the DSCP of the tunneled traffic. This DSCP is converted to a CoS by a table in the AP. The access category used for each frame depends on the table CoS and QoS profile of the WLAN. Correct Answer: D /Reference: QUESTION 63 In a calibrated system, how statistically accurate is the Cisco Location Appliance at tracking thelocation of a client? A. within 5m, 90% of the time B. within 50cm, 90% of the time C. within 1m, 90% of the time D. within 10m, 90% of the time Correct Answer: D /Reference: QUESTION 64 Which three statements correctly describe configuring the Cisco Catalyst 6500 Series WiSM module? (Choose three.) A. Each WLC on the Cisco WiSM supports up to 150 access points. B. When LAG is disabled, the management interface must be configured on port 1. C. LAG is enabled automatically and bundles all of the distribution ports of a controller into a single EtherChannel. D. The AP Manager interface may be on the same VLAN or IP subnet as the management interface. CD /Reference: QUESTION 65

26 Which data can be passed down to an LWAPP AP by use of DHCP option 43? A. The IP address, subnet mask, and default gateway assigned to the AP. B. The Cisco WLC management interface IP address. C. The AP's ARP timeout value. D. The IP address of the Cisco WCS server, or other SNMP management system. Correct Answer: B /Reference: QUESTION 66 You see a lot of retransmissions being sent between client devices and a management server on the network while implementing the Cisco Unified Wireless Network at a customer's site. After investigating, you find out that the wireless clients see several access points, but the RSSI is very poor. After onsite evaluation, you note that there are many manufacturing machines within the factory that are highly metallic. Which type of RF problem can be fixed while performing an RF analysis within the environment? A. multipath distortion B. excessive client roaming C. free space path loss D. binary phase shift keying /Reference: QUESTION 67 Assume that A WLAN controller has two AP and three Cisco 7921 IP phones. In order to have good Voice quality, which item is true with regard to the RF configuration displayed? A. The configured "Fragmentation Threshold" (2346) is too low for a voice deployment B. Cisco recommends using b/g deployment for voice to prevent interferences with microwave ovens and Bluetooth devices. C. The configured channels (Ch-36 and Ch-40) are "side/adjacent channels". The 5 GHz channels overlap

27 their adjacent channels, so there should be at least 1 channel of separation for adjacent APs. D a channels are manually configured. This is not allowed in a DFS environment. Correct Answer: C /Reference: QUESTION 68 Which three descriptions are correct with regard to traffic classification in Wi-Fi Multimedia? (Choose three.) A. Wi-Fi Multimedia defines four access categories: AC_BK, AC_BE, AC_VI and AC_VO. B. Each access category corresponds to one of four transmit queues. C. Once traffic is classified by Wi-Fi Multimedia, HCCA distributes the the transmit opportunities according to the traffic priority. D. Wi-Fi Multimedia maps the eight 802.1P (now part of 802.1D) classification schemes to four access categories. In contrast, the 802.1D classification is still sent in the actual frame. BD /Reference: QUESTION 69 A user complains about problems authenticating via wireless. Which two of the Cisco WLC debug commands below would solve this problem? (Choose two.) A. debug mac { addr MAC} B. debug client authentication enable C. debug dot1x events enable D. debug client events enable C /Reference: QUESTION 70 You are a network engineer for a company. You are asked to configure an EtherChannel for ports 49 and 50 on a Cisco Catalyst 3750 Series Switch after enabling LAG on a Cisco 4404 Wireless LAN Controller. The EtherChannel need to support VLANs 8, 16, 24, and 32. In order to finish this task, which configuration is needed? A. interface Port-channel1 switchport trunk encapsulation dot1q switchport trunk allowed vlan 8,16,24,32 switchport mode trunk B. interface GigabitEthernet1/0/49 channel-group 1 mode on interface GigabitEthernet1/0/50 channel-group 1 mode on interface Port-channel1 switchport trunk encapsulation dot1q switchport trunk allowed vlan 8,16,24,32 switchport mode trunk C. interface GigabitEthernet1/0/49

28 switchport trunk encapsulation dot1q switchport trunk allowed vlan 8-32 switchport mode trunk channelgroup 1 mode on interface Port-channel1 switchport trunk encapsulation dot1q switchport trunk allowed vlan 8,16,24,32 switchport mode trunk D. interface GigabitEthernet1/0/49 switchport trunk encapsulation isl switchport trunk allowed vlan 8,16,24,32 switchport mode trunk channel-group 1 mode on Correct Answer: B /Reference: QUESTION 71 A customer tries to connect to an access point and reports that the access point could only be connected at 54 Mb/s while deploying the Cisco Unified Wireless Network to support n with encryption. Which is the reason for this problem? A. The client is set for open authentication. B. The client has DTPC enabled. C. The client does not have WPA2 AES enabled. D. The client adapter is not capable of 40 MHz. Correct Answer: C /Reference: QUESTION 72 Cisco Wireless LAN Controllers are responsible for system wide wireless LAN functions, such as security policies, intrusion prevention, RF management, quality of service (QoS), and mobility. When receiving a shun command from a Cisco IPS, how does the WLAN controller block a client? A. by using the client name B. by using the client RF fingerprint C. by setting up an ACL in the WLAN controller to block client IP connectivity D. by using the MAC address Correct Answer: D /Reference: QUESTION 73 When receiving a CTS frame, what will an a station (STA) do? A. Respond with an RTS frame. B. Respond with a CTS ACK frame. C. Check the network allocation vector, and update it, if appropriate. D. Check the MAC address in the receiver address field to determine if it matches the frame's own address, and, if so, respond with a CTS ACK frame.

29 Correct Answer: C /Reference: QUESTION 74 Quality of Service (QoS) refers to the capability of a network to provide better service to selected network traffic over various technologies. In wireless networks, what is the QoS challenge caused by the hidden node problem? A. When an AP is attempting to make an assessment of its capacity to advertise and use in TSPEC admission control, it needs to assess the number of clients it has associated. This calculation is incorrect if the AP does not see the hidden nodes and can result in capacity PassGuide.com-Make You Succeed To Pass IT Exams management issues. B. Frames are lost due to collisions of traffic between clients that cannot detect each others' channel usage, and therefore cannot defer the sending of traffic until the channel is free. Higher priority frames cannot avoid these collisions. C. Frames are lost due to collisions of traffic between clients that cannot detect each other's channel usage, and therefore cannot defer the sending of traffic until the channel is free. These collisions only impact lower priority frames, as they are sent later than high priority frames. D. A hidden node is not a QoS issue, but a security issue in which a rogue client impersonates an access point to a client and the client to the access point. Correct Answer: B /Reference: QUESTION 75 The transmit power level on an a radio is configured for 25 mw. What is the corresponding value in decibels? A. 17 dbm B. 25 dbm C. 14 dbm D. 50 dbm Correct Answer: C /Reference: QUESTION 76 Which three devices'historical locations can be tracked by the Cisco Location Appliance? (Choose three.) A based RFID Asset tags

30 B. remote sources of ISM interference C. rogue access points D. trusted and rogue clients CD /Reference: QUESTION 77 Can you tell me what the LWAPP data and control port numbers are? A. TCP and B. UDP and C. TCP and D. UDP and Correct Answer: D /Reference: QUESTION 78 Which two features of Cisco WCS could assist with predictive design and planning without access points being fully deployed and installed? (Choose two.) A. planning mode B. Location Accuracy tool C. Inspect VoWLAN Readiness tool D. Inspect Location Readiness tool D /Reference: QUESTION 79 In order to decrease roaming times with Cisco 7921G wireless IP phones implemented in a large enterprise network, which feature will you recommend? A. WPA-PSK B. Cisco CKM C. EAP-TLS + TKIP D h Roaming Assistance Correct Answer: B

31 /Reference: QUESTION 80 When configuring a Cisco 792X wireless IP phone with DHCP, what information will be in the DHCPOFFER message, and why? A. option 150, to provide the phone with the Cisco Unified Communications Manager IP address to download its XML configuration file B. option 60, to provide the phone with the IP address of the RADIUS server, if EAP is in use C. option 66, to provide the phone with the Cisco Unified Communications Manager IP address to download its XML configuration file D. option 150, to provide the phone with the TFTP-Server IP address to download its XML configuration file Correct Answer: D /Reference: QUESTION 81 Which description is correct with regard to the roaming behavior of a NIC in a desktop PC as it communicates with an access point? A. The NIC will use a vendor-dependent combination of factors in determining which AP to connect to, including signal strength, signal quality, and data rate. B. The NIC will comply with the roaming standards set forth in IEEE C. The NIC will associate to the closest access point and only disconnect when the PC or AP is turned off. D. The NIC will associate to the closest access point, but the AP may determine that the RF environment is too congested and disconnect the PC. /Reference: QUESTION 82 Which service will be offered without conducting a new site survey if there is an existing g WLAN at a site? A. increase the throughput for the wireless clients B. increase the Layer 2 and Layer 3 security of the WLAN C. add new services (such as voice) over the WLAN D. add a new a WLAN Correct Answer: B /Reference:

32 QUESTION 83 Take guest network best practices into consideration, which two features need to be configured on the controller while configuring a WLAN controller to support guest access? (Choose two.) A. ARP unicast B. DHCP Optional C. peer-to-peer blocking D. DHCP Required Correct Answer: CD /Reference: QUESTION 84 What is the objective of VLAN 40 in this case according to the configuration excerpt presented in this exhibit? A. the data frame switching VLAN B. WLCCP traffic between the Cisco WiSM and Catalyst 6500 Series Supervisor Engine 720

33 C. the Management VLAN for the Cisco WiSM D. the Cisco WiSM Service VLAN Correct Answer: C /Reference: QUESTION 85 Which command will be used to check the status of infrastructure APs from the CLI of an AP configured as a WDS master? A. show wccp wds B. show wlccp ap C. show lwapp ap D. show wlccp wds ap Correct Answer: D /Reference: QUESTION 86 Which item is correct about the definition of co-channel interference? A. interference from the same channel as the receiver channel in use B. interference from any 2.4-GHz source C. interference from any channel except the same channel as the receiver D. interference from a channel adjacent to the channel in use /Reference: QUESTION 87 Which one of the following commands will you use to load Cisco IOS on an autonomous AP? A. archive download-sw /overwrite tftp://server_ip/image_name B. copy flash:image_name tftp://server_ip/image_name C. copy flash tftp and respond to the interactive prompts D. config net and respond to the interactive prompts

34 /Reference: QUESTION 88 The central office is currently using a combination of 4400 and 2100 series WLAN controllers running v4.2 and a variety of LWAPP-enabled access points servicing both 2.4 GHz and 5 GHz. The WLAN deployment has been extended to each remote office by implementing a 526 WLAN controller running v4.1 and several 521 access points. Wireless client deployment uses EAP-TLS authentication by use of a centralized RADIUS server plus n for performance. After the first remote office deployment, remote office users complain that they are not connecting via n. Which will most likely cause this problem? A. The 521 AP does not support 5 GHz, which prohibits n. B. The 521 AP and 526 WLAN controllers do not support AES, which prohibits n. C. The 526 WLAN controller does not support external authentication via RADIUS, prohibiting authentication. D. The 526 WLAN controller does not support n with either v4.1 or v4.2. Correct Answer: D /Reference: QUESTION 89 After going through the DCF process, what further process does the client go through to reserve a medium? A. send a REQ, receive an ACK, send frames B. send an RTS and SIFS, receive a CTS and SIFS, then send frames C. no process; it can begin transmitting immediately D. send a CTS and SIFS, receive an RTS and SIFS, then send frames Correct Answer: B /Reference: QUESTION 90 Which three guidelines are recommended by Cisco for proper VoIP operation? (Choose three.) A. delay should not exceed 150 ms (one-way) B. packet loss should not exceed 0.1% C. delay variation (jitter) should not exceed 30 ms D. packet loss should not exceed 1% Correct Answer: D /Reference:

35 QUESTION 91 What is included in the reassociation request message if a Cisco CKM client roams to a new access point? A. The reassociation request contains a network session key which will be used for TLS and a sequentially incrementing rekey number. B. The reassociation request contains the EAP identity. This shortens the full EAP reauthentication. C. The element in the reassociation request includes a timestamp, the rekey request number, and an authenticated element. D. The reassociation request contains the PMKID list from the station, in order to allow the new AP to contact the old AP to inherit the key material. Correct Answer: C /Reference: QUESTION 92 What are two objectives of the a, b, and g Wi-Fi Alliance certification tests? (Choose two.) A. performance above a high throughput threshold to demonstrate compliance B. interoperability with other products certified by Wi-Fi Alliance C. compliance with the IEEE standard D. performance above a low throughput threshold to demonstrate interoperability Correct Answer: BD /Reference: QUESTION 93 Your company has a main office and many branches. It should have its users at the branches authenticate via the main office using 802.1X without having controllers at the branches. This design can be supported by which three states? (Choose three.) A. H-REAP in Connected mode B. WLAN in an authentication-local/switch-local state C. WLAN in an authentication-central/switch-local state D. WLAN in an authentication-central/switch-central state CD /Reference: QUESTION 94

36 Study the following exhibit carefully. The People's Hospital is a large, multi-story, Level 1 trauma center located in the United States. This hospital is using a new multi-service WLAN infrastructure capable of supporting multiple enterprise data applications, wireless medical telemetry, voice over WLAN using Vocera badges, location-based services, integrated RF spectrum analysis, rogue AP detection, automatic RF power and channel optimization, and wireless guest access. The design states the use of Cisco Aironet 1242 Access Points. The People??s Hospital contracted with a Cisco Channel Partner to complete a site survey on the basis of these needs. The site survey report did not identify the exact model of antennas that should be used. Instead, the report specified that 2.0-dBi omnidirectional antennas should be used for the 2.4-GHz AP radios and 4.0-dBi omnidirectional antennas for the 5-GHz AP radios. It also specified that spatial diversity must be supported. Which two antenna models would best satisfy the 5-GHz deployment requirement specified by the site survey report? (Choose two.) A. Cisco 6-dBi Omnidirectional antenna B. Cisco 4.5-dBi Diversity Omnidirectional antenna C. TerraWave 5-GHz 4.0-dBi Diversity Omnidirectional antenna D. Cisco 3.5-dBi White Dipole antenna, two per AP Correct Answer: BD /Reference: QUESTION 95 Before sending a frame over a medium and verifying that the medium is free, which process does a wireless client go through? A. send a CTS frame, receive an RTS frame, then transmit the frame B. verify that NAV = 0, then transmit the frame C. send an RTS frame, receive a CTS frame, then transmit the frame D. check that NAV = 0, generate a random backoff, verify that the channel is free, verify that slot times = 0, then transmit the frame Correct Answer: D

37 /Reference: QUESTION 96 What is peer-to-peer blocking used for? A. prevents the use of peer-to-peer applications such as Gnutella and Kazaa B. prevents traffic from wireless client to wireless client on the same VLAN, and forces all traffic to be transferred to the upstream VLAN C. prevents wireless-to-wired traffic, but permits wireless-to-wireless traffic D. prevents internal traffic between all devices on different WLANs Correct Answer: B /Reference: QUESTION 97 Study the given conditions carefully, then answer the following question. Wireless client (CB21) configured for SSID "CCIE-2". Configure standalone authonomous AP with three data VLANs plus the native VLAN. AAA server configured for LEAP and EAP-FAST authentication and dynamic VLAN assignment. Question: Why is this wireless client not able to associate to the network? A. Attributes in use are not correct for VLAN assignment. B. Encryption should be configured under the SSID but it is configured under the VLAN. C. An RF issue, the client disconnects right after the successful authentication. D. The encryption and the key-management from the SSID/VLAN the client uses to associate must match the encryption and key management the AAA server assigned during the authentication/authorization process. Correct Answer: D /Reference: QUESTION 98 Which statement best describes MAC authentication?

38 A. The MAC address can be spoofed, so it is insecure. B. Users will not be able to connect unless some form of encryption is also used. C. The MAC address is used in place of the username in the EAP certificate exchange. D. If WEP is used as a key cipher, the MAC address may be used in the key hash. /Reference: QUESTION 99 Can you tell me when a client will provide an AP with its version of Cisco Compatible Extensions for WLAN devices? A. when the AP sends an unsolicited update embedded in a beacon packet B. in an association or re-association request frame C. upon successful EAP or dot1x authentication to the AP D. in a broadcast probe request packet Correct Answer: B /Reference: QUESTION 100 Certways University will soon complete a second building on its main campus. It wants to use Gigabit Ethernet fiber to connect two buildings. In order to satisfy the university's requirements of a new WLAN network for its buildings. Which three questions will you ask to arrive at an appropriate design? (Choose three.) A. How many access points do you expect to need in your new building that is under construction? B. How many end users are there and what is the throughput per user needed? C. What is the security policy of your organization for wireless networks? D. Which mobility services do you need to run over your WLAN network? Correct Answer: BCD /Reference: QUESTION 101 Which debug command could determine whether an AP is registering with a WLC or not? A. debug lwapp ap {AP-MAC} enable B. debug wlccp dump C. debug lwapp events enable

39 D. debug wlccp dump enable Correct Answer: C /Reference: QUESTION 102 Which two statements best describe hidden node problems? (Choose two.) A. Hidden node problems can be diagnosed and verified by enabling CTS to Self. B. The MAC frame exchange protocol addresses these problems by adding two additional frames to each frame exchange (a RTS and CTS frame). C WLAN media access is based on CSMA/CA. Therefore, every data frame needs to be acknowledged by the receiver. D. Hidden node problems occur because each WLAN STA cannot be expected to communicate directly with every other WLAN STA. Correct Answer: BD /Reference: QUESTION 103 Do you know how many WMM access categories there are, and how they relate to the IEEE 802.1D priority classification? A. There are two access categories: Best Effort and Voice. IEEE 802.1D, SVP, or CDP determine which access category is used. The access category used determines which EDCA timing parameters are used for transmitting the frame. B. There are eight WMM access categories that directly correlate to the IEEE 802.1D priority classification. The access category used determines which EDCA timing parameters are used for transmitting the frame. C. There are four WMM access categories: Best Effort, Background, Video, and Voice. A fixed mapping of priority information carried in the 802.1D Priority field to those four queues is defined by the Wi-Fi Alliance, together with suggested uses for each priority that are consistent with the suggested uses in 802.1D. D. WMM access categories are part of the i AAA security standards, and define the different levels of client access in WPA, and WPA2. They have no relationship to IEEE 802.1D. Correct Answer: C /Reference: QUESTION 104 Study the following exhibit carefully. Configure this client supplicant and AAA server for PEAP- MS-CHAPv2. According to this debug and show output, which device is causing this client to be unable to connect and why?

40 A. the client supplicant: it is not configured for dot1x B. the RADIUS server: it provides the wrong server certificate (missing enhancement key usage field) C. the AP: it is misconfigured, because the RADIUS server port configuration is incorrect D. the client supplicant: due to an invalid Protected Authentication Credential

41 /Reference: QUESTION 105 Which is the objective of a radome? A. to reduce the mechanical load from wind B. to indicate which way the antenna is pointing C. to increase the gain of an antenna D. to mitigate interference /Reference: QUESTION 106 Which action should be taken to collect and view a remote WLAN packet capture by use of a supported packet analyzer from an AP? A. change the AP mode to Sniffer, create a remote adapter with the Cisco WLC management IP on a packet analyzer B. change the AP to Sniffer mode, specify a time interval, and read packet captures from Cisco WLC management C. change the AP mode to Sniffer, configure the server IP address on the AP radio, and create a remote adapter with the Cisco WLC management IP on a packet analyzer D. change the AP to Sniffer mode, download a capture from the Cisco WLC, and open the capture with a packet analyzer Correct Answer: C /Reference: QUESTION 107 As part of the CSMA/CA algorithm for controlling wireless contention, which factor can be used in deriving the Network Allocation Vector in a packet? A. duration field B. DIFS C. EIFS D. SIFS /Reference:

42 QUESTION 108 You work as a network designer. You are tasked with designing a wireless network for a high-rise dormitory in New York City. Each floor is about 10,000 square feet with identical Apartment layouts. You use the Cisco WCS planning tool to run the floor plan, and it is recommending three APs per floor. Which step is the next? A. review physical locations for mounting APs B. perform a physical site survey C. decide which authentication method will be appropriate D. prepare a Bill of Materials Correct Answer: B /Reference: QUESTION 109 Which one of the following issues is the RTS/CTS mechanism used to address in an b network? A. hidden node problem B. Network Allocation Vector synchronization C. bandwidth overload D a compatibility /Reference: QUESTION 110 Tom is a network engineer. He has just been tasked with recommending an AP for use in the outdoor courtyard of a hospital that is already using controllers. The courtyard is 50 feet wide by 50 feet long, and is surrounded by brick walls. An outdoor network connection and AC power receptacle will be available near the only door to the courtyard. Which should be included in Tom's recommendation? A. Cisco Aironet 1522 Access Point with an omnidirectional antenna B. Cisco Aironet 1310 Access Point with no external antenna C. Cisco 3200 Series MARC with no external antenna D. Cisco Aironet 1242 Access Point with no external antenna Correct Answer: B /Reference: QUESTION 111 Which three parameters can be used in calculating the range of an outdoor link between two bridges? (Choose three.)

43 A. Fresnel Zone diameter B. antenna gain C. cable length between bridge and antenna D. bridge transmission power Correct Answer: BCD /Reference: QUESTION 112 Which information is most important for you to obtain from the customer in order to correctly design a wireless network? A. previous experience with the old wireless network B. most active users on the network C. critical applications that will run over the WLAN D. issues concerning security breaches in the old security standards Correct Answer: C /Reference: QUESTION 113 According to the following exhibit, WLC1 is using WLC2 as a mobility anchor for the "Guest" WLAN. Which two traffic paths should be allowed through the firewall that sits between the two WLCs? (Choose two.)

44 A. IP protocol 97 between and B. IP protocol 47 between and C. UDP ports and between and D. IP protocol 97 between and Correct Answer: CD /Reference: QUESTION 114 Do you know at what distance the curve of the earth factors into the antenna elevation calculation? A. greater than 6 miles (~10 km) B. 60% of the Fresnel zone C. greater than 26 miles (~42 km) D. the width of the Fresnel zone, which varies depending on the distance by which the bridges are separated /Reference:

45 QUESTION 115 Which characteristic of wireless LAN controller allows traffic from clients communicating with each other on the same SSID to be bridged, dropped, or forwarded at the wireless LAN controller? A. multicast optimization B. HREAP C. client bridge mode D. peer-to-peer blocking Correct Answer: D /Reference: QUESTION 116 Which three functions will the access point in a Split-MAC architecture handle? (Choose three.) A i encryption B i key management C e queuing D. beacon generation CD /Reference: QUESTION 117 The Certways University has 20 buildings and 10,000 students. It wants to implement a single SSID across the whole campus. On the basis of university policy, students in the auditorium should not have Internet access, because standardized testing will be carried out there. Which feature will be helpful for deploying the university's SSID? A. AP groups B. WLAN override C. MAC filtering D. AAA override /Reference: QUESTION 118 While configuring Wireless Domain Services, which port is used for traffic between infrastructure APs and the WDS AP?

46 A. Generic Routing Encapsulation GRE which is IP Protocol 47 B. UDP destination and source protocol port 1645 (0x066D) C. UDP destination and source protocol port 1812 (0x0714) D. UDP destination and source protocol port 2887 (0x0B47) or Ethernet Type (0x872D) Correct Answer: D /Reference: QUESTION 119 Which device controls Radio Resource Management in a centralized WLAN environment with multiple WLCs configured for mobility? A. the AP that wins the RF election B. the RF group leader C. all the controllers in the same mobility group D. the controller to which APs are currently registered Correct Answer: B /Reference: QUESTION 120 On the basis of a site survey report, 172 APs are required to meet the coverage needs. The IT Director insists on an N+1 controller redundancy design for the access points. In addition, the design should allow for growth of as much as 10% in the number of access points. What is the minimum WLAN controller configuration required to support these requirements? A. four 4402 Wireless LAN Controllers B. four 4404 Wireless LAN Controllers C. three 4404 Wireless LAN Controllers D. one Cisco Wireless Service Module Correct Answer: C /Reference: QUESTION 121 For the following Cisco IOS features, which one allows an access point to broadcast more than one SSID? A. guest mode B. MBSSID C. broadcast key rotation D. BBSSID Correct Answer: B

47 /Reference: QUESTION 122 Which standard should be met in order to ensure clients of H-REAP can maintain connectivity to the VLAN at a controller? A. The one-way-trip WAN delay should not exceed 100 milliseconds. B. WAN jitter should not exceed 10 microseconds. C. The round-trip WAN delay should not exceed 100 milliseconds. D. WAN jitter should not exceed 10 milliseconds. Correct Answer: C /Reference: QUESTION 123 Which properties are of an AP in H-REAP mode? A. Can switch client data traffic locally. B. Perform client authentication locally when its connection to the controller is lost. C. Support Cisco Centralized Key Management fast roaming. D. Allows some SSID/VLAN traffic to be switched locally while other SSID/VLAN traffic has full LWAPP functionality. BCD /Reference: QUESTION 124 While using EAP type equal to PEAP with server-side TLS authentication, which option is correct? A. The EKU field is required in the server certificate on the RADIUS server. B. The RADIUS server must be compliant with Cisco Compatible Extensions. C. The issuer of the certificate is Microsoft. D. Private and public keys must be shared by the client, controller, and RADIUS server. /Reference:

48 QUESTION 125 How do the characteristics that are available on the Cisco WCS for Linux version differ from those of the Cisco WCS for Windows version? A. Cisco WCS for Linux is required for deployments. B. Assuming that there are no differences in hardware, a Cisco WCS for Linux can support up to 750 wireless LAN controllers. A Cisco WCS for Windows can support up to 250 wireless LAN controllers. C. Cisco WCS for Windows includes support for Cisco Spectrum Expert clients. Cisco WCS for Linux does not support Cisco Spectrum Expert clients. D. There are no differences in features between the Linux and Windows versions of Cisco WCS. Correct Answer: D /Reference: QUESTION 126 The 2.4-GHz wavelength is about 4.92 inches (12.5 cm), if you want to support diversity on a 2.4- GHz radio, at what distance is it recommended you put two separate antennas? A. 7.6 inches (19.30 cm) B inches (30.99 cm) C inches (12.5 cm) D inches (62.5 cm) Correct Answer: C /Reference: QUESTION 127 You are a network technician. According to the following exhibit, a client configured for LEAP authentication, a RADIUS server configured for LEAP, and an autonomous AP configured as Displayed. If authentication fails for the client, which is the most likely cause of this problem?

49 A. The client supplicant: This client is providing the wrong EAP-ID in its EAP Identity response. B. The RADIUS server timeout: This timeout is too short; the access point will wait for the RADIUS server, then the timer will expire and authentication will fail. C. The RADIUS server at : There is either a RADIUS key mismatch or user credentials are not matching on the RADIUS Server. D. The AP: The AP is misconfigured, because the authentication is set to use the local database on the AP.

50 Correct Answer: D /Reference: QUESTION 128 Which two actions will happen when a wireless client deploys a Layer 2 roam between two WLCs with management IP addresses on different IP subnets but dynamic interfaces in the same VLAN? (Choose two.) A. The new WLC exchanges mobility messages with the original WLC and the client database entry is moved to the new WLC. B. The client database entry is maintained on both the original and new WLCs. C. The original WLC marks the client with an "Anchor" entry in its own client database. D. The client database entry is removed from the original WLC once it has been entered into the new WLC. D /Reference: QUESTION 129 What is the reason that using a tool like Cisco Spectrum Expert is important? A. It maps the RF area to a floor plan. B. It allows you to detect multipath. C. It allows you to see the radiating environment at Layer 1. D. It decodes WLAN IPS attacks Correct Answer: C /Reference: QUESTION 130 In the AP Layer 3 controller discovery process, after the LWAPP Discovery Request is broadcast on a local subnet, which action will AP take next? A. Send an LWAPP response to the master controller if known. B. Send an LWAPP discovery request to controllers learned via OTAP if operational. C. Wait 5 seconds and resend a Discovery Request to the local subnet. D. Determine whether the controller responses are the primary controller. Correct Answer: B /Reference:

51 QUESTION 131 Which three options are true when an H-REAP AP is in the "authentication down/local switching" state for a given WLAN? (Choose three.) A. New WebAuth sessions are permitted. B. The AP continues to send beacon probes and responses to keep current clients connected. C roaming events incur a full 802.1X re-authentication. D. Any new clients trying to authenticate are rejected. Correct Answer: BCD /Reference: QUESTION 132 The following message can be seen on a Cisco WCS: AP 'floor-1-lobby', interface '802.11b/g' on Controller ' '. Noise threshold violated. There is also a correlation between the occurrence of the message and user complaints. Which action should you take? A. Check the logs for rogues in the area, then turn on rogue mitigation. B. Seek out the source of the noise with a spectrum analyzer. C. Manually increase the power of the AP to overcome the interference. D. Increase the interference threshold from the default 10%. Correct Answer: B /Reference: QUESTION 133 Tom works as a network administrator for a company. He is asked to manually configure the Tx power on an b access point to a power level of 1 (100 mw) after implementing a Cisco 7921G wireless IP phone within a Cisco Unified Wireless Network. Which problem is the user likely to experience when the phone associates to the AP? A. one-way audio B. loss of connectivity to Cisco Unified Communications Manager C. audio delay or jitter or both D. the phone displays a "network busy" status message /Reference: QUESTION 134

52 Which statement accurately describes communication between the WDS and other APs in a WLAN setup using WDS? A. Communication is protected using multicast traffic, which is restricted to the local Layer 2 network. B. Communication is protected using X.509 certificates, which can be either self-signed or manufacturerinstalled. C. Communication is protected using a Context Transfer Key, which is manually configured on the AP. D. Communication is protected using a Context Transfer Key, which is negotiated during WDS authentication. Correct Answer: D /Reference: QUESTION 135 You are a network engineer at certways.com, When creating a wireless profile in the Cisco ADU and you have selected the WPA/WPA2/CCKM radio button option, what other decision will you make and then configure on this same screen? A. the SSID of the wireless client B. the length and value of the pre-shared key C. the EAP type to be used for authentication D. the encryption type Correct Answer: C /Reference: QUESTION 136 Alex is a network engineer for a company, he is now upgrading a large autonomous WLAN deployment to LWAPP operation. He has successfully imported a X.509 self-signed certificate into the WLC. But, when he tries to add additional self-signed certificates, the WLC GUI reports a "Failed to Add entry" error. Which command can diagnose the root cause of this problem? A. show exclusionlist B. show database summary C. show sysinfo D. show wps summary Correct Answer: B /Reference: QUESTION 137 Which description is true about NIC cards certified by Cisco Compatible Extensions? A. They support Cisco WLAN technology enhancements.

53 B. They support Cisco standards such as LEAP and EAP-FAST but not PEAP-MSCHAP. C. They support standards plus power management only. D. They are compliant with Cisco Compatible Extensions, but not with Wi-Fi. /Reference: QUESTION 138 How to use Cisco WCS as part of the preliminary site survey for an unfinished building? A. find the exact location of the APs on the floor map B. detect sources of RF interference C. detect possible security policy violations D. create obstacles on floor plans that can be taken into consideration when computing RF PassGuide.com- Make You Succeed To Pass IT Exams prediction heat maps for APs Correct Answer: D /Reference: QUESTION 139 Which roaming situation using controllers in a Cisco Unified Wireless Network requires a client by use of WPA2 with PKC to reauthenticate to the network? A. A wireless client roams to another AP on the same controller. B. A wireless client roams to another AP after being out of range of the network for 2 minutes. C. A wireless client roams to another AP on a different controller in the same mobility domain. D. A wireless client roams to another AP on a controller in a different mobility domain. Correct Answer: D /Reference: QUESTION 140 Study the following situation carefully, then answer my question. A corporate wireless PC is stolen. The operating system, username, and password are known, and the WPA-PSK is stored on the PC. The PC is then used to try to obtain access to the corporate network. Which method can prevent access from being granted to this PC? A. An extended access list should be used on the default gateway of the WLAN/SSID to which the stolen PC would be connecting. B. There should be a Layer 3 filter on the AP or WLC. C. Peer-to-peer blocking should be used to prevent the PC from communicating once on the network.

54 D. The WPA-PSK should be changed in the AP or WLC, and on all corporate PCs. Correct Answer: D /Reference: QUESTION 141 When peer-to-peer blocking is disabled, what happens to the traffic between two users with the same SSID? A. traffic is inspected by the controller for malicious attacks B. traffic is dropped from wireless user to wireless user C. traffic is bridged on the same controller D. traffic is forwarded to the upstream VLAN; the device above the controller decides what action to take regarding the packets Correct Answer: C /Reference: QUESTION 142 Quality of Service (QoS) refers to the capability of a network to provide better service to selected network traffic over various technologies. You are configuring a Cisco Wireless LAN Controller to utilize QoS, and have configured the platinum queue on the controller. However, the Cisco Catalyst 3750 Series Switch connected to the Cisco Wireless LAN Controller does not contain any QoS configuration. Which command should be performed on the Catalyst 3750 Series Switch to provide the necessary QoS for voice clients on the wireless network? A. enable 802dot1p B. mls qos trust dscp C. config wlan qos wlan-id platinum D. switchport priority extend cos 5 Correct Answer: B /Reference: QUESTION 143 Study the following situations carefully, then answer my question. Wireless client (CB21) configured for SSID "CCIE-2"; IP address "dhcp". Configure standalone authonomous AP with three SSIDs and three data VLANs plus the native VLAN. AAA server IP ranges: VLAN-2: VLAN-3: VLAN-4:

55 Question: The user wants to get an IP address from VLAN-2 which is mapped to the SSID CCIE-2 the client is associating. Why does this wireless client get a wrong IP address? A. LEAP authentication fails due to wrong password or unknown username, therefore the wireless-client is mapped to the default VLAN. B. The RADIUS server is not reachable from the AP, therefore the wireless client is mapped to the default VLAN. C. LEAP needs "network-eap" <eap_methods> on the SSID. You must not configure "open eap" <eap_methods.> D. The RADIUS server assigned VLAN-4 during authentication/authorization process. Correct Answer: D /Reference: QUESTION 144 You are a network technician at certways.com,study the options carefully.a client is attached to the Cisco Unified Wireless network by use of controllers. When the client is using WPA2 and EAP authentication, where are the wireless encryption keys located during the active user session? (Choose two.) A. on the client B. on the Cisco WCS C. on the RADIUS server D. on the access point D /Reference: QUESTION 145 On or after July 20, 2007, all WLAN products shipped in Canada and the US need to meet the FCC rule (h)(2). What exactly does this rule indicate? A. The rule finally releases "UNII-2" and "UNII-2 extended" ( GHz and GHz, respectively) for industrial wireless fidelity usage.

56 B. Products operating in the "UNII-2" and "UNII-2 extended" bands must not enable transmit power control, because the additional transmission gain of TPC may disturbs radar systems. C. This rule mandates that products operating in the "UNII-2" and "UNII-2 extended" bands must support Dynamic Frequency Selection, to detect and automatically adjusts channels to protect WLAN communications from interfering with radar systems. D. Products operating in the "UNII-1" band must not enable Transmit Power Control, because the additional transmission gain may disturb radar systems. Correct Answer: C /Reference: QUESTION 146 By which DHCP option may a list of wireless LAN controllers be offered to the AP during the Layer 3 LWAPP Join process? A. 6 B. 43 C. 44 D. 46 Correct Answer: B /Reference: QUESTION 147 Which antenna type would have the narrowest horizontal beam? A. parabolic dish B. omnidirectional antenna C. patch antenna D. Yagi antenna /Reference: QUESTION 148 Which statement best describes an infrastructure basic service set according to IEEE specifications? A. No relaying of signals from one client to another client. B. Also called an Ad Hoc Network. C. Enables the use of ESS.

57 D. The BSSID is generated from the first wireless client that starts up in the IBSS. Correct Answer: C /Reference: QUESTION 149 In the Cisco Unified Wireless architecture, which three devices are in charge of generating the i Pairwise Master Key? (Choose three.) A. WLAN controller in local EAP mode B. LWAPP access point C. Cisco Secure ACS D. Cisco Secure Services Client CD /Reference: QUESTION 150 Which is a must for the delivery of unicast frames buffered at the AP in power-save mode to sleeping stations? A. The AP must send beacons, including a "buffered unicast frame" message, to notify each sleeping station that it needs to send a poll message. B. The AP must send a CTS to wake up each sleeping station. C. The AP must send probe responses to the latest SSID each sleeping station has been using. D. The AP must forward the buffered frames at the DTIM interval. /Reference: QUESTION 151 While designating a known rogue AP, what information is entered in an LWAPP system? A. the MAC address of the rogue's radio interface B. the base BSSID of the rogue AP with the last address digit ending in zero C. the MAC address of the rogue's Ethernet interface D. the IP address of the autonomous AP in a migration situation /Reference:

58 QUESTION 152 Which of the following items increases bandwidth and resists multipath problems by carrying data in subcarriers? A. Narrow Band Frequency B. Direct Sequence Spread Spectrum C. Frequency Hopping Spread Spectrum D. Orthogonal Frequency Division Multiplexing Correct Answer: D /Reference: QUESTION 153 When a mesh AP is selecting a potential parent, which primary mechanism will be used? A. controller name B. AP MAC address C. bridge group name D. Adaptive Wireless Path Protocol Correct Answer: D /Reference: QUESTION 154 It is suggested that you prime or stage your lightweight access points in a convenient location, rather that after they have been installed in locations that may be difficult to reach. Which three items can be configured by using the controller CLI, controller GUI, or Cisco WCS while priming a lightweight AP prior to deployment? (Choose three.) A. to configure the lightweight access point with primary, secondary, and tertiary controller names B. to configure the Controller Mobility Group name, if the lightweight access point is in a Controller Mobility Group C. to configure the access-point-specific LED blink sequence D. to configure the access-point-specific a, b, and g network settings PassGuide.com- Make You Succeed To Pass IT Exams BD /Reference: QUESTION 155 An access point (AP) is a specially configured node on a wireless local area network (WLAN). How does an access point dynamically learn the address of an active AP acting as a WDS?

59 A. Layer 3 multicast B. Layer 3 unicast C. Layer 2 multicast D. Layer 2 broadcast Correct Answer: C /Reference: QUESTION 156 Which two statements accurately describe an i wireless client with PKC enabled within a WLC-based network? (Choose two.) A. Both the client and WLC maintain a copy of the PMK during the roaming process. B. While the client is in the roaming process, the AP being roamed to and the AP being roamed from will encrypt the client data using the GTK instead of the PTK, so that the client can continue to receive packets while performing the 4 way handshake. C. PKC is able to achieve enhanced roam times by cutting out the four-way handshake for roaming clients. This eliminates the time needed to produce a new PTK and GTK. D. The client will send a message to an AP to which it is roaming; the message will contain a PMKID indicating that the client prefers to use the same PMK it has been using to generate a new PTK. D /Reference: QUESTION 157 A controller is connected to a Cisco IOS Catalyst switch. The following is the switch port configuration: interface GigabitEthernet 1/0/10 switchport switchport trunk encapsulation dot1q switchport trunk allowed vlan 1,20,30,50 switchport trunk native vlan 20 switchport mode trunk Which one of the controller CLI commands assigns its management interface to the Cisco IOS Catalyst switch native vlan interface? A. config interface vlan management 0 B. config interface vlan management 20 C. config interface vlan management 30 D. config interface vlan management 1 /Reference:

60 QUESTION 158 For the following interfaces, which needs to be identical in all controllers of a mobility group for proper intercontroller roaming? A. service-port interface B. management interface C. virtual interface D. AP Manager interface Correct Answer: C /Reference: QUESTION 159 According to the Cisco Spectrum Expert "FFT Duty Cycle" screen capture shown in the exhibit below, which type of device will most likely generate the signal in Wi-Fi channel 1? A. a spread-spectrum, narrowband, frequency-hopping device B. a high-power, broad-spectrum, frequency-hopping device C. a high-power, narrow-spectrum, direct-sequence device using CCK modulation D. a broad-spectrum, low-power device Correct Answer: B /Reference: QUESTION 160 Examine the following situations carefully, then answer my question. Utilize PEAP-MS-Chapv2 for authentication to a WLAN with Cisco Secure ACS as the RADIUS server used in conjunction with Microsoft Active Directory (AD). User authentication is failing, and in the ACS log (Failed Attempts) you see under the Authentication Failure-Code, something similar to "EAP-TLS or PEAP authentication failed during SSL handshake." Which is the most likely cause of this problem?

61 A. The EAP type from the supplicant and ACS do not match: one party is configured for EAP- TLS, the other for PEAP. Further details can be seen in the corresponding RDS.log file. B. PEAP-MS-CHAPv2 has failed during Phase 1. The client supplicant is probably not accepting the server certificate. Further details can be seen in the corresponding AUTH.log file. C. A client supplicate timeout has occurred (probably due to roaming to another access point). This has caused the SSL handshake to also time out, and therefore it has failed. Increasing the dot1x-clienttimeout value on the access point will probably solve this issue. D. PEAP-MS-CHAPv2 PAC provisioning has failed (Phase 0). The client supplicant is probably not configured for autonomous PAC provisioning. Correct Answer: B /Reference: QUESTION 161 What is the reason that Cisco recommends using Tftpd32 version 3.0 or later when upgrading wireless LAN controller software to release 4.1 or later? A. Tftpd32 is Cisco Compatible Extensions version 4 compliant B. Tftpd32 supports TFTP file transfers larger than 32 MB C. Tftpd32 is a component of CiscoWorks LMS D. Tftpd32 supports EoIP tunneling which is required for remote Cisco WLC upgrades Correct Answer: B /Reference: QUESTION 162 How to deliver the i Pairwise Master Key to the client supplicant during 802.1X authentication? A. encrypted with the EAPOL Key Encryption Key B. via a secure LWAPP control channel C. unencrypted

62 D. it is not transmitted Correct Answer: D /Reference: QUESTION 163 A retail chain is planning to create a wireless network to support checkout registers. Which three actions must be taken to make sure that the wireless network is PCI-compliant? (Choose three.) A. enable WPA B. install PKI certificates on client devices C. disable broadcasting of the SSID D. change default passwords and community strings CD /Reference: QUESTION 164 Which two statements correctly describe RTS/CTS sequences? (Choose two.) A. They are used when n in "legacy mode" is being used in a mixed environment with b/g STAs. B. They are used to resolve hidden node problems. Sources send RTS frames to destinations, and destinations return CTS frames to sources. C. They are used to resolve hidden node problems. Sources send CTS frames to destinations, and destinations return RTS frames to sources. D. They are used by STAs as soon as frame length is greater then the configured RTS threshold. Correct Answer: BD /Reference: QUESTION 165 How to describe the radiation pattern of patch and Yagi antennas when viewed from the side (H- plane)? A. the patch patterns are egg-shaped, the Yagi patterns are conical B. the patch patterns are doughnut-shaped, the Yagi patterns are conical C. the patch patterns are conical, the Yagi patterns are doughnut-shaped D. the patch patterns are conical, the Yagi patterns are egg-shaped

63 /Reference: QUESTION 166 If you have the Cisco ADU installed but wish to use the Windows Zero Config utility to configure a wireless network profile, which action should you take first? A. Uninstall the Cisco ADU. B. Define a common profile in both the Cisco ADU and WZC. C. In the WZC utility, make sure that the box labeled "Use Windows to configure my Wireless Network Settings" is checked. D. Define the wireless profile in the Wireless Networks tab in WZC. Correct Answer: C /Reference: QUESTION 167 Which three options are true about the Sniffer trace? (Choose three.) A. STA with MAC address 00:1c:f6:63:98:30 reserves in its RTS the medium unitl frame-3 has been transmitted. B. Before frame-2 can be sent, sender needs to wait for a duration of the "Short Interframe Space" (SIFS) time after receiving frame-1. C. This Sniffer trace shows a RTS/CTS NAV distribution mechanism which is quite robust against hidden nodes and collisions. D. STA with MAC address 00:1c:f6:63:98:30 reserves in its RTS the medium unitl frame-4 has been transmitted. Correct Answer: BCD /Reference: QUESTION 168 Which two descriptions are correct about Dynamic Frequency Selection? (Choose two.) A. DFS is fully supported on all Cisco Aironet 1130, 1240, and 1250 Series Access Points. B. After radar has been detected on a DFS-enabled channel, it cannot be used for 30 minutes. C. The Rogue Location Discovery Protocol and rogue containment are not supported for channels on which DFS is enabled. D. The minimum legal transmit power is greater for some 5-GHz channels than for others. When a DFS event causes the controller to randomly select a 5-GHz channel on which power is restricted, the controller automatically increases transmit power to comply with power limits for that channel. Correct Answer: BC

64 /Reference: QUESTION 169 The short preamble subfield is transmitted by an access point or station. Which statement best describes the short preamble? A. It is only used for b signaling; g uses long frames for increased performance. B. It indicates the start of a frame delimiter and is used to support the increased size of the 802.1p and 802.1q frames. C. It allows for more efficient data transfers, resulting in better overall throughput. D. It is typically used at the lower data rates of 1 Mb/s or 2Mb/s, and may be found when using equipment from other vendors. Correct Answer: C /Reference: QUESTION 170 How to differ application-specific devices from laptop computers in the way they support Cisco Compatible Extensions? A. There is no differentiation. ASDs and laptops must both support the same CCX features. B. ASDs are required to support only CCXv1 and v2 features. Laptops must support all CCX features. C. Several features that are required for laptops are not required for ASDs. D. ASDs are required to support only CCXv5 management features, while laptops are optional features. Correct Answer: C /Reference: QUESTION 171 IEEE g-2003 or g, is an amendment to the IEEE specification that extended throughput to up to 54 Mbit/s using the same 2.4 GHz band as b. An g client "hearing" a beacon with the Use Protection bit set in the ERP information element is required to take which action? A. transmit a CTS frame with a receiver address of its own MAC address before transmitting its data frame B. set the protection bit in all data frames C. cease further transmissions and wait for receipt of a CTS frame before proceeding D. transmit a CTS frame with a receiver address of the target receiver MAC address /Reference:

65 QUESTION 172 If multipath interference is occurring, which parameter indicates, and which radio characteristic is most directly related to a device's ability to mitigate the impacts of multipath interference? A. The "Available Transmit Power" parameter indicates that multipath interference is occurring, and "diversity" provides relief to a wireless network in a multipath scenario. B. The "Delay spread" parameter indicates that multipath interference is occurring, and "diversity" provides relief to a wireless network in a multipath scenario. C. The "Receiver Sensitivity" parameter indicates that multipath interference is occurring, and "FCC Bulletin OET-65C Compliance" provides relief to a wireless network in a multipath scenario. D. The "Delay spread" parameter indicates that multipath interference is occurring, and "Data Rates Supported" provides relief to a wireless network in a multipath scenario. Correct Answer: B /Reference: QUESTION 173 You work as a network administrator for a company. You are asked to configure three WLANs on the Wireless LAN Controller (WLC).A wireless client should be connected tothe WLAN with the SSID "internet". Using the "view available wireless networks" command only allows connecting to the WLAN with the SSID "fabi-net". What most likely causes this problem? A. The needed WLANs are not enabled on the WLC. B. This wireless client only doing passive scanning. Therefore it only lists SSIDs which are broadcasted within beacons. C. The beacon interval is set too high (more than 1 second); therefore, the client is missing certain beacon information. D. The traffic indication map (TIM) is empty; therefore, the client is ignoring the WLAN advertisements. Correct Answer: B /Reference: QUESTION 174 When choosing an EAP type for your Cisco ADU security profile, in order to authenticate successfully, what must you ensure? A. that the time set on the clocks for the wireless client and the authenticator are close to the same time B. that the client and authentication server support the same encryption protocol C. that the EAP type that you selected is supported by the authentication server D. that the EAP type selected is known not to exchange any of its credentials in the clear Correct Answer: C

66 /Reference: QUESTION 175 In order to guarantee acceptable voice quality, the Cisco Unified Wireless IP Phone 7921G must always have signal strength of -67 dbm or better. Which is the minimum recommended signal-to-noise ratio in this scenario? A. 5 db B. 20 db C. 25 db D. 67 db Correct Answer: C /Reference: QUESTION 176 Which description concerning wireless voice traffic is correct? A. Voice traffic is more latency-sensitive. B. Wireless voice traffic must be on a dedicated channel apart from wireless data. C. Wireless voice devices cannot share APs with wireless data NIC cards. D. 1Mb/s and 2Mb/s data rates are required for the phones, but not for the wireless data traffic. /Reference: QUESTION 177 The PassGuide company is opening a small remote branch office. The employees in the branch office will require WLAN access. As part of the company??s privacy policy, all WLAN traffic is required to utilize Identity- Based Network Services. A site survey has been performed and it has been determined that two APs are required to provide WLAN access. The branch office will use a high- speed WAN link to connect to the headquarter, where several Cisco Wireless Services Modules are located. The IT director thinks that the branch office is too small to justify a dedicated Cisco WLC. Which item is correct about supporting LWAPP over WAN? A. Only autonomous APs can be used in this scenario. B. The round-trip latency between the AP and Cisco WLC should not exceed 100 ms. C. The minimum bandwidth required to support LWAPP is 1.5 Mb/s. D. APs should never be placed across WAN links. A Cisco WLCM or WLC 2106 should be installed at the clinic. Correct Answer: B

67 /Reference: QUESTION 178 Examine the following items carefully, which three Cisco Unified Wireless Network capabilities use information that Radio Resource Management neighbor messages provide? (Choose three.) A. Aggressive Load Balancing B. Over-the-Air Provisioning C. Hybrid Remote Edge Access Point D. Inter-controller Mobility (that is, Mobility Groups) E. Rogue AP Classification F. Dynamic Channel Assignment Correct Answer: BEF /Reference: QUESTION 179 What is the reason that the wireless client can??t access the network? A. EAP-FAST PAC provisioning is failing. B. Wireless client does not have a valid PAC. C. EAP-Type configured on client (PEAP) is not supported by AAA server. D. Wireless client did not accept the server certificate. Correct Answer: C /Reference: QUESTION 180 For the following options, which one is correct about an g client's response to receiving a beacon with the Barker Preamble Mode bit set to zero?

68 A. It must change its preambles on all data frames to short. B. It must send an RTS frame out with the Pit Bull bit set to Zero. C. It can set its preambles to long. D. It can change its preambles based on network conditions. /Reference: QUESTION 181 You are a network designer for a company. You are tasked with designing a wireless mesh network to support physical security at a construction site in Shanghai City. Now the site has a large excavation with a perimeter fence and several gates. What should be your first request from the customer to ensure a successful deployment? A. a physical site survey B. a list of the client devices that will be deployed C. installation poles with AC power D. fiber installation around the perimeter /Reference: QUESTION 182 -What is the effect of configuring a single SSID to simultaneously support both TKIP and AES encryption? A. This is a common configuration for migrating from WPA to WPA2. There is no problem associated with using this configuration. B. Some wireless client drivers might not handle complex SSID settings and may be unable to associate to the WLAN. C. The overhead associated with supporting both encryption methods will significantly degrade client throughput. D. This is an unsupported configuration and the Cisco Wireless Control System will continuously generate alarms until the configuration is corrected. Correct Answer: B /Reference: QUESTION 183 Given:

69 Tom works as a network engineer for a company. He is asked to prepare a wireless Bill of Materials and is using the WCS planning tool to assist him in his efforts. Tom has deployed the tool once using "Light Walls" (2dB loss), and it is suggesting nine APs. In order to better reflect reality he plans to run the tool again after changing the attenuation of the walls to "Thick Walls" (13dB). When Tom runs the tool again, it still recommends nine APs. Which step should Tom take next? A. Click Advanced Options and select Aggressive as the Data/Coverage safety Margin. Then run the tool again and create the Bill of Materials. B. Open a TAC service request. C. Select the "Override Coverage per AP" check box and run the tool again. D. Manually adjust the AP positions to best accommodate the higher loss walls and optimize predicted coverage. Manually add APs as required and create the Bill of Materials. Correct Answer: D /Reference: QUESTION 184 Which item is the main difference between an RF planning tool and a site survey tool? A. an RF planning tool is generally much more expensive B. an RF planning tool will measure the RF coverage by AP locations, indicating antennas and output power C. an RF planning tool does a better job of showing actual -65 dbm edges D. an RF planning tool is a predictive tool, where a site survey tool measures the actual RF environment Correct Answer: D /Reference: QUESTION 185 Observe the following statements, which limitation applies to the use of the Cisco WLAN Solution Management over Wireless feature? A. Read-write access is not available; only read-only access is supported. B. Controllers must be managed using only secure protocols (that is, SSH and HTTPS), not nonsecure protocols (that is, HTTP and Telnet). C. Uploads and downloads from the controller are not allowed. D. Wireless clients can manage other controllers however not the same controller and AP to which the client is associated. Correct Answer: C /Reference: QUESTION 186 Which statement is true about the authorization aspect of AAA?

70 A. Authorization takes place after a successful authentication and provides the Cisco WLC the information needed to allow client access to network resources. B. Successful authorization will provide encryption keys that will be used to secure the wireless communications between client and AP. C. Authorization is the validation of successful DHCP address delivery to the wireless client. D. Authorization must be successfully completed in order to proceed with the authentication phase. /Reference: QUESTION 187 Hybrid Remote Edge Access Point (H-REAP) is a solution for branch office and remote office deployments. While deploying H-REAP over a WAN connection, which three guidelines must be followed? (Choose three.) A. the minimum WAN connection is 128 kb/s B. round trip delay must not exceed 200 ms C. at a minimum, a 500-byte MTU is required between the AP and the controller D. round trip delay must not exceed 100 ms CD /Reference: QUESTION 188 For the following amendments to the IEEE WLAN standard, which three define the physical layer? (Choose three.) A. IEEE a B. IEEE b C. IEEE w D. IEEE g BD /Reference: QUESTION 189 As a network technician, can you tell me which two services are offered on Cisco Unified Wireless Networks running controller v5.0 but not offered on Cisco Mobility Express Solution by use of 526 controllers with v4.2 code? (Choose two.)

71 A. GUI management B. Authentication using 802.1X C. Guest access D. Location services E. IDS/IPS Correct Answer: E /Reference: QUESTION 190 While configuring the WLAN controller to utilize n deployment, the onsite engineer has disabled WMM. Which problem will result because of this change? A. The b/g band will work, but not the a band. B. Cisco 7921 wireless IP phones will not work. C. The wireless network will no longer support n rates. D. Wireless multicast media traffic, such as IPTV, will no longer flow to the wireless devices. Correct Answer: C /Reference: QUESTION 191 While examining a WLAN traffic capture, which one of the following characteristics can indicate that the AP supports WMM and the AP and WLAN clients have been exchanging WMM traffic? A. CWmin and CWmax values exchanged during the association process and 802.1D QoS fields in the data frame B. there is no way to make this determination by examining the WLAN traffic capture; you can only determine WMM behavior by examining the queues on the APs and WLAN clients C. different delays used when sending and receiving traffic between the clients and the AP D. RSVP negotiations have stream IDs /Reference: QUESTION 192 Which characteristics are of Radio Resource Management Neighbor messages? A. transmitted at maximum power B. transmitted at the lowest supported data rate C. transmitted every 60 seconds D. transmitted on all serviced channels

72 BCD /Reference: QUESTION 193 Given: You have two RADIUS servers, one at , which only does LEAP, and the other at , which does PEAP and EAP-TLS, but not LEAP. Question: Observe the following sets of IOS commands, which could send SSID "a" authentication requests to the LEAP server and SSID "b" authentication requests to the PEAP and EAP-TLS server?

73 A. A B. B C. C

Cisco Exam Questions & Answers

Cisco Exam Questions & Answers Cisco 350-050 Exam Questions & Answers Number: 350-050 Passing Score: 800 Time Limit: 120 min File Version: 22.8 http://www.gratisexam.com/ Cisco 350-050 Exam Questions & Answers Exam Name: CCIE Wireless

More information

ITCertMaster. Safe, simple and fast. 100% Pass guarantee! IT Certification Guaranteed, The Easy Way!

ITCertMaster.   Safe, simple and fast. 100% Pass guarantee! IT Certification Guaranteed, The Easy Way! ITCertMaster Safe, simple and fast. 100% Pass guarantee! http://www.itcertmaster.com Exam : 350-050 Title : CCIE Wireless Exam (V2.0) Vendor : Cisco Version : DEMO Get Latest & Valid 350-050 Exam's Question

More information

Q&As. Implementing Cisco Unified Wireless Voice Networks (IUWVN) v2.0. Pass Cisco Exam with 100% Guarantee

Q&As. Implementing Cisco Unified Wireless Voice Networks (IUWVN) v2.0. Pass Cisco Exam with 100% Guarantee 642-742 Q&As Implementing Cisco Unified Wireless Voice Networks (IUWVN) v2.0 Pass Cisco 642-742 Exam with 100% Guarantee Free Download Real Questions & Answers PDF and VCE file from: 100% Passing Guarantee

More information

Configuring Hybrid REAP

Configuring Hybrid REAP 13 CHAPTER This chapter describes hybrid REAP and explains how to configure this feature on controllers and access points. It contains the following sections: Information About Hybrid REAP, page 13-1,

More information

Cisco EXAM Implementing Cisco Unified Wireless Networking Essentials (IUWNE) Buy Full Product.

Cisco EXAM Implementing Cisco Unified Wireless Networking Essentials (IUWNE) Buy Full Product. Cisco EXAM - 640-722 Implementing Cisco Unified Wireless Networking Essentials (IUWNE) Buy Full Product http://www.examskey.com/640-722.html Examskey Cisco 640-722 exam demo product is here for you to

More information

Real4Test. Real IT Certification Exam Study materials/braindumps

Real4Test.   Real IT Certification Exam Study materials/braindumps Real4Test http://www.real4test.com Real IT Certification Exam Study materials/braindumps Exam : 400-351 Title : CCIE Wireless Vendor : Cisco Version : DEMO Get Latest & Valid 400-351 Exam's Question and

More information

exam. Number: Passing Score: 800 Time Limit: 120 min CISCO Deploying Cisco Wireless Enterprise Networks. Version 1.

exam. Number: Passing Score: 800 Time Limit: 120 min CISCO Deploying Cisco Wireless Enterprise Networks. Version 1. 300-365.exam Number: 300-365 Passing Score: 800 Time Limit: 120 min CISCO 300-365 Deploying Cisco Wireless Enterprise Networks Version 1.0 Exam A QUESTION 1 The customer has deployed C7960 phones with

More information

CISCO EXAM QUESTIONS & ANSWERS

CISCO EXAM QUESTIONS & ANSWERS PrepKing Number: 642-742 Passing Score: 800 Time Limit: 120 min File Version: 61.0 http://www.gratisexam.com/ CISCO 642-742 EXAM QUESTIONS & ANSWERS Exam Name: CCNP Wireless - IUWVN Certkey QUESTION 1

More information

Implementing Cisco Unified Wireless Networking Essentials

Implementing Cisco Unified Wireless Networking Essentials Implementing Cisco Unified Wireless Networking Essentials Course Number: 640-721 (IUWNE) Course Length: 5 Days Course Overview This instructor-led provides students with information and practice activities

More information

Configuring Layer2 Security

Configuring Layer2 Security Prerequisites for Layer 2 Security, page 1 Configuring Static WEP Keys (CLI), page 2 Configuring Dynamic 802.1X Keys and Authorization (CLI), page 2 Configuring 802.11r BSS Fast Transition, page 3 Configuring

More information

Implementing Cisco Unified Wireless Networking Essentials Volume 1

Implementing Cisco Unified Wireless Networking Essentials Volume 1 Volume 1 I. Course Introduction A. Learner Skills and Knowledge B. Course Goals and Objectives C. Course Flow D. Additional References 1. Cisco Glossary of Terms E. Your Training Curriculum II. Wireless

More information

Cisco Implementing Cisco Unified Wireless Networking Essentials (IUWNE) Practice Test. Version 2.0

Cisco Implementing Cisco Unified Wireless Networking Essentials (IUWNE) Practice Test. Version 2.0 Cisco 640-721 640-721 Implementing Cisco Unified Wireless Networking Essentials (IUWNE) Practice Test Version 2.0 QUESTION NO: 1 What is fading? A. Another signal source is producing energy on the channel

More information

Numerics INDEX. 2.4-GHz WMIC, contrasted with 4.9-GHz WMIC g 3-6, x authentication 4-13

Numerics INDEX. 2.4-GHz WMIC, contrasted with 4.9-GHz WMIC g 3-6, x authentication 4-13 INDEX Numerics 2.4-GHz WMIC, contrasted with 4.9-GHz WMIC 1-8 802.11g 3-6, 3-9 802.1x authentication 4-13 A AAA server group 4-25 aaa authentication login command 4-24 aaa authorization command 4-27 aaa

More information

"Charting the Course... Implementing Cisco Unified Wireless Networking Essentials v2.0 (IUWNE) Course Summary

Charting the Course... Implementing Cisco Unified Wireless Networking Essentials v2.0 (IUWNE) Course Summary Course Summary Description Implementing Cisco Unified Wireless Networking Essentials (IUWNE) v2.0 is a five-day instructor-led course that is designed to help students prepare for the CCNA _ wireless certification,

More information

Cisco CCIE Wireless Beta Written. Download Full Version :

Cisco CCIE Wireless Beta Written. Download Full Version : Cisco 351-050 CCIE Wireless Beta Written Download Full Version : https://killexams.com/pass4sure/exam-detail/351-050 Question: 228 66 Which information is most important for you to obtain from the customer

More information

IP network that supports DHCP or manual assignment of IP address, gateway, and subnet mask

IP network that supports DHCP or manual assignment of IP address, gateway, and subnet mask Network Requirements, page 1 Wireless LAN, page 2 Wi-Fi Network Components, page 3 802.11 Standards for WLAN Communications, page 6 Security for Communications in WLANs, page 9 WLANs and Roaming, page

More information

Per-WLAN Wireless Settings

Per-WLAN Wireless Settings DTIM Period, page 1 Off-Channel Scanning Deferral, page 3 Cisco Client Extensions, page 10 Client Profiling, page 12 Client Count per WLAN, page 15 DTIM Period Information About DTIM Period In the 802.11

More information

CertifyMe. CertifyMe

CertifyMe. CertifyMe CertifyMe Number: 642-586 Passing Score: 800 Time Limit: 120 min File Version: 8.0 http://www.gratisexam.com/ CertifyMe 642-586 Exam A QUESTION 1 A customer in the United States requires connectivity between

More information

Cisco Questions & Answers

Cisco Questions & Answers Cisco 642-737 Questions & Answers Number: 642-737 Passing Score: 800 Time Limit: 120 min File Version: 25.6 http://www.gratisexam.com/ Cisco 642-737 Questions & Answers Exam Name: Implementing Advanced

More information

Configuring WLANsWireless Device Access

Configuring WLANsWireless Device Access CHAPTER 6 This chapter describes how to configure up to 16 WLANs for your Cisco UWN Solution. It contains these sections: WLAN Overview, page 6-2 Configuring WLANs, page 6-2 6-1 WLAN Overview Chapter 6

More information

Cisco Exam Implementing Advanced Cisco Unified Wireless Security v2.0 Version: 9.0 [ Total Questions: 206 ]

Cisco Exam Implementing Advanced Cisco Unified Wireless Security v2.0 Version: 9.0 [ Total Questions: 206 ] s@lm@n Cisco Exam 642-737 Implementing Advanced Cisco Unified Wireless Security v2.0 Version: 9.0 [ Total Questions: 206 ] Cisco 642-737 : Practice Test Question No : 1 RADIUS is set up with multiple servers

More information

PrepKing. PrepKing

PrepKing. PrepKing PrepKing Number: 642-587 Passing Score: 800 Time Limit: 120 min File Version: 9.0 http://www.gratisexam.com/ PrepKing 642-587 Exam A QUESTION 1 In order for a controller-based access point to be allowed

More information

Vendor: Cisco. Exam Code: Exam Name: Implementing Advanced Cisco Unified Wireless Security (IAUWS) v2.0. Version: Demo

Vendor: Cisco. Exam Code: Exam Name: Implementing Advanced Cisco Unified Wireless Security (IAUWS) v2.0. Version: Demo Vendor: Cisco Exam Code: 642-737 Exam Name: Implementing Advanced Cisco Unified Wireless Security (IAUWS) v2.0 Version: Demo QUESTION 1 Which statement describes the major difference between PEAP and EAP-FAST

More information

VIEW Configuration Guide. Cisco. 1131, 1232 and 1242 Autonomous APs. June 2010 Edition Version D

VIEW Configuration Guide. Cisco. 1131, 1232 and 1242 Autonomous APs. June 2010 Edition Version D VIEW Configuration Guide Cisco 1131, 1232 and 1242 Autonomous APs June 2010 Edition 1725-36193-001 Version D Configuration Guide Patent Information The accompanying product is protected by one or more

More information

Cisco Exam Implementing Cisco unified Wireless Voice Networks (IUWVN) v2.0 Version: 10.0 [ Total Questions: 188 ]

Cisco Exam Implementing Cisco unified Wireless Voice Networks (IUWVN) v2.0 Version: 10.0 [ Total Questions: 188 ] s@lm@n Cisco Exam 642-742 Implementing Cisco unified Wireless Voice Networks (IUWVN) v2.0 Version: 10.0 [ Total Questions: 188 ] Question No : 1 A client reports that video is not streaming. The administrator

More information

Cisco Exactexams Questions & Answers

Cisco Exactexams Questions & Answers Cisco Exactexams 642-737 Questions & Answers Number: 642-737 Passing Score: 800 Time Limit: 120 min File Version: 23.4 http://www.gratisexam.com/ Cisco 642-737 Questions & Answers Exam Name: Implementing

More information

Cisco Exam. Volume: 147 Questions

Cisco Exam. Volume: 147 Questions Volume: 147 Questions Question No : 1 Which two VoWLAN configuration parameters are required to implement a Vocera Communications System on a Cisco WLC v7.0? (Choose two.) A. Enable WLC broadcast for WLANs.

More information

General Troubleshooting Guidelines

General Troubleshooting Guidelines CHAPTER 2 Common VoWLAN Problems Choppy Audio / No Audio One-Way Audio Clipping, Echo Gaps in Audio / No Audio when Roaming In many cases, all of the above symptoms may be the result of problems within

More information

Managing Rogue Devices

Managing Rogue Devices Information About Rogue Devices, page 1 Configuring Rogue Detection (GUI), page 5 Configuring Rogue Detection (CLI), page 8 Information About Rogue Devices Rogue access points can disrupt wireless LAN

More information

Configuring a VAP on the WAP351, WAP131, and WAP371

Configuring a VAP on the WAP351, WAP131, and WAP371 Article ID: 5072 Configuring a VAP on the WAP351, WAP131, and WAP371 Objective Virtual Access Points (VAPs) segment the wireless LAN into multiple broadcast domains that are the wireless equivalent of

More information

Configuring OfficeExtend Access Points

Configuring OfficeExtend Access Points Information About OfficeExtend Access Points, page 1 OEAP 600 Series Access Points, page 2 OEAP in Local Mode, page 3 Supported WLAN Settings for 600 Series OfficeExtend Access Point, page 3 WLAN Security

More information

Configuring FlexConnect Groups

Configuring FlexConnect Groups Information About FlexConnect Groups, page 1, page 5 Configuring VLAN-ACL Mapping on FlexConnect Groups, page 10 Configuring WLAN-VLAN Mappings on FlexConnect Groups, page 11 Information About FlexConnect

More information

Viewing Status and Statistics

Viewing Status and Statistics CHAPTER 7 This chapter explains how to use ADU to view the client adapter s status and its transmit and receive statistics. The following topics are covered in this chapter: Overview of ADU and Statistics

More information

Configuring Authentication Types

Configuring Authentication Types CHAPTER 11 This chapter describes how to configure authentication types on the access point. This chapter contains these sections: Understanding Authentication Types, page 11-2, page 11-10 Matching Access

More information

Wireless LAN Controller (WLC) Design and Features FAQ

Wireless LAN Controller (WLC) Design and Features FAQ Wireless LAN Controller (WLC) Design and Features FAQ Document ID: 118833 Contents Introduction Design FAQ Features FAQ Related Information Introduction This document provides information on the most frequently

More information

Configuring a WLAN for Static WEP

Configuring a WLAN for Static WEP Restrictions for Configuring Static WEP, page 1 Information About WLAN for Static WEP, page 1 Configuring WPA1+WPA2, page 3 Restrictions for Configuring Static WEP The OEAP 600 series does not support

More information

Configuring WDS, Fast Secure Roaming, Radio Management, and Wireless Intrusion Detection Services

Configuring WDS, Fast Secure Roaming, Radio Management, and Wireless Intrusion Detection Services CHAPTER 11 Configuring WDS, Fast Secure Roaming, Radio Management, and Wireless Intrusion Detection Services This chapter describes how to configure your access point/bridges for wireless domain services

More information

Overview of the VoIP Wireless Network

Overview of the VoIP Wireless Network CHAPTER 2 This chapter provides an overview of the interaction between the Cisco Unified Wireless IP Phone 7925G, 7925G-EX, and 7926G and other key components of a VoIP network in a wireless local area

More information

Index Numerics Cisco Wireless Control System Configuration Guide OL IN-1

Index Numerics Cisco Wireless Control System Configuration Guide OL IN-1 Numerics 802.11 counters report 14-12 802.11 security trap 10-71 802.11 tags layer 5-44 802.11a policy name 10-52 802.11b/g RRM interval template 10-62, 10-64 802.11b/g RRM threshold template 10-61 802.11b/g

More information

Deploying Cisco Wireless Enterprise Networks

Deploying Cisco Wireless Enterprise Networks 300-365 Deploying Cisco Wireless Enterprise Networks NWExam.com SUCCESS GUIDE TO CISCO CERTIFICATION Exam Summary Syllabus Questions Table of Contents Introduction to 300-365 Exam on Deploying Cisco Wireless

More information

Wireless# Guide to Wireless Communications. Objectives

Wireless# Guide to Wireless Communications. Objectives Wireless# Guide to Wireless Communications Chapter 8 High-Speed WLANs and WLAN Security Objectives Describe how IEEE 802.11a networks function and how they differ from 802.11 networks Outline how 802.11g

More information

Configuring Repeater and Standby Access Points and Workgroup Bridge Mode

Configuring Repeater and Standby Access Points and Workgroup Bridge Mode CHAPTER 19 Configuring Repeater and Standby Access Points and Workgroup Bridge Mode This chapter describes how to configure your access point as a repeater, as a hot standby unit, or as a workgroup bridge.

More information

CertifyMe. CertifyMe

CertifyMe. CertifyMe CertifyMe Number: 642-681 Passing Score: 800 Time Limit: 120 min File Version: 8.5 http://www.gratisexam.com/ CertifyMe 642-681 Exam A QUESTION 1 Select two activities that form part of the wireless migration

More information

Exam Questions CWSP-205

Exam Questions CWSP-205 Exam Questions CWSP-205 Certified Wireless Security Professional https://www.2passeasy.com/dumps/cwsp-205/ 1.. What is one advantage of using EAP-TTLS instead of EAP-TLS as an authentication mechanism

More information

Cisco Certification Exam

Cisco Certification Exam Cisco 640-722 Certification Exam Number: 640-722 Passing Score: 825 Time Limit: 120 min File Version: 23.3 http://www.gratisexam.com/ Cisco 640-722 Certification Exam Exam Name: CCNA - Wireless Associate

More information

PW0-104 Q&As. Wireless LAN Administration Exam. Pass CWNP PW0-104 Exam with 100% Guarantee

PW0-104 Q&As. Wireless LAN Administration Exam. Pass CWNP PW0-104 Exam with 100% Guarantee PW0-104 Q&As Wireless LAN Administration Exam Pass CWNP PW0-104 Exam with 100% Guarantee Free Download Real Questions & Answers PDF and VCE file from: 100% Passing Guarantee 100% Money Back Assurance Following

More information

P ART 3. Configuring the Infrastructure

P ART 3. Configuring the Infrastructure P ART 3 Configuring the Infrastructure CHAPTER 8 Summary of Configuring the Infrastructure Revised: August 7, 2013 This part of the CVD section discusses the different infrastructure components that are

More information

Light Mesh AP. User s Guide. 2009/2/20 v1.0 draft

Light Mesh AP. User s Guide. 2009/2/20 v1.0 draft Light Mesh AP User s Guide 2009/2/20 v1.0 draft i FCC Certifications This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules.

More information

Cisco.Actualtests v by.Elie.100q. Exam Code: Exam Name: CCNP Wireless - IUWVN

Cisco.Actualtests v by.Elie.100q. Exam Code: Exam Name: CCNP Wireless - IUWVN Cisco.Actualtests.642-742.v2014-02-07.by.Elie.100q Number: 642-742 Passing Score: 800 Time Limit: 120 min File Version: 14.5 http://www.gratisexam.com/ Exam Code: 642-742 Exam Name: CCNP Wireless - IUWVN

More information

Cisco Exam Questions & Answers

Cisco Exam Questions & Answers Cisco 640-722 Exam Questions & Answers Number: 640-722 Passing Score: 800 Time Limit: 120 min File Version: 24.1 http://www.gratisexam.com/ Cisco 640-722 Exam Questions & Answers Exam Name: CCNA - Wireless

More information

General Troubleshooting Information, on page 1 Phone Does Not Go Through the Normal Startup Process, on page 3 Connection Problems, on page 4

General Troubleshooting Information, on page 1 Phone Does Not Go Through the Normal Startup Process, on page 3 Connection Problems, on page 4 General Information, on page 1 Phone Does Not Go Through the Normal Startup Process, on page 3 Connection s, on page 4 Phone Reset s, on page 9 Audio s, on page 11 Feature Issues, on page 13 Roaming and

More information

Managing Rogue Devices

Managing Rogue Devices Finding Feature Information, page 1 Information About Rogue Devices, page 1 How to Configure Rogue Detection, page 6 Monitoring Rogue Detection, page 8 Examples: Rogue Detection Configuration, page 9 Additional

More information

Number: Passing Score: 800 Time Limit: 120 min File Version: 7.0. Cisco Questions & Answers

Number: Passing Score: 800 Time Limit: 120 min File Version: 7.0. Cisco Questions & Answers 642-742 Number: 642-742 Passing Score: 800 Time Limit: 120 min File Version: 7.0 Cisco 642-742 Questions & Answers Implementing Cisco unified Wireless Voice Networks (IUWVN) v2.0 Version: 7.0 Cisco 642-742

More information

Exam Code: Exam Name: Implementing Cisco unified Wireless Voice Networks (IUWVN) v2.0

Exam Code: Exam Name: Implementing Cisco unified Wireless Voice Networks (IUWVN) v2.0 642-742 Number: 642-742 Passing Score: 800 Time Limit: 120 min Exam Code: 642-742 Exam Name: Implementing Cisco unified Wireless Voice Networks (IUWVN) v2.0 642-742 QUESTION 1 Which statement describes

More information

Workgroup Bridges. Cisco WGBs. Information About Cisco Workgroup Bridges. Cisco WGBs, page 1 Third-Party WGBs and Client VMs, page 9

Workgroup Bridges. Cisco WGBs. Information About Cisco Workgroup Bridges. Cisco WGBs, page 1 Third-Party WGBs and Client VMs, page 9 Cisco WGBs, page 1 Third-Party WGBs and Client VMs, page 9 Cisco WGBs Information About Cisco A workgroup bridge (WGB) is a mode that can be configured on an autonomous IOS access point to provide wireless

More information

CWNA Exam PW0-100 certified wireless network administrator(cwna) Version: 5.0 [ Total Questions: 120 ]

CWNA Exam PW0-100 certified wireless network administrator(cwna) Version: 5.0 [ Total Questions: 120 ] s@lm@n CWNA Exam PW0-100 certified wireless network administrator(cwna) Version: 5.0 [ Total Questions: 120 ] Topic 1, A A Question No : 1 - (Topic 1) What criteria can an 802.11 wireless client use to

More information

CertifyMe. CISCO EXAM QUESTIONS & ANSWERS

CertifyMe.   CISCO EXAM QUESTIONS & ANSWERS CertifyMe Number: 642-737 Passing Score: 800 Time Limit: 120 min File Version: 28.9 http://www.gratisexam.com/ CISCO 642-737 EXAM QUESTIONS & ANSWERS Exam Name: Implementing Advanced Cisco Unified Wireless

More information

CISCO EXAM QUESTIONS & ANSWERS

CISCO EXAM QUESTIONS & ANSWERS CISCO 640-722 EXAM QUESTIONS & ANSWERS Number: 640-722 Passing Score: 790 Time Limit: 90 min File Version: 38.8 http://www.gratisexam.com/ CISCO 640-722 EXAM QUESTIONS & ANSWERS Exam Name: CCNA - Wireless

More information

Cisco 440X Series Wireless LAN Controllers Deployment Guide

Cisco 440X Series Wireless LAN Controllers Deployment Guide Cisco 440X Series Wireless LAN Controllers Deployment Guide Cisco customers are rapidly adopting the Cisco Unified Wireless Network architecture for next generation wireless LAN performance and advanced

More information

Mobile MOUSe WIRELESS TECHNOLOGY SPECIALIST ONLINE COURSE OUTLINE

Mobile MOUSe WIRELESS TECHNOLOGY SPECIALIST ONLINE COURSE OUTLINE Mobile MOUSe WIRELESS TECHNOLOGY SPECIALIST ONLINE COURSE OUTLINE COURSE TITLE WIRELESS TECHNOLOGY SPECIALIST COURSE DURATION 13 Hours of Interactive Training COURSE OVERVIEW This course will teach you

More information

TestsDumps. Latest Test Dumps for IT Exam Certification

TestsDumps.  Latest Test Dumps for IT Exam Certification TestsDumps http://www.testsdumps.com Latest Test Dumps for IT Exam Certification Exam : PW0-200 Title : Certified wireless security professional(cwsp) Vendors : CWNP Version : DEMO Get Latest & Valid PW0-200

More information

Configure n on the WLC

Configure n on the WLC Configure 802.11n on the WLC Document ID: 108184 Contents Introduction Prerequisites Requirements Components Used Related Products Conventions 802.11n An Overview How Does 802.11n Provide Greater Throughput

More information

CWAP-402.exam. Number: CWAP-402 Passing Score: 800 Time Limit: 120 min File Version: CWAP-402

CWAP-402.exam. Number: CWAP-402 Passing Score: 800 Time Limit: 120 min File Version: CWAP-402 CWAP-402.exam Number: CWAP-402 Passing Score: 800 Time Limit: 120 min File Version: 1.0 CWAP-402 Certified Wireless Analysis Professional Version 1.0 Exam A QUESTION 1 The To DS bit is set to 0 and the

More information

EnGenius EAP-9550 Indoor Access Point

EnGenius EAP-9550 Indoor Access Point Product Name: Manufacturer: - Model Number: NET-EL-EAP9550 Please Note the has been discontinued, for alternative wireless equipment please check out Ubiquiti UniFi UAP LR EnGenius EAP9550 Indoor Access

More information

Cisco Unified Wireless Technology and Architecture

Cisco Unified Wireless Technology and Architecture CHAPTER 2 Cisco Unified Wireless Technology and Architecture The purpose of this chapter is to discuss the key design and operational considerations in an enterprise Cisco Unified Wireless Deployment.

More information

Exam4Tests. Latest exam questions & answers help you to pass IT exam test easily

Exam4Tests.   Latest exam questions & answers help you to pass IT exam test easily Exam4Tests http://www.exam4tests.com Latest exam questions & answers help you to pass IT exam test easily Exam : PW0-300 Title : Certified Wireless Network Expert Vendors : CWNP Version : DEMO Get Latest

More information

Cisco Wireless LAN Controller Module

Cisco Wireless LAN Controller Module Cisco Wireless LAN Controller Module Simple and Secure Wireless Deployment and Management for Small and Medium-Sized Businesses and Enterprise Branch Offices. Figure 1. Cisco Wireless LAN Controller Module

More information

Configuring WDS, Fast Secure Roaming, Radio Management, and Wireless Intrusion Detection Services

Configuring WDS, Fast Secure Roaming, Radio Management, and Wireless Intrusion Detection Services 12 CHAPTER Configuring WDS, Fast Secure Roaming, Radio Management, and Wireless Intrusion Detection Services This chapter describes how to configure your access points for wireless domain services (WDS),

More information

Q&A. DEMO Version

Q&A. DEMO Version 640-722 CCNA - Wireless Associate - IUWNE Q&A DEMO Version Copyright (c) 2012 Chinatag LLC. All rights reserved. Important Note Please Read Carefully For demonstration purpose only, this free version Chinatag

More information

PassleaderVCE. Wonderful Certification Exam Guide and Exam Dumps- PassLeaderVCE

PassleaderVCE.   Wonderful Certification Exam Guide and Exam Dumps- PassLeaderVCE PassleaderVCE http://www.passleadervce.com/ Wonderful Certification Exam Guide and Exam Dumps- PassLeaderVCE Exam : 300-360 Title : Designing Cisco Wireless Enterprise Networks Vendor : Cisco Version :

More information

Vendor: HP. Exam Code: HP2-Z32. Exam Name: Implementing HP MSM Wireless Networks. Version: Demo

Vendor: HP. Exam Code: HP2-Z32. Exam Name: Implementing HP MSM Wireless Networks. Version: Demo Vendor: HP Exam Code: HP2-Z32 Exam Name: Implementing HP MSM Wireless Networks Version: Demo QUESTION 1 A network administrator deploys several HP MSM APs and an HP MSM Controller. The APs discover the

More information

Wireless technology Principles of Security

Wireless technology Principles of Security Wireless technology Principles of Security 1 Wireless technologies 2 Overview This module provides an introduction to the rapidly evolving technology of wireless LANs (WLANs). WLANs redefine the way the

More information

Cisco Wireless LAN Controller Module

Cisco Wireless LAN Controller Module Cisco Wireless LAN Controller Modules Simple and secure wireless deployment and management for small and medium-sized businesses (SMBs) and enterprise branch offices Product Overview Cisco Wireless LAN

More information

Troubleshooting the 792xG Series Wireless IP Phone

Troubleshooting the 792xG Series Wireless IP Phone CHAPTER 3 Troubleshooting the 792xG Series Wireless IP Phone Understanding the 792xG Series Wireless IP Phone The Cisco Unified Wireless IP Phone 792xG Series are 802.11 dual-band wireless devices that

More information

C I S C O C O M P A T I B L E E X T E N S I O N S : C L I E N T B E N E F I T S O N A C I S C O W L A N

C I S C O C O M P A T I B L E E X T E N S I O N S : C L I E N T B E N E F I T S O N A C I S C O W L A N White Paper C I S C O C O M P A T I B L E E X T E N S I O N S : C L I E N T B E N E F I T S O N A C I S C O W L A N Overview Some of the most compelling benefits to working under a unified network architecture

More information

Configuring Repeater and Standby Access Points and Workgroup Bridge Mode

Configuring Repeater and Standby Access Points and Workgroup Bridge Mode CHAPTER 19 Configuring Repeater and Standby Access Points and Workgroup Bridge Mode This chapter descibes how to configure your access point as a repeater, as a hot standby unit, or as a workgroup bridge.

More information

PRODUCT OVERVIEW. Learn more about EnGenius Solutions at

PRODUCT OVERVIEW. Learn more about EnGenius Solutions at Dual Radio Multi-Function Repeater 2.4 GHz / 5 GHz 300Mbps 802.11a/b/g/n Multi Function PRODUCT OVERVIEW equips with two powerful independent RF interfaces which support 802.11a/b/g and 802.11b/g/n. With

More information

Configuring Repeater and Standby Access Points and Workgroup Bridge Mode

Configuring Repeater and Standby Access Points and Workgroup Bridge Mode 20 CHAPTER Configuring Repeater and Standby Access Points and Workgroup Bridge Mode This chapter describes how to configure your access point as a repeater, as a hot standby unit, or as a workgroup bridge.

More information

Author: Bill Buchanan. Wireless LAN. Unit 2: Wireless Fundamentals

Author: Bill Buchanan. Wireless LAN. Unit 2: Wireless Fundamentals Wireless LAN Unit 2: Wireless Fundamentals Wireless connections which technology? Areas covered: Basic radio parameters. This area covers the main type of wireless communications. IEEE 802.11b issues.

More information

3.1. Introduction to WLAN IEEE

3.1. Introduction to WLAN IEEE 3.1. Introduction to WLAN IEEE 802.11 WCOM, WLAN, 1 References [1] J. Schiller, Mobile Communications, 2nd Ed., Pearson, 2003. [2] Martin Sauter, "From GSM to LTE", chapter 6, Wiley, 2011. [3] wiki to

More information

Number: Passing Score: 800 Time Limit: 120 min File Version: Vendor: Cisco. Exam Code:

Number: Passing Score: 800 Time Limit: 120 min File Version: Vendor: Cisco. Exam Code: 640-722 Number: 640-722 Passing Score: 800 Time Limit: 120 min File Version: 12.49 http://www.gratisexam.com/ Vendor: Cisco Exam Code: 640-722 Exam Name: Implementing Cisco Unified Wireless Networking

More information

WITSHOOT Troubleshooting Cisco Wireless Enterprise Network

WITSHOOT Troubleshooting Cisco Wireless Enterprise Network 300-370 - WITSHOOT Troubleshooting Cisco Wireless Enterprise Network 1. An engineer must open a support case with Cisco TAC. Which two commands verify the model and serial number of a controller? (Choose

More information

Cisco Aironet 350 (DS) AP IOS Software

Cisco Aironet 350 (DS) AP IOS Software Cisco Aironet 350 (DS) AP IOS Software This document details the specifications for configuring the Cisco Aironet 350 series access points (APs) using the IOS software with NetLink Wireless Telephones.

More information

Exam Questions Demo Cisco. Exam Questions

Exam Questions Demo   Cisco. Exam Questions Cisco Exam Questions 300-370 WITSHOOT Troubleshooting Cisco Wireless Enterprise Network Version:Demo 1. An engineer must open a support case with Cisco TAC. Which two commands verify the model and serial

More information

Configuring RF Profiles

Configuring RF Profiles Prerequisites for, page 1 Restrictions for, page 1 Information About RF Profiles, page 2 Configuring an RF Profile (GUI), page 5 Configuring an RF Profile (CLI), page 6 Applying an RF Profile to AP Groups

More information

VIEW Certified Configuration Guide. Cisco

VIEW Certified Configuration Guide. Cisco VIEW Certified Configuration Guide Cisco 4400 Series Wireless LAN Controller (WLC), Wireless Services Module (WiSM), and 3750G Integrated Wireless LAN Controller with 1100, 1200, 1300 Series APs January

More information

Configuring the Wireless Parameters (CPE and WBS)

Configuring the Wireless Parameters (CPE and WBS) Configuring the Wireless Parameters (CPE and WBS) CHAPTERS 1. Configure Basic Wireless Parameters 2. Configure Wireless Client Parameters 3. Configure Wireless AP Parameters 4. Configure Multi-SSID 5.

More information

Wireless High power Multi-function AP

Wireless High power Multi-function AP Wireless High power Multi-function AP EAP-3660 2.4GHz Super G 108Mbps Access Point/ WDS/Universal Repeater The EAP-3660 is a smoke detector looking Wireless Access Point / Universal Repeater / WDS that

More information

Cisco Unified Wireless Network Software Release 5.2

Cisco Unified Wireless Network Software Release 5.2 Cisco Unified Wireless Network Software Release 5.2 PB507140 Overview With Cisco Unified Wireless Network Software Release 5.2, Cisco is delivering critical features for its industry-leading indoor and

More information

PowerStation2 LiteStation2 LiteStation5 User s Guide

PowerStation2 LiteStation2 LiteStation5 User s Guide PowerStation2 LiteStation2 LiteStation5 User s Guide Copyright 2007 Ubiquiti Networks Inc. All rights reserved. Contents INTRODUCTION...2 QUICK SETUP GUIDE...3 CONFIGURATION GUIDE...7 Main Settings...8

More information

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. Fall 2018 CMSC417 Set 1 1

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. Fall 2018 CMSC417 Set 1 1 CSMC 417 Computer Networks Prof. Ashok K Agrawala 2018 Ashok Agrawala Fall 2018 CMSC417 Set 1 1 The Medium Access Control Sublayer November 18 Nov 6, 2018 2 Wireless Networking Technologies November 18

More information

Exam : PW Title : Certified wireless security professional(cwsp) Version : DEMO

Exam : PW Title : Certified wireless security professional(cwsp) Version : DEMO Exam : PW0-200 Title : Certified wireless security professional(cwsp) Version : DEMO 1. Given: John Smith often telecommutes from a coffee shop near his home. The coffee shop has an 802.11g access point

More information

EOC2611P. Long Range Wireless Access Point / Client Bridge PRODUCT DESCRIPTION. 2.4GHz 108Mbps b/g/super G MSSID, WDS

EOC2611P. Long Range Wireless Access Point / Client Bridge PRODUCT DESCRIPTION. 2.4GHz 108Mbps b/g/super G MSSID, WDS Long Range Wireless Access Point / Client Bridge 2.4GHz 108Mbps 802.11 b/g/super G MSSID, WDS PRODUCT DESCRIPTION is a long range outdoor wireless Access Point / Client Bridge that operates seamlessly

More information

2.4GHz 108Mbps b/g/Super G MSSID, WDS

2.4GHz 108Mbps b/g/Super G MSSID, WDS Long Range Wireless Access Point / Client Bridge 2.4 108Mbps 802.11b/g/Super G MSSID, WDS EOC2611P EOC2611P is a long range outdoor wireless Access Point / Client Bridge that operates seamlessly in the

More information

Wireless LANs. ITS 413 Internet Technologies and Applications

Wireless LANs. ITS 413 Internet Technologies and Applications Wireless LANs ITS 413 Internet Technologies and Applications Aim: Aim and Contents Understand how IEEE 802.11 wireless LANs work Understand what influences the performance of wireless LANs Contents: IEEE

More information

Deployment Guide for Cisco Guest Access Using the Cisco Wireless LAN Controller, Release 4.1

Deployment Guide for Cisco Guest Access Using the Cisco Wireless LAN Controller, Release 4.1 Deployment Guide for Cisco Guest Access Using the Cisco Wireless LAN Controller, Release 4.1 Last revised: February 1, 2008 Contents Overview section on page 1 Configuring Guest Access on the Cisco Wireless

More information

Configuring Radio Settings

Configuring Radio Settings 6 CHAPTER This chapter describes how to configure radio settings for the wireless device. This chapter includes these sections: Enabling the Radio Interface, page 6-2 Configuring the Role in Radio Network,

More information

Lightweight AP (LAP) Registration to a Wireless LAN Controller (WLC)

Lightweight AP (LAP) Registration to a Wireless LAN Controller (WLC) Lightweight AP (LAP) Registration to a Wireless LAN Controller (WLC) Document ID: 70333 Introduction Prerequisites Requirements Components Used Conventions Background Information Register the LAP with

More information

Configuring FlexConnect Groups

Configuring FlexConnect Groups Information About FlexConnect Groups, page 1, page 3 Configuring VLAN-ACL Mapping on FlexConnect Groups, page 8 Information About FlexConnect Groups To organize and manage your FlexConnect access points,

More information

Securing a Wireless LAN

Securing a Wireless LAN Securing a Wireless LAN This module describes how to apply strong wireless security mechanisms on a Cisco 800, 1800, 2800, or 3800 series integrated services router, hereafter referred to as an access

More information