Cisco Braindumps Exam Questions & Answers

Size: px
Start display at page:

Download "Cisco Braindumps Exam Questions & Answers"

Transcription

1 Cisco Braindumps Exam Questions & Answers Number: Passing Score: 800 Time Limit: 120 min File Version: Cisco Exam Questions & Answers Exam Name: Advanced Routing and Switching for Account Managers - ARSAM For Full Set of Questions please visit:

2 Braindumps QUESTION 1 Which two security features are associated with a wireless network employing i configured as a Robust Security Network? (Choose two.) A. WEP B. AES-CCMP C x D. IPsec E. TKIP F x F /Reference: QUESTION 2 Before conducting a passive RF site survey with a standalone AP, which two of these should be statically configured on the AP? (Choose two.) A. passive client B. channel assignment C. DTPC D. Tx power level E. channel scan defer priority D /Reference: QUESTION 3 After interviewing a customer to understand wireless client requirements, you determine that b must be enabled to support legacy clients within a mixed-mode environment. Which recommendation will have the greatest impact on mitigating the effects of b clients on the rest of the network? A. Restrict OFDM modulation from being used. B. Make 11 Mb/s the lowest mandatory rate. C. Enable a separate SSID for b clients. D. Enable a short preamble. /Reference: QUESTION 4

3 The standard includes which two amendments to the original standard? (Choose two.) A c B d C j D r E u C /Reference: QUESTION 5 You are designing a wireless network utilizing EAP-TLS. One design requirement is to provide per-user differentiated QoS using only one SSID. What is the best way to achieve this goal? A. using WMM override B. using Cisco Airespace VSAs C. using QoS Enhanced BSS D. using AP groups /Reference: QUESTION 6 What does the letter P in the designation of the AIR-CAP3502P AP indicate? A. The AP supports the new IEEE p (WAVE) wireless standard. B. The AP requires professional installation. C. The AP can be used in plenum applications. D. The AP is compatible with polarization type antennae. /Reference: QUESTION 7

4 You are converting your wireless infrastructure from a data-only design to a location services design. Which task do you need to complete? A. Disable the DSSS speeds for RFID compatibility. B. Use fewer APs to avoid RFID 3D imaging. C. Set APs to maximum power for RF fingerprinting. D. Locate APs at the edges of your coverage area for trilateration. Correct Answer: D /Reference: QUESTION 8 Which statement about heat maps on Cisco WCS is true? A. They are predictive and rely only on the accuracy of the information that is provided with the map. B. They are based on real-time actual values if Cisco Compatible Extensions is enabled on the APs. C. They are predictive but can be converted to real values by using the Refresh from network button. D. They are based on real-time actual values because of fingerprinting. Correct Answer: A /Reference: QUESTION 9 is classified as an i RSN with as the mandatory encryption protocol. A. WEP, TKIP B. WPA2,TKIP C. WPA, AES D. WPA2, AES Correct Answer: D /Reference: QUESTION 10 You have been hired to install an outdoor wireless network for a small city. The design must provide 360 degrees of coverage from a central location and at least 33 Mb/s of aggregate bandwidth for clause 18 radio clients. How do you design this solution? A. Threeor more patch antennas installed in a circular pattern on the same supporting structure B. Onehigh-gain omni-directional antenna C. Threeor more parabolic dish antennas installed in a circular pattern on the same supporting structure D. Threeor more sector array antennas installed in a circular pattern on the same supporting structure E. Threeor more Yagi antennas installed in a circular pattern on the same supporting structure

5 Correct Answer: D /Reference: QUESTION 11 Which of the following are required components for Client MFP? (Choose two.) A. CCXv4 B. CCXv5 C n D. WPA2 w/tkip or AES-CCMP E. AnyConnect 3.0 D /Reference: QUESTION 12 Which of the following statements are true regarding RLDP? (Choose two) A. RLDP works only on APs configured in Open Authentication mode. B. RLDP only works if the AP is in Monitor Mode. C. RLDP will attempt to identify each Rogue AP only once. D. RLDP only works if the Rogue AP is connected to a VLAN that is reachable by the WLC. E. RLDP only works if the AP is in Local Mode. Correct Answer: AD /Reference: QUESTION 13 Which of the following statements are not correct about Client Management Frame Protection (MFP)? (Choose 2.) A. Client MFP can replace Infrastructure MFP in case only CCXv5 clients are used. B. Client MFP encrypts class 3Unicastmanagement frames using the security mechanisms defined by i. C. In order to use Client MFP the client must support CCXv5 and negotiate WPA2 with AES-CCMP or TKIP. D. The only supported method to obtain the pre-user MFP encryption keys is EAP authentication. E. CCXv5 client and access points must discard broadcast class 3 management frames. Correct Answer: AD /Reference:

6 QUESTION 14 When viewed from the side (in the H-plane), how can the radiation pattern of a patch and Yagi antennas be described? (Choose two.) A. the patch patterns are egg-shaped. B. the patch patterns are conical. C. the patch patterns are doughnut-shaped. D. the Yagi patterns are conical. E. the Yagi patterns are egg-shaped. F. the Yagi patterns are doughnut-shaped. Correct Answer: AD /Reference: QUESTION 15 The transmit power level on an a radio is configured for 25 mw. What is the corresponding value in decibels? A. 2.5 dbm B. 3 dbm C. 14 dbm D. 18 dbm E. none of the above Correct Answer: C /Reference: QUESTION 16 Users complain about intermittent wireless connectivity issues. You see the following message on your Cisco WCS, corresponding the time the connectivity issues occurred. AP 'building-1-entrance', interface '802.11b/g' on Controller ' '. Noise threshold violated. What do you do? A. Increase the interference threshold from the default 10%. B. Use a spectrum analyzer to discover the noise source. C. Check the logs for rogues in the area, and turn on rogue mitigation. D. Increase the power of the APs in the entrance hall. /Reference:

7 QUESTION 17 You are working for a South American services integrator. Your customer has a working unified Cisco WLC solution in Costa Rica (-A domain). You need to integrate an office in Panama (-N domain); correct APs are already deployed for this domain. Which approach do you take? A. Do nothing. These APs will work on the same Cisco WLC because the countries are neighbors. B. Change the APs in the Panama office to AIR-CAP3502E-N-K9, which have external antennae. C. Use the config domain add -N command on the Cisco WLC. D. Add the country code for Panama (PA) through the Cisco WLC web GUI. Correct Answer: D /Reference: QUESTION 18 One of your customers is thinking of deploying wireless in a building. Which two items should you establish in a pre-site survey? (Choose two.) A. the exact channels that should be used B. the agreed coverage areas for the design C. the access security arrangements for getting into the building D. the type of deployment (data-only service, voice service, or location services) E. sources of RF interference D /Reference: QUESTION 19 Which type of indoor Cisco AP should you deploy to make use of spatial multiplexing? A. AIR-LAP1242AG B. AIR-BR1310G C. AIR-LAP1131AG D. AIR-LAP1252AG E. AIR-LAP1524AG Correct Answer: D /Reference: QUESTION 20 You have been hired to conduct a predeployment indoor wireless site survey. Which item is not needed before starting the project? A. a statement of work that details the areas of the facility in which the customer wants to deploy wireless

8 B. architecture drawings of the facility C. topographical maps D. a list of client devices and applications that will use wireless at the facility E. Layer 2 security requirements for the WLAN Correct Answer: C /Reference: QUESTION 21 Which regulatory body develops standards for European information and communication technologies? A. European Union B. European Telecommunications Standards Institute C. European Radio and Telecommunications Terminal Equipment Directive D. International Organization for Standardization /Reference: QUESTION 22 ABC Company end users are reporting voice roaming issues. Which two situations are possible causes? (Choose two.) A. The RF coverage cells have only 10-percent overlap; 15- to 20-percent cell overlap is typically needed for seamless roaming. B. The RF coverage is colocated. C. There is interference from a 5 GHz DECT-like phone. D. The RF coverage cells have only 20-percent overlap; 25- to 30-percent cell overlap is typically needed for seamless roaming. E. There is interference from the cellular network. Correct Answer: AC /Reference: QUESTION 23 Which of the below devices can cause unintentional RF jamming attacks against an wireless network? (Choose two.) A. Rogue Access Points B. Microwave Oven C. Radar D. 900 Mhz cordless phones

9 C /Reference: QUESTION 24 When conducting a greenfield RF site survey with multiple APs, which information element should be enabled to ensure your site survey software will display the hostname of each AP? A. IE 0 B. IE 1 C. IE 133 D. IE 221 Correct Answer: C /Reference: QUESTION 25 Corporation XYZ has 25 buildings (with a total of employees) and would like to implement a single SSID across their entire site. Which feature would be helpful to prevent wireless internet access from 1 of the 25 buildings? A. AP groups B. AAA override C. WLAN override D. MAC filtering Correct Answer: A /Reference: QUESTION 26 Which IEEE standard allows for the use of multiple 2-MHz communication channels within the 2.4-GHz spectrum? A B C D E /Reference:

10 QUESTION 27 While reviewing data gathered during a passive RF site survey for an existing network of Cisco Aironet 1260 Series Access Points, you discover a high amount of potential co-channel interference throughout the network. Which two of these are potential causes? (Choose two.) A. an inconsistent beacon interval B. EDRRM is not enabled C. the APs are placed too close together D. a static channel plan is used E. the radio policy is inadvertently set identically for all SSIDs Correct Answer: CD /Reference: QUESTION 28 You are tasked with designing a wireless network to support a specific 5-GHz wireless phone. During the initial design phase you are unable to obtain the client device radio specifications. From a network configuration perspective, which of these cannot be configured before you obtain the radio specifications? A. band select B. WMM queue selection C. DCA channel list D. channel width Correct Answer: C /Reference: QUESTION 29 You are configuring an autonomous wireless guest network for your customer. The customer requires that guest users be unable to communicate with one another. Which solution best meets this requirement? A. public secure packet forwarding on the AP and switch-port protected on the AP switch port B. public secure packet forwarding on the AP and limiting the AP switch port to the guest VLAN only C. port security on the AP and 802.1X on the AP switch port D. MAC filtering on the AP radio interface and switch-port protected on the AP switch port E. public secure packet forwarding on the AP and configuring the guest VLAN on the switched network as a private VLAN Correct Answer: E /Reference: QUESTION 30 What is the advantage of EAP-FAST compared to LEAP?

11 A. EAP-FAST exchanges user credentials within a TLS tunnel whereas LEAP exchanges credentials information in clear, which allows possible offline "dictionary attacks." B. EAP-FAST allows authenticated in-band PAC provisioning, whereas LEAP uses anonymous in-band PAC provisioning, which is transparent to the user. C. LEAP only supports user and password changes in conjunction with MS-CHAPv2, whereas EAP-FAST supports user and password changes when using MS-CHAPv2 or OTP or PAC. D. EAP-FAST works with the authentication algorithm "open eap," and also with "network-eap," whereas LEAP is limited to the authentication algorithm "network-eap" only. Correct Answer: A /Reference: QUESTION 31 Which of the below statement is correct with regards to configuring local MAC authentication on an AP? A. A MAC address can be spoofed, so it is insecure. B. The MAC address is used in stead of the username in the EAP certificate exchange. C. The MAC address may be used in the key hash, if WEP is used as a key cipher. D. MAC address authentication can not co-exist with EAP authentication. Correct Answer: A /Reference: QUESTION 32 Company XYZ has a wireless network in place. Which three general guidelines should be followed to overlay a Cisco Context-Aware Mobility Solution? (Choose three.) A. The maximum effective AP spacing should be between 40 feet and 70 feet. B. There should be a minimum of two APs within range of each client. C. APs at the perimeter of the coverage area need to be deployed. D. The physical placement of APs must be collinear. E. Equilateral triangle placement of the APs yields better accuracy. Correct Answer: ACE /Reference: QUESTION 33 You are designing a wireless infrastructure for an enterprise customer in the busy international banking district of Tokyo. All the client adapters are fairly modern, so you have turned off b speeds to reduce the size of your cells. Which channels will you choose to make optimum use of the available spectrum? A. 1, 5, 9, 13

12 B. 1, 6, 11 C. 1, 6, 11, 14 D. 1, 4, 7, 11, 14 E. 1, 5, 9 /Reference: QUESTION 34 Which of the following is not a valid IPv6 address type? A. link-local unicast B. unique-local unicast C. anycast D. multicast E. broadcast Correct Answer: E /Reference: QUESTION 35 To avoid classification at all switches within a QoS domain, a switch port may be configured in a trusted state. Which two statements are true regarding the trust state configuration of a switch port? (Choose two.) A. When mls qos trust is not configured on the port, the default port trust state is DSCP. B. When mls qos trust is not configured on the port, the default port trust state is CoS. C. The port trust state can be CoS or DSCP only. D. When mls qos trust cos is configured on the port, the port default CoS value is used for an untagged packet. E. When mls qos trust cos is configured on the port, the switch classifies an ingress packet by using the packet CoS value. Correct Answer: DE /Reference: QUESTION 36 Which aggregate of the IPv6 addresses 2001:0303:0000:5000:0000:052B:0000:0000/96 and 2001:0303:0000:5000:0000:052C:0000:0000/96 has the longest possible mask? A. 2001:0303:0000:5000:0000:052A:0000:0000/96 B. 2001:0303:0000:5000:0000:052A:0000:0000/95 C. 2001:0303:0000:5000:0000:0528:0000:0000/93 D. 2001:0303:0000:5000:0000:0520:0000:0000/92

13 Correct Answer: C /Reference: QUESTION 37 Which two protocols or processes can be used for a switched network to control distribution of multicast traffic at Layer 2? (Choose two.) A. PIM B. CGMP C. IGMP v2 D. IGMP v3 E. IGMP snooping Correct Answer: CE /Reference: QUESTION 38 A router has two interfaces: Ethernet 0 is connected to the LAN and Ethernet 1 is connected to the Internet. The LAN is /24. All hosts on the LAN must be able to form TCP connections to any host on the Internet. Hosts on the Internet may not form TCP connections to hosts on the LAN, except to port 25 of a mail server on the LAN. The web server IP address is Which configuration fulfills all the requirements? A. interface ethernet 1 ip access-group 123 in! access-list 123 permit tcp any access-list 123 permit tcp any host eq 25 B. interface ethernet 1 ip access-group 123 in! access-list 123 permit tcp any established access-list 123 permit tcp any host eq 25 C. interface ethernet 1 ip access-group 123 in! access-list 123 permit tcp any host eq 25 access-list 123 deny tcp any D. interface ethernet 1 ip access-group 123 in! access-list 123 deny tcp any access-list 123 permit tcp any host eq 25 E. interface ethernet 1 ip access-group 123 in! access-list 123 permit tcp any host eq 25 access-list 123 permit tcp any access-list 123 deny tcp any /Reference: QUESTION 39 You have 2 WLCs with management IP addresses of and respectively. Your APs reside on a different subnet. Which of the below DHCP options needs to be configured? A. option 43 hex f102c0a80b05c0a80b06 B. option 43 hex f108c0a80b05c0a80b06

14 C. option 43 hex f102c0a81105c0a81106 D. option 43 hex f108c0a81105c0a81106 /Reference: QUESTION 40 Which two statements about the IPv4 ToS byte are true? (Choose two.) A. The ToS byte is located in the Layer 2 header. B. The ToS byte is located in the Layer 3 header. C. The DSCP values range from 0 to 7. D. The IP precedence and the DSCP fields have two overlapping bits. E. The class selector in the DSCP field is defined for backward compatibility with IP precedence. E /Reference: QUESTION 41 Cisco WiSM controllers have multiple interface types. Which two interfaces must be present and configured at setup time? (Choose two.) A. virtual B. virtual gateway C. service port D. operator defined Correct Answer: AC /Reference: QUESTION 42 IN CUWN, what DHCP option needs to be configured for APs to join specific WLCs, if the WLCs and APs reside in different subnets? A. option 43 B. option 60 C. option 82 D. option 150 Correct Answer: A

15 /Reference: QUESTION 43 When LAG is enabled, all ports participate in LAG by default. Which statement about LAG is true? A. The failure of one link affects only management access, not traffic throughput. B. If any single link fails, traffic will automatically migrate to the remaining links. C. If only two switch ports are in the LAG group, and one switch port fails, then the other switch port will fail also. D. If there are only two LAG connections, then all VLANs must be allowed. /Reference: QUESTION 44 Two switches are connected by an EtherChannel. Which setting does not have to match on the connected ports in order to form an EtherChannel? A. the allowed VLAN list B. the spanning-tree PortFast settings C. DTP negotiation settings D. the native VLAN E. the spanning-tree port priorities for each VLAN Correct Answer: C /Reference: QUESTION 45 Refer to the exhibit. Which two statements are true? (Choose two.) A is the IP address of the multicast source. B is the IP address of the multicast receiver. C is the RP address for multicast group D. The Ethernet 0/0 interface of the router and are in the same broadcast domain.

16 E. The Ethernet 0/0 interface of the router and do not need to be in the same broadcast domain. D /Reference: QUESTION 46 You are configuring a TACACS+ server and the security team asks you for details about this protocol. Which three statements about the TACACS+ protocol are true? (Choose three.) A. It is TCP based. B. It is UDP based. C. It uses port 49 by default. D. It uses port 59 by default. E. The username is sent in cleartext. F. The username is encrypted. Correct Answer: ACF /Reference: QUESTION 47 Refer to the exhibit. All the guest users that associate to the guest SSID on the Cisco WLC are receiving this message from their browser each time that they try to reach an Internet website. Which two changes will allow the guest users to avoid this message in a simple and secure way? (Choose two.)

17 A. Generate and install a new certificate for the Cisco WLC web-auth, signed by the Cisco CA. B. Configure a FQDN in the management interface of the Cisco WLC and add that FQDN to the DNS server. C. Configure a FQDN in the virtual interface of the Cisco WLC and add that FQDN to the DNS server. D. Generate and install a new certificate for the Cisco WLC web-auth, signed by a CA trusted by the browser. E. Generate and install a new certificate for the Cisco WLC web-auth, signed by the local CA. Correct Answer: CD /Reference: QUESTION 48 Refer to the exhibit. Which two statements are true about the RADIUS attributes listed? (Choose two.) A. They are used for dynamic VLAN assignment for wireless or wired clients. B. They are used for dynamic VLAN assignment for VPN tunnels. C. They correspond to the RADIUS attribute numbers 64, 65, and 81. D. They correspond to the RADIUS attribute numbers 64, 65, and 71. E. They correspond to the RADIUS attribute numbers 74, 75, and 81. F. They correspond to the RADIUS attribute numbers 74, 75, and 91. Correct Answer: AC /Reference: QUESTION 49 Refer to the exhibit. The ACS RADIUS Authentication Report shows the output for a failed client authentication. Which action can resolve this issue?

18 A. Re-generate the client certificate, which is expired. B. Install the complete ACS certificate CA chain on the client operating system. C. Re-generate the local ACS certificate, which was issued by an unknown CA. D. Import the complete client certificate CA chain on the ACS. Correct Answer: D /Reference: QUESTION 50 Which two statements about the management access control on Cisco WLC, using an external TACACS+ server, are true? (Choose two.) A. The Cisco WLC supports TACACS+ command authorization. B. The Cisco WLC AAA authorization is role-based, using custom TACACS+ attributes. C. The Cisco WLC AAA authorization is role-based, using Cisco VSA attributes. D. The Cisco WLC requires the TACACS+ server to return a Privilege-Level attribute. E. If a user is not entitled to a specific task, then the user is not allowed to access that task. F. If a user is not entitled to a specific task, then the user is allowed to have read-only access to that task. F /Reference: QUESTION 51 What is the benefit of using a CA-signed certificate over a self-signed certificate? A. You can generate a certificate with a longer validity period. B. Fewer steps need to be generated. C. More authentication types are supported. D. You can avoid impersonation attacks. E. You can use bigger keys.

19 Correct Answer: D /Reference: QUESTION 52 Refer to the exhibit. Which DHCP option is shown? A. 32 B. 43 C. 60 D. 150 E. 241 Correct Answer: C /Reference: QUESTION 53 Refer to the exhibit. Which Cisco WLC IP addresses will be returned to a Cisco AP that requests an IP address from this DHCP pool?

20 A and B and C and D and E. none of the above /Reference: QUESTION 54 Refer to the exhibit. What can be filtered by using this DNIS filter on ACS? A. wireless clients, based on the SSID to which they are associating B. wireless IP phones, based on the phone number that they are calling C. authentications from AAA clients, based on their assigned location D. authentications from a specific Cisco WLC interface E. authentications, based on part of the username Correct Answer: A /Reference: QUESTION 55 Which statement about using the internal DHCP server feature on a Cisco WLC is true? A. DHCP option 43 must be configured on the internal DHCP server. B. The DHCP server IP address must be set to the Cisco WLC management interface IP address.

21 C. The internal DHCP server can serve both wireless and wired clients. D. Autonomous APs are supported. /Reference: QUESTION 56 When using DNS discovery, you must configure DNS to respond to which of the following? A. CISCO-WAP-CONTROLLER.localdomain B. CISCO-CONTROLLER.localdomain C. CISCO-CAPWAP-CONTROLLER.localdomain or CISCO-LWAPP-CONTROLLER.localdomain D. CISCO-CONTROLLER-LWAPP.localdomain or CISCO-CONTROLLER-CAPWAP.localdomain Correct Answer: C /Reference: QUESTION 57 Refer to the exhibit. What might be the reason of these failed attempts in ACS? A. The wrong shared secret is configured on the AAA client or ACS. B. The request is coming from a AAA client that is configured only for RADIUS on ACS. C. The request is coming from a AAA client that is configured only for TACACS+ on ACS. D. The PC that is trying to access the device is outside the known subnet. /Reference: QUESTION 58 How can you configure an NTP server address for Cisco Secure ACS 5.2? A. through the ACS GUI only B. through the ACS CLI only C. through both the ACS GUI and CLI

22 D. on the hosting Microsoft Windows operating system E. not possible because there are no NTP settings for ACS /Reference: QUESTION 59 You have configured ACS to perform machine authentication against Active Directory. Both ACS and Active Directory hosts can ping each other, there is no firewall between them, and ACS trusts the correct CA. Yet the clients that are performing machine authentication with EAP-TLS and using valid certificates are failing to authenticate. What might the reason be? A. The wrong UDP port for Active Directory is configured on ACS. B. Machine access restrictions is enabled on ACS. C. The client certificate key is less than 2048 bit. D. The wrong date and time are on the ACS server. E. The host is not configured in the ACS internal database. Correct Answer: D /Reference: QUESTION 60 Refer to the exhibit. Which DHCP option is shown? A. Option 60 B. Option 241 B. Option 32

23 C. Option 150 D. Option 43 Correct Answer: /Reference: QUESTION 61 You are configuring a RADIUS server and the security team asks you for details about this protocol. Which three statements about the RADIUS protocol are true? (Choose three.) A. It is TCP based. B. It is UDP based. C. RADIUS servers use port 1645 or port 1812 for authentication. D. RADIUS servers use port 1646 or port 1813 for authorization. E. The username is sent in cleartext. F. The username is encrypted. CE /Reference: QUESTION 62 In a bridge-to-bridge setup, the network administrator wants to allow only the root bridge the ability to associate to the non-root bridge. To achieve this goal, the administrator decides to implement a MAC filter. If 0017.dfa6.cdf0 is the MAC address of the root AP (ROOT_AP) and 0017.dfa6.ae13 is the MAC address of the non-root AP (NON-ROOT_AP), which command set will achieve this goal? A. ROOT_AP# configure terminal ROOT_AP(config)# access-list 700 permit 0017.dfa6.cdf0 ROOT_AP (config)# dot11 association mac-list 700 B. NON-ROOT_AP# configure terminal NON-ROOT_AP(config)# access-list 700 permit 0017.dfa6.cdf0 NON- ROOT_AP(config)# dot11 association mac-list 700 C. NON-ROOT_AP# configure terminal NON-ROOT_AP(config)# access-list 700 permit 0017.dfa6.ae13 NON- ROOT_AP(config)# dot11 association mac-list 700 D. NON-ROOT_AP# configure terminal NON-ROOT_AP(config)# access-list 700 permit 0017.dfa6.cdf0 NON- ROOT_AP(config)# dot11 ssid bridge NON-ROOT_AP(config-ssid)# dot11 association mac-list 700 E. ROOT_AP# configure terminal ROOT_AP(config)# access-list 700 permit 0017.dfa6.cdf0 ROOT_AP (config)# interface Dot11Radio0 ROOT_AP(config-if)# dot11 association mac-list 700 /Reference: QUESTION 63 When a wireless client connects to an autonomous AP, which sequence of events will occur when connecting to a SSID that does not broadcast itself?

24 A. probe request, probe response, association request, association response, authentication request, authentication response B. authentication request, authentication response, probe request, probe response, association request, association response C. probe request, probe response, authentication request, authentication response, association request, association response D. authentication request, authentication response, association request, association response, probe request, probe response Correct Answer: C /Reference: QUESTION 64 Refer to the exhibit. Given the following GUI output on an autonomous AP, how many additional infrastructure APs are registered to the Cisco WDS AP that is shown in the exhibit, and which Cisco WDS master AP MAC address is used for the WDS registration process? A. Zero and 0022.bd1a.0680 B. Oneand 0022.bd1a.0680 C. Twoand 0026.cb53.6d40

25 D. Zero and 0026.cb53.6d40 E. Oneand 0026.cb53.6d40 F. Oneand 0024.d70c.7ca4 or 001b.7766.d253 /Reference: QUESTION 65 The QoS implementation for WLANs differs from QoS implementation on other Cisco devices. With QoS enabled on autonomous APs, which two statements are true? (Choose two.) A. Autonomous APs do not prioritize packets; they classify packets based on DSCP value, client type, or the priority value in the 802.1Q or 802.1p tag. B. Autonomous APs do not construct internal DSCP values; they only support mapping by assigning IP DSCP, precedence, or protocol values to Layer 2 CoS values. C. Autonomous APs do not support 802.1Q or 802.1p tagged packets. D. Autonomous APs prioritize the traffic from voice clients over traffic from other clients when the QoS Element for Wireless Phones feature is enabled. D /Reference: QUESTION 66 When you have an AP in autonomous mode, you can configure the AP to only allow console or Telnet access to authorized users. What is the correct command sequence to achieve RADIUS login authentication via console? A. configure terminal aaa new-model aaa authentication login default line console 0 login authentication default radius-server host auth-port 1645 acct-port 1646 B. configure terminal aaa new-model aaa authentication login default group radius line console 0 login authentication default radius-server host auth-port 1645 acct-port 1646 C. configure terminal aaa new-model aaa authentication login default group radius login authentication default radius-server host auth-port 1645 acct-port 1646 D. configure terminal aaa new-model aaa authentication login default group radius line console 0 login authentication default group radius radius-server host auth-port 1645 acct-port 1646 /Reference: QUESTION 67 When viewing the configuration of an autonomous AP, you see these SNMP commands: snmp-server community comaccess ro 4 snmp-server enable traps snmp authentication snmp-server host cisco.com version 2c public

26 Which statement about these commands is true? A. These commands block read-only access for all objects to access list 4 members that use the comaccess community string. All other SNMP managers have access to any objects. SNMPv2c sends SNMP Authentication Failure traps to the host cisco.com, using the public community string. B. These commands allow write-only access for all objects to access list 4 members that use the comaccess community string. No other SNMP managers have access to any objects. SNMPv2c sends SNMP Authentication Failure traps to the host cisco.com, using the public community string. C. These commands allow read-only access for all objects to access list 4 members that use the comaccess community string. No other SNMP managers have access to any objects. SNMPv2c sends SNMP Authentication Failure traps to the host cisco.com, using the public community string. D. These commands allow read-only access to access list 4 members that use the comaccess community string. SNMPv2c sends SNMP Authentication Failure traps to the host cisco.com, using the public community string. Correct Answer: C /Reference: QUESTION 68 Refer to the exhibit. This portion of a Cisco IOS AP configuration refers to a multiple SSID and VLAN configuration. Which statement is false?

27 A. The mbssid guest-mode command allows guest users to connect to the SSID. B. All SSIDs are broadcast by and visible to clients. C. The EAP SSID allows client to connect to it by using PEAP as an authentication method. D. The AP needs to have subinterfaces 80, 81, and 82 configured, both on the radio 0 and Ethernet interfaces. Correct Answer: A /Reference: QUESTION 69 Refer to the exhibit. Given this debug output from the debug wlccp wds mn command, which event has occurred?

28 A. A wireless client with an IP address of has joined the Cisco WDS domain. B. A wireless client with an IP address of has re-associated to the Cisco WDS domain. C. A wireless client has been removed from the Cisco WDS domain. D. A wireless client has failed authentication. Correct Answer: A /Reference: QUESTION 70 You want to prevent a wireless client with a MAC address of 00:40:96:a5:b5:d4 from associating with an autonomous AP. Which commands do you use on the autonomous AP? A. dot11 association mac-list 700 access-list 700 deny a5.b5d4 ffff.ffff.ffff B. dot11 association mac-list 700 access-list 700 permit ffff.ffff.ffff access-list 700 deny a5.b5d C. dot11 association mac-list 700 access-list 700 deny a5.b5d access-list 700 permit ffff.ffff.ffff D. dot11 association mac-list 700 access-list 700 deny a5.b5d4 ffff.ffff.ffff access-list 700 permit ffff.ffff.ffff E. none of the above Correct Answer: C /Reference: QUESTION 71

29 Which set of steps shows the correct order for adding an SSID with WPA security on a new VLAN via the GUI on an autonomous AP? A. Create the SSID, create the VLAN, and then set up encryption. B. Create the VLAN, set up encryption, and then create the SSID. C. Set up encryption, create the VLAN, and then create the SSID. D. Create the VLAN, create the SSID, and then set up encryption. /Reference: QUESTION 72 What is the function of the distance command on an autonomous bridge? A. to adjust the data rate of the packet transmission B. to adjust the bridge timeout values to account for the time that is required for radio signals to travel from bridge to bridge C. to give the person reading the configuration an idea of how far apart the bridge links are D. to increase the time that is needed for authentication /Reference: QUESTION 73 Which command can you use to configure the standalone AP to use the NTP server at IP address ? A. ntp server B. sntp server C. ntp broadcast client D. sntp broadcast client /Reference: QUESTION 74 Which debug command is best to use when you suspect that a client will not connect to an autonomous AP because of an incorrect WPA PSK? A. debug dot11 mgmt station B. debug dot11 aaa authenticator process C. debug dot11 station connection failure D. debug dot11 encryption

30 Correct Answer: C /Reference: QUESTION 75 Refer to the exhibit. You are troubleshooting a client that is not able to associate to an SSID configured on an autonomous AP. What is most likely the cause of the association failure, given the debug output seen in the exhibit? A. The RADIUS server is not reachable. B. The username and password combination is incorrect. C. The SSID is secured with PSK and the shared secret is wrong. D. There is no login method configured under the AAA configuration. E. The aaa authentication command is pointing to a nonexistent RADIUS server. F. The interface dot11radio0 does not require authentication and the client is requesting it. Correct Answer: D /Reference: QUESTION 76 You are setting up a wireless network using autonomous APs. Which two statements are true? (Choose two.) A. A wireless device always attempts to transmit at the highest datarate that is set to Basic, (orrequire in the GUI). B. At least one data rate must be set to Basic. C. The AP sends multicast and management frames at the lowest basic rate. D. The 5-GHz radios do not support 40-MHz channel width. Correct Answer: AC /Reference: QUESTION 77 Refer to the exhibit. Client stations are trying to associate to a given SSID and fail to do so for some time before associating successfully. Considering the debug output that was collected, what could be the cause of the issue?

31 A. The WLC is connected to two switches and LAG is not configured. B. The client was roaming and the SSID does not have the same WLAN ID on all company controllers. C. The client was already associated to another corporate SSID and Fast SSID change is disabled. D. The WLAN is constantly brought down because of CAPWAP tunnel flapping. E. An administrator changed the WLAN ID during the time in question. Correct Answer: C /Reference: QUESTION 78 What is the correct procedure to install a chained certificate (if multiple certification authorities are involved) when you do web authentication on a WLC? A. In the Security > Web Authentication menu, download first the root CA certificate, apply, then download the intermediate CA and then the device certificate. B. Upload the WLC certificate through the Security > Web Authentication menu and the CA certificates by downloading with datatype Vendor CA Certificate. C. Zip all the certificates and download them on the WLC as datatype WebAuth Bundle. D. Only through command line with the command "transfer download data type webauth chained cert". E. Concatenate the device and intermediate CA certificates into one file along with the private key generated for the WLC CSR and upload that file in the Security > Web Authentication menu. Correct Answer: E /Reference: QUESTION 79 When configuring NAC in-band to work with a Cisco WLC, which statement is true, from a WLC perspective? A. NAC always needs to be enabled in the WLAN configuration. B. The Clean Access Server always needs to be configured as a RADIUS accounting server on the Cisco WLC. C. The Clean Access Manager always needs to be configured in the SNMP trap receiver. D. Only the quarantine VLAN ID needs to be configured as the WLAN interface. Correct Answer: D /Reference: QUESTION 80

32 You are on the U.S. East Coast (EST time zone, UTC-5) and configure NTP on your Cisco WLC. The Cisco WLC web GUI shows the correct time and date, but your APs are off by 5 hours. Which statement is true? A. This behavior is normal because the APs show UTC time. B. You need to configure the time zone on the APs. C. You need to configure the NTP server on the APs. D. You need to enable time-zone synchronization between the APs and Cisco WLC. E. APs support only an SNTP server, not an NTP server. Correct Answer: A /Reference: QUESTION 81 Which three statements about the VideoStream feature (also known as MediaStream) on the Cisco WLC are true? (Choose three.) A. It unicasts the stream only to clients that are subscribed via IGMP. B. It works both ways (from network to client and from client to network). C. It unicasts the stream only to APs on which you enable the feature. D. It sends unicast, so it can usually use higher data rates. E. It unicasts the multicast stream over the air only; it multicasts on wired connections. F. It multicasts, so a large number of subscribed clients on the AP will not consume more bandwidth. Correct Answer: ADE /Reference: QUESTION 82 What is the minimum number of rules that is necessary in a CPU ACL to allow all access from a single VLAN to the management interface, yet prevent management access from all other VLANs while permitting all other traffic? A. five B. six C. seven D. eight /Reference: QUESTION 83 Refer to the exhibit. You are a senior wireless network administrator and have just completed the configuration of TACACS+ on your production Cisco WLC server. You can successfully log into the Cisco WLC by using your domain

33 credentials. However, junior administrators, who have only local management accounts on the Cisco WLC, are complaining that they can no longer log into the Cisco WLC GUI or CLI. What is the cause of this problem? A. When TACACS+ is configured on the Cisco WLC, local authentication is permanently disabled. B. TACACS+ is the first authentication priority. The ACS is responding, so the Cisco WLC never queries the local database. C. TACACS+ was configured and the ACS is responding, so all local accounts on the Cisco WLC are disabled. D. The junior administrators must also have domain accounts with the same username but different passwords than the local Cisco WLC accounts, so the ACS is returning an access-reject. This prevents the Cisco WLC from querying the local database. /Reference: QUESTION 84 After performing a wireless site survey, you determine that to achieve proper HR-DSSS coverage within the rooms along a hallway area, the AP radios that service the hallway must be at 12 mw or higher. After the APs are all installed, you note that RRM is decreasing the power on the AP radios in the hallway to 6 mw. Which two methods can you use to prevent the HRDSSS AP radio power levels from dropping below 12 mw? (Choose two.) A. Configure the minimum power-level assignment for the 2.4 GHz radio to 11 dbm under the individual TPC settings on the hallway APs. B. Configure the minimum power-level assignment for the 5 GHz radio to 11 dbm under the individual TPC settings on the hallway APs. C. Configure the minimum power-level assignment to 11 dbm under the global b/g/n TPC settings. D. Configure the minimum power-level assignment to 11 dbm under the global a/n TPC settings. E. Statically configure the 5 GHz radios on the hallway APs to power level 4. F. Statically configure the 2.4 GHz radios on the hallway APs to power level 4. Correct Answer: CF /Reference:

34 QUESTION 85 A wireless ISP has hired you to help set up a new Cisco WLC to provide wireless access to subscription-based customers. Each customer that uses the wireless network needs to pay their bill every 30 days. How do you configure the WLAN security to help meet this requirement? A. no Layer 2 security, conditional web redirect Layer 3 security B. WPA X Layer 2 security, splash page web redirect Layer 3 security C X Layer 2 security, splash page web redirect Layer 3 security D. WPA2 PSK Layer 2 security, conditional web redirect Layer 3 security E. no Layer 2 security, splash page web redirect Layer 3 security F. WPA 802.1X Layer 2 security, conditional web redirect Layer 3 security Correct Answer: F /Reference: QUESTION 86 A 7-Mb multicast traffic stream is being sent to wireless clients and it is using up most of the available wireless spectrum in the 2.4-GHz unlicensed band. As a result, many of the data applications have become sluggish and the video is choppy. What is the best option to send the multicast over the wireless network more efficiently and leave some bandwidth for the data applications (assuming the network is capable of supporting this option)? A. Raise the DTIM to 10 B. Enable WMM QoS C. Turn on multicast-multicast mode D. Turn off the lower data rates Correct Answer: D /Reference: QUESTION 87 The helpdesk is reporting that many users are reporting slow wireless connections in one of the office buildings. You look at the CleanAir statistics and do not see any interferers, but you see very high 2.4-GHz channel utilization from the Wi-Fi devices. WCS is reporting the following mix of chipsets in the building: 10 percent b, 75 percent g and 15 percent a. You do a survey and see that you have a very dense deployment of APs and a lot of co-channel interference. Which two steps would help lower your channel utilization in this area? (Choose two.) A. Raise the power on the 2.4-GHz radios. B. Lower the power on the 2.4-GHz radios. C. Lower the DTIM. D. Raise the DTIM. E. Disable 1-, 2-, 5.5-, 6-, and 9-Mb data rates. F. Enable 1-, 2-, 5.5-, 6-, and 9-Mb data rates.

35 E /Reference: QUESTION 88 Which two statements about virtual interfaces on a WLC are true? (Choose two.) A. A virtual interface serves as the redirect address for the web authentication login page. B. A virtual interface must have a DNS host name in order to prevent web authentication clients from getting a security warning on their web browser. C. A virtual interface acts as the DHCP server placeholder for wireless clients that obtain their IP address from a DHCP server. D. A virtual interface acts as a RADIUS proxy for wireless clients. Correct Answer: AC /Reference: QUESTION 89 Refer to the exhibit. You want to use 3500e APs to setup an indoor mesh deployment. After you change the AP mode, the AP will not rejoin the Cisco WLC. Which debug command was run, according to the exhibit, and why is the AP not rejoining the Cisco WLC? A. debug capwap packet was run, and 3500e APs do not support indoor mesh. B. debug pm pki was run, and you must disable VLAN transparent for 3500e indoor mesh deployments. C. debug mesh security was run, and the 3500e radio MAC address is not in the local MAC filter list on the Cisco WLC. D. debug ap join was run, and you must disable VLAN transparent for 3500e indoor mesh deployments. E. debug capwap events enable was run, and the 3500e Ethernet MAC address is not in the local MAC filter list on the Cisco WLC. Correct Answer: E /Reference:

36 QUESTION 90 You calculate that your AP should transmit at 6 dbm to provide appropriate wireless coverage, while still complying with EIRP, with the antennas that you selected. However, the AP is transmitting at 1 dbm only, even though it is on power level 1. How can you increase the transmitting power? A. Choose appropriate antennas types. B. Decrease the antenna gain that is configured on the Cisco WLC. C. Switch to a custom Tx power level and increase the power level. D. Disable auto-rf. E. Activate n legacy beamforming on the Cisco WLC. /Reference: QUESTION 91 What does disabling broadcast SSID in the WLAN configuration do? A. causes beacons to be unicast instead of broadcast B. prevents beacons from being sent and allows only probes C. allows beacons to be sent but leaves the SSID name field empty D. forbids all broadcasts for that SSID E. makes the SSID respond only to blank probes Correct Answer: C /Reference: QUESTION 92 You are going to create a new WLAN on your production 5508 WLC running code. You do not want this WLAN to be in the default AP group on the Cisco WLC until you have thoroughly tested it. How can you achieve this goal when creating the WLAN on the production controller? A. Create the new WLAN on the Cisco WLC by using WLAN ID 13. B. A new WLAN will always be in the default AP group until you move the WLAN to a different AP group on the Cisco WLC. C. Use a Cisco WCS to create the WLAN by using WLAN ID 17. D. Create the new WLAN on the Cisco WLC using WLAN ID 20. Correct Answer: D /Reference: QUESTION 93 Refer to the exhibit.

37 Two Cisco WLCs on a Cisco WiSM and in the same mobility group are both running code. All the WLANs on both Cisco WLCs are configured for H-REAP local switching. Based on the configurations that are shown, which WLAN or WLANs will still be correctly mapped to a local VLAN if an H-REAP mode AP moves between the two controllers? A. WLANs 2, 3, 4, and 5 B. All the WLANs C. WLAN 1 D. WLANs 2 and 5 E. WLANs 1, 2, 4, and 5 F. WLAN 5 Correct Answer: D /Reference: QUESTION 94 Refer to the exhibit. You have just configured multicast on the wired network and the controller. You configured the multicast address on the Cisco WLC to be , with IGMP snooping disabled. Clients 1 and 3 are associated to

38 AP1, and Client 2 is associated to AP2. All three clients are associated and authenticated to WLAN 1. Using Client 1, you send an IGMP join request to test the multicast application on the wireless network. Which client or clients will need to process the multicast traffic? A. none of the clients B. Client 1 C. Clients 1 and 2 D. Clients 1, 2, and 3 E. Clients 1 and 3 Correct Answer: D /Reference: QUESTION 95 Where is Ethernet bridged traffic terminated in a mesh network? A. WLC B. WGB C. MAP D. RAP Correct Answer: D /Reference:

39 QUESTION 96 What is the MAPs behavior if you enable mesh ethernet-bridging vlan-transparent on them? A. The MAPs bridge traffic that came from the Ethernet port, but only if the vlan tag matches the Cisco WLC configured VLANs and interfaces. B. The MAPs bridge traffic according to the VLAN configuration. C. The MAPs bridge toward the backhaul all traffic that arrives on the Ethernet port, without touching the vlan tag. D. The MAPs bridge toward the backhaul only traffic that arrives as untagged on the Ethernet port. E. The MAPs untag all traffic that arrives on the Ethernet port and bridge all the traffic toward the backhaul. Correct Answer: E /Reference: QUESTION 97 Which statement about the beamforming (ClientLink) feature on the Cisco WLC is true? A. It works only with n APs and clients. B. It works only with n APs and b/g clients. C. It provides a signal gain when the AP transmits towards the client. D. It provides a signal gain in both directions (AP to client and client to AP). Correct Answer: C /Reference: QUESTION 98 To improve the overall wireless experience of your users, you do not want any clients to use b data rates to associate to your wireless network. You do not want a/g/n data rates to be affected in any way. Which two configuration tasks on the Cisco WLC will achieve this goal? (Choose two.) A. Disable the 1, 2, 5.5, and 11 Mb/s data rates. B. Disable all data rates below 12 Mb/s. C. Configure the WLAN radio policies to a/g only. D. Disable the b network on the Cisco WLC. E. Disable the 2.4 GHz radio on all the APs. F. Disable the DSSS data rates. Correct Answer: AC /Reference: QUESTION 99

40 After a scheduled downtime of your 5508 WLC, you notice that only a handful of the 100 APs are rejoining the controller. All the APs are in the same subnet and use default settings. Cisco WLC debugs indicate that the APs are sending discovery and join requests. Only after shutting down all the switch ports that connect to the APs and turning five ports back on at a time can you rejoin all the APs. Why were the APs unable to rejoin the Cisco WLC, and how can you prevent this from happening in the future? A. Having all the APs in the same VLAN created a Layer 2 broadcast storm, preventing the APs from receiving discovery and join responses from the Cisco WLC. You can prevent this by configuring the APs to send syslog messages to a multicast address, using the Cisco WLC CLI only. B. Having all the APs in the same VLAN created a Layer 2 broadcast storm, preventing the APs from receiving discovery and join responses from the Cisco WLC. You can prevent this by configuring the APs to send syslog messages to a unicast address, using the Cisco WLC CLI only. C. Having all the APs in the same VLAN created a Layer 3 broadcast storm, preventing the APs from receiving discovery and join responses from the Cisco WLC. You can prevent this by configuring the APs to send syslog messages to a unicast address, using the Cisco WLC CLI only. D. Having all the APs in the same VLAN created a Layer 2 broadcast storm. You cannot prevented this from happening again. /Reference: QUESTION 100 Which statement about H-REAP and FlexConnect APs on a Cisco WLC is false? A. Cisco CKM roaming is supported within an H-REAP group of APs. B. Cisco CKM roaming is unsupported between local mode APs and H-REAP APs. C. HREAP AP in standalone mode can authenticate new clients for CCKM roaming. D. H-REAP APs can have some locally switched WLANs and some centrally switched WLANs. Correct Answer: C /Reference: QUESTION 101 In order to configure the MAP authorization using an external AAA server for the indoor MAP 1260 with the Ethernet MAC address 00:1d:a1:fe:e5:44 and base radio MAC address 00:1f:9d:2a:3f:10, which two user accounts are to be created on the RADIUS server? (Choose two.) A. 00:1f:9d:2a:3f:10 B. 001da1fee544 C. c da1fee544 D. ap3g1-001da1fee544 E. c f9d2a3f10 F. ap3g1-001f9d2a3f10 D

41 /Reference: QUESTION 102 Refer to the exhibit. The wireless clients at your company are all on the /24 network. Given the applied ACL in the exhibit, which two statements are true? (Choose two.) A. DNS requests from the wireless clients will be blocked. B. ICMP requests will be allowed to travel to the wireless clients. C. ICMP replies will be allowed to travel from the wireless clients. D. DNS requests from the wireless clients will be allowed. Correct Answer: AB /Reference: QUESTION 103 Your company is using wireless voice clients that have a unicast push-to-talk-function. DTIM is set to 10. Users report that the audio is choppy. Which action should you take to try to resolve this issue? A. Lower the DTIM to 2. B. Lower the DTIM to 1. C. Disable power saving on the wireless device. D. Enable power saving on the wireless device. E. Raise the DTIM to 15. Correct Answer: C

42 /Reference: QUESTION 104 You wish to configure a Cisco WCS to provide an additional layer of security by outlining which APs your DHCP servers will respond to. Which two pieces or combinations of information can be used to achieve this objective? (Choose two.) A. AP MAC address B. AP MAC address and AP host name C. AP host name D. AP MAC address and AP SSID Correct Answer: AD /Reference: QUESTION 105 The IT administrator can confirm the air quality and existing non-wi-fi interference on the Cisco WLC but cannot find any non-wi-fi interference on the Cisco WCS. What are two possible reasons for this issue? (Choose two.) A. The administrator did not add Cisco MSE to Cisco WCS. B. The administrator added Cisco MSE to Cisco WCS but forgot to sync Cisco MSE with Cisco WLC and the floor map. C. The administrator needs to enable the CleanAir function from the Cisco WCS GUI again. D. The administrator needs to restart Cisco WCS after adding Cisco WLC, to enable the CleanAir function. Correct Answer: AB /Reference: QUESTION 106 Refer to the exhibit. The IT manager is demonstrating the Cisco WCS to the CIO. During the demonstration of the clienttroubleshooting feature, the CIO notices that some clients have the Test analysis, Messaging, and Event log options, whereas other clients do not. What is causing this difference?

43 A. Cisco Compatible Extensions v5 clients have more troubleshooting options than other clients. B. When clients associate to the diagnostic channel, the Cisco WCS has more troubleshooting options. C. Associated clients have more troubleshooting options than other clients. D. Authenticated clients have more troubleshooting options than other clients. Correct Answer: A /Reference: QUESTION 107 Which statement about the Cisco WCS WLAN configuration template is true? A. A WLAN template can be used to configure SSID settings on an AP. B. A WLAN template can be used to configure mandatory and supported data rates on a WLC. C. A WLAN template can be used to configure SSID settings on a WLC. D. A WLAN template can be used to configure channel and power level options on an AP. Correct Answer: C /Reference: QUESTION 108 Refer to the exhibit. Which method was used to define this rogue AP as malicious?

44 A. This rogue AP matched a WCS malicious rogue AP classification rule. B. A WCS switch port trace was performed and the MAC address of the rogue AP was found connected to a Cisco switch port. C. This rogue AP was discovered using RLDP. D. A rogue AP alert was enabled that defines all rogues with open SSIDs as malicious. Correct Answer: D /Reference: QUESTION 109 Refer to the exhibit. The IT manager is monitoring the wireless coverage of a floor. The manager sees the floor view that is shown. Which identifying information is displayed for the APs on the map view?

45 A. Tx power level B. utilization C. profiles D. average air quality E. associated clients F. coverage hole Correct Answer: F /Reference: QUESTION 110 Which three statements about the Cisco WCS auto-provisioning feature are true? (Choose three.) A. Auto-provisioning allows WCS to automatically configure a new or replace a current wireless LAN controller. B. The service port of the WLAN controller is required to have network connectivity for the auto-provisioning process to begin.

46 C. DHCP Option 43 (vendor-specific information) has to be configured in the DHCP scope options for the autoprovisioning process to begin. D. DHCP Option 150 (TFTP server address) has to be configured in the DHCP scope options for the autoprovisioning process to begin. E. Using the add filter command in WCS will create a controller configuration file. F. WCS auto-provisions the management interface of the WLAN controller by pushing a predefined template. Correct Answer: ADE /Reference: QUESTION 111 Following the instructions in the configuration guide, the IT staff backs up the historical data of the installed Cisco MSE. Where does this data gets stored? A. On the Cisco MSE, in the root path. B. In the FTP directory that is specified during Cisco WCS installation. C. In the directory that is specified during the backup operation. D. In the TFTP directory that is specified during Cisco WCS installation. /Reference: QUESTION 112 Which two statements about the Cisco WCS alarms and events are true? (Choose two.) A. An alarm is the listing of an SNMP trap from a WLAN controller. B. An event can be a report about radio interference crossing a threshold. C. An alarm is a Cisco WCS response to one or more related events. D. An event summary of critical, major, and minor events is displayed at the top of the Cisco WCS page. C /Reference: QUESTION 113 Refer to the exhibit. According to the Cisco WCS CleanAir dashboard, which interferer is causing the most interference at the time of the capture?

47 A. video camera B. Bluetooth link C. DECT-like phone D. DECT phone Correct Answer: D /Reference: QUESTION 114 Refer to the exhibit. Which statement about this Cisco WCS wips configuration is true?

48 A. Only a Cisco WLC and an AP are required to detect these wips signatures. B. APs in monitor mode are required to detect these wips signatures. C. Cisco WCS, a Cisco WLC, Cisco MSE, and an AP in enhanced local mode are required to detect these wips signatures. D. Cisco WCS, a Cisco WLC, Cisco MSE, and an AP in FlexConnect mode are required to detect these wips signatures. /Reference: QUESTION 115 Company ABC has a deployment plan that includes multiple controllers. To start the deployment and manage the controllers more efficiently, the IT administrator decides to use controller autoprovisioning on Cisco WCS. Which three controller options are available as matching criteria? (Choose three.) A. hostname B. MAC address C. serial number D. management IP address E. device type

49 F. UDI Correct Answer: ABC /Reference: QUESTION 116 The IT manager acknowledges that some security issues that are shown in a detailed security index report violate company policies. However, the security index does not change after synchronizing the configuration of the Cisco WLC on Cisco WCS. What are two possible reasons for this issue? (Choose two.) A. The acknowledged issue is on a controller that does not directly affect the security index score (for instance, it is not the controller with the lowest score). B. The acknowledged issue is on a WLAN that does not directly affect the security index score. Only the lowest scoring WLAN of the lowest scoring controller affects the security index score. C. The acknowledged issue is on a controller that does not directly affect the security index score (for instance, it is not the controller with the highest score). D. The acknowledged issue is on a WLAN that does not directly affect the security index score. Only the highest scoring WLAN of the highest scoring controller affects the security index score. Correct Answer: AB /Reference: QUESTION 117 Which statement about Cisco WCS virtual domains (partitioning) is true? A. The WCS root user is contained to the root virtual domain and cannot view other virtual domains. B. Each virtual domain can be configured to include or exclude selected maps, WLCs, or APs based on the hierarchical level of each domain. C. Any AP managed by WCS will be visible in all virtual domains. D. Each virtual domain can be configured to include or exclude selected reports, configuration templates, or WCS background tasks based on the hierarchical level of each domain. /Reference: QUESTION 118 Refer to the exhibit.

50 What appears to be the issue with the wireless client device? A. The client 802.1x configuration is incorrect. B. There is RF interference. C. The client WPA2 parameters are incorrect. D. No response is being received from the DHCP server. E. The client is configured with the wrong WEP key. F. No response is being received from the RADIUS server for 802.1x authentication. Correct Answer: D /Reference: QUESTION 119 You are developing a context-aware application with customized middleware. The Cisco MSE is configured to send northbound notifications to the middleware as well as to the Cisco WCS via SOAP/XML. You created the notification definitions via the WCS and see notifications coming in on the middleware, but you do not see notification messages showing up in the WCS. What could be causing this problem? A. The notification receiver is not correctly configured in the WCS. Make sure the WCS is correctly configured with a northbound notification receiver using SNMPv2 and the correct community string. B. The notification group does not have an MSE assigned and the MSE is not synchronized.

51 C. The WCS does not understand SOAP/XML. To correct this, change the transport protocol to SNMP/plain text. D. The WCS does not understand SOAP/XML. To correct this, change the transport protocol to SNMP/XML. E. The WCS does not understand SOAP/XML. To correct this, change the transport protocol to Syslog/plain text. F. The WCS does not understand SOAP/XML. To correct this, change the transport protocol to Syslog/XML. Correct Answer: D /Reference: QUESTION 120 You have been getting reports of voice disruption over wireless communications in your network. Your SSID is configured to use WPA1 with TKIP and Cisco Centralized Key Management. You see a lot of TKIP replay messages on the WLC logs. What is the most probable reason for the voice disruptions? A. TKIP replay causes access point to reboot as a security measure. This causes voice disruptions for the associated clients until they scan and reconnect to another AP. B. The TKIP countermeasure timer is putting the AP down for a specified time and causing the voice disruptions. C. TKIP replay activates MFP. If MFP detects the replays, it will trigger a disassociation to all wireless clients. D. The use of WPA1 with TKIP is the main reason for the voice disruptions. It is better to use WPA2 with AES to avoid this problem. /Reference: QUESTION 121 A user runs the Cisco Unified Wireless IP Phone 7921 with an AP that runs autonomous Cisco IOS Software. How does the 7921 decide whether to associate to an AP to avoid over congestion? A. The 7921 monitors the QBSS information element, which includes the Min and Max contention window fields, and uses the information to evaluate contention and channel utilization. B. The 7921 monitors the QBSS information element, which includes channel load information in the beacon and probe response frames. C. The 7921 monitors the QBSS information element, which includes EDCF such as queuing on the radio egress port, and uses the information to evaluate AP load and make an association decision. D. The 7921 monitors the QBSS information element, which includes radio access categories and the Min and Max contention window fields, to evaluate AP load. /Reference:

52 QUESTION 122 Refer to the exhibit. A Cisco Wireless IP Phone is unable to seamlessly roam on 2.4 GHz. There are interruptions of several seconds on each roaming. No problems are reported on 5 GHz. A full site survey for voice has been completed on both bands. Which Cisco WLC feature does this issue involve? A. client load balancing B. Aironet information element C. coverage-hole detection D. client band select Correct Answer: D /Reference: QUESTION 123 When designing a WLAN network using Cisco 1142 APs to support both voice services (Cisco 7921 IP Phones) and data services, what design principles are true? (Choose 2) A n data rates should be enabled to improve overall performance even if the Cisco 7921 IP Phones do not support n data rates. B n data rates should not be enabled as the Cisco 7921 IP Phones are not n capable. As such, no performance improvement is expected for the voice clients upon enabling n data rates. C. Ensure proper floor coverage to ensure good voice quality (-67 dbm, 20% cell overlap, and 19 db channel separation). D. -67 dbm, 20% cell overlap, and 19 db channel separation is impossible to achieve. Therefore, a site survey to ensure required RSSI coverage is top priority to ensure good voice quality.

Cisco CCIE Wireless Exam

Cisco CCIE Wireless Exam Cisco CCIE Wireless 350-050 Exam Vendor: Cisco Exam Code: 350-050 Exam Name: CCIE Wireless Written Exam, v2.0 Q&A: 315 QUESTION 1 Which two security features are associated with a wireless network employing

More information

ITCertMaster. Safe, simple and fast. 100% Pass guarantee! IT Certification Guaranteed, The Easy Way!

ITCertMaster.   Safe, simple and fast. 100% Pass guarantee! IT Certification Guaranteed, The Easy Way! ITCertMaster Safe, simple and fast. 100% Pass guarantee! http://www.itcertmaster.com Exam : 350-050 Title : CCIE Wireless Exam (V2.0) Vendor : Cisco Version : DEMO Get Latest & Valid 350-050 Exam's Question

More information

Configuring Hybrid REAP

Configuring Hybrid REAP 13 CHAPTER This chapter describes hybrid REAP and explains how to configure this feature on controllers and access points. It contains the following sections: Information About Hybrid REAP, page 13-1,

More information

Configuring OfficeExtend Access Points

Configuring OfficeExtend Access Points Information About OfficeExtend Access Points, page 1 OEAP 600 Series Access Points, page 2 OEAP in Local Mode, page 3 Supported WLAN Settings for 600 Series OfficeExtend Access Point, page 3 WLAN Security

More information

Q&As. Implementing Cisco Unified Wireless Voice Networks (IUWVN) v2.0. Pass Cisco Exam with 100% Guarantee

Q&As. Implementing Cisco Unified Wireless Voice Networks (IUWVN) v2.0. Pass Cisco Exam with 100% Guarantee 642-742 Q&As Implementing Cisco Unified Wireless Voice Networks (IUWVN) v2.0 Pass Cisco 642-742 Exam with 100% Guarantee Free Download Real Questions & Answers PDF and VCE file from: 100% Passing Guarantee

More information

Cisco Exam Implementing Cisco unified Wireless Voice Networks (IUWVN) v2.0 Version: 10.0 [ Total Questions: 188 ]

Cisco Exam Implementing Cisco unified Wireless Voice Networks (IUWVN) v2.0 Version: 10.0 [ Total Questions: 188 ] s@lm@n Cisco Exam 642-742 Implementing Cisco unified Wireless Voice Networks (IUWVN) v2.0 Version: 10.0 [ Total Questions: 188 ] Question No : 1 A client reports that video is not streaming. The administrator

More information

Cisco Exam Implementing Advanced Cisco Unified Wireless Security v2.0 Version: 9.0 [ Total Questions: 206 ]

Cisco Exam Implementing Advanced Cisco Unified Wireless Security v2.0 Version: 9.0 [ Total Questions: 206 ] s@lm@n Cisco Exam 642-737 Implementing Advanced Cisco Unified Wireless Security v2.0 Version: 9.0 [ Total Questions: 206 ] Cisco 642-737 : Practice Test Question No : 1 RADIUS is set up with multiple servers

More information

CCIE Wireless v3 Lab Video Series 1 Table of Contents

CCIE Wireless v3 Lab Video Series 1 Table of Contents CCIE Wireless v3 Lab Video Series 1 Table of Contents Section 1: Network Infrastructure Layer 2 Technologies VLANs VTP Layer 2 Interfaces DTP Spanning Tree- Root Election Spanning Tree- Path Control Spanning

More information

Real4Test. Real IT Certification Exam Study materials/braindumps

Real4Test.   Real IT Certification Exam Study materials/braindumps Real4Test http://www.real4test.com Real IT Certification Exam Study materials/braindumps Exam : 400-351 Title : CCIE Wireless Vendor : Cisco Version : DEMO Get Latest & Valid 400-351 Exam's Question and

More information

Cisco Questions & Answers

Cisco Questions & Answers Cisco 642-737 Questions & Answers Number: 642-737 Passing Score: 800 Time Limit: 120 min File Version: 25.6 http://www.gratisexam.com/ Cisco 642-737 Questions & Answers Exam Name: Implementing Advanced

More information

Vendor: Cisco. Exam Code: Exam Name: Implementing Advanced Cisco Unified Wireless Security (IAUWS) v2.0. Version: Demo

Vendor: Cisco. Exam Code: Exam Name: Implementing Advanced Cisco Unified Wireless Security (IAUWS) v2.0. Version: Demo Vendor: Cisco Exam Code: 642-737 Exam Name: Implementing Advanced Cisco Unified Wireless Security (IAUWS) v2.0 Version: Demo QUESTION 1 Which statement describes the major difference between PEAP and EAP-FAST

More information

exam. Number: Passing Score: 800 Time Limit: 120 min CISCO Deploying Cisco Wireless Enterprise Networks. Version 1.

exam. Number: Passing Score: 800 Time Limit: 120 min CISCO Deploying Cisco Wireless Enterprise Networks. Version 1. 300-365.exam Number: 300-365 Passing Score: 800 Time Limit: 120 min CISCO 300-365 Deploying Cisco Wireless Enterprise Networks Version 1.0 Exam A QUESTION 1 The customer has deployed C7960 phones with

More information

Deploying Cisco Wireless Enterprise Networks

Deploying Cisco Wireless Enterprise Networks 300-365 Deploying Cisco Wireless Enterprise Networks NWExam.com SUCCESS GUIDE TO CISCO CERTIFICATION Exam Summary Syllabus Questions Table of Contents Introduction to 300-365 Exam on Deploying Cisco Wireless

More information

Configuring FlexConnect Groups

Configuring FlexConnect Groups Information About FlexConnect Groups, page 1, page 5 Configuring VLAN-ACL Mapping on FlexConnect Groups, page 10 Configuring WLAN-VLAN Mappings on FlexConnect Groups, page 11 Information About FlexConnect

More information

CCIE Wireless v3 Workbook Volume 1

CCIE Wireless v3 Workbook Volume 1 CCIE Wireless v3 Workbook Volume 1 Table of Contents Diagrams and Tables 7 Topology Diagram 7 Table 1- VLANs and IP Subnets 8 Table 2- Device Management IPs 9 Table 3- Device Credentials 10 Table 4- Term

More information

Per-WLAN Wireless Settings

Per-WLAN Wireless Settings DTIM Period, page 1 Off-Channel Scanning Deferral, page 3 Cisco Client Extensions, page 10 Client Profiling, page 12 Client Count per WLAN, page 15 DTIM Period Information About DTIM Period In the 802.11

More information

CCIE Wireless v3.1 Workbook Volume 1

CCIE Wireless v3.1 Workbook Volume 1 CCIE Wireless v3.1 Workbook Volume 1 Table of Contents Diagrams and Tables 7 Topology Diagram 7 Table 1- VLANs and IP Subnets 8 Table 2- Device Management IPs 9 Table 3- Device Credentials 10 Table 4-

More information

Vendor: HP. Exam Code: HP2-Z32. Exam Name: Implementing HP MSM Wireless Networks. Version: Demo

Vendor: HP. Exam Code: HP2-Z32. Exam Name: Implementing HP MSM Wireless Networks. Version: Demo Vendor: HP Exam Code: HP2-Z32 Exam Name: Implementing HP MSM Wireless Networks Version: Demo QUESTION 1 A network administrator deploys several HP MSM APs and an HP MSM Controller. The APs discover the

More information

CISCO EXAM QUESTIONS & ANSWERS

CISCO EXAM QUESTIONS & ANSWERS PrepKing Number: 642-742 Passing Score: 800 Time Limit: 120 min File Version: 61.0 http://www.gratisexam.com/ CISCO 642-742 EXAM QUESTIONS & ANSWERS Exam Name: CCNP Wireless - IUWVN Certkey QUESTION 1

More information

Numerics INDEX. 2.4-GHz WMIC, contrasted with 4.9-GHz WMIC g 3-6, x authentication 4-13

Numerics INDEX. 2.4-GHz WMIC, contrasted with 4.9-GHz WMIC g 3-6, x authentication 4-13 INDEX Numerics 2.4-GHz WMIC, contrasted with 4.9-GHz WMIC 1-8 802.11g 3-6, 3-9 802.1x authentication 4-13 A AAA server group 4-25 aaa authentication login command 4-24 aaa authorization command 4-27 aaa

More information

Cisco EXAM Implementing Cisco Unified Wireless Networking Essentials (IUWNE) Buy Full Product.

Cisco EXAM Implementing Cisco Unified Wireless Networking Essentials (IUWNE) Buy Full Product. Cisco EXAM - 640-722 Implementing Cisco Unified Wireless Networking Essentials (IUWNE) Buy Full Product http://www.examskey.com/640-722.html Examskey Cisco 640-722 exam demo product is here for you to

More information

IP network that supports DHCP or manual assignment of IP address, gateway, and subnet mask

IP network that supports DHCP or manual assignment of IP address, gateway, and subnet mask Network Requirements, page 1 Wireless LAN, page 2 Wi-Fi Network Components, page 3 802.11 Standards for WLAN Communications, page 6 Security for Communications in WLANs, page 9 WLANs and Roaming, page

More information

Template information can be overridden on individual devices.

Template information can be overridden on individual devices. CHAPTER 12 This chapter describes the Controller Template Launch Pad. It is a hub for all controller templates. Templates provide a way to set parameters that you can then apply to multiple devices without

More information

Securing Wireless LAN Controllers (WLCs)

Securing Wireless LAN Controllers (WLCs) Securing Wireless LAN Controllers (WLCs) Document ID: 109669 Contents Introduction Prerequisites Requirements Components Used Conventions Traffic Handling in WLCs Controlling Traffic Controlling Management

More information

CertifyMe. CertifyMe

CertifyMe. CertifyMe CertifyMe Number: 642-586 Passing Score: 800 Time Limit: 120 min File Version: 8.0 http://www.gratisexam.com/ CertifyMe 642-586 Exam A QUESTION 1 A customer in the United States requires connectivity between

More information

Cisco Wireless LAN Controller Configuration Guide

Cisco Wireless LAN Controller Configuration Guide Cisco Wireless LAN Controller Configuration Guide Software Release 7.0.116.0 April 2011 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com

More information

Template information can be overridden on individual devices.

Template information can be overridden on individual devices. CHAPTER 12 This chapter describes the Controller Template Launch Pad. It is a hub for all controller templates. Templates provide a way to set parameters that you can then apply to multiple devices without

More information

Exam HP2-Z32 Implementing HP MSM Wireless Networks Version: 7.1 [ Total Questions: 115 ]

Exam HP2-Z32 Implementing HP MSM Wireless Networks Version: 7.1 [ Total Questions: 115 ] s@lm@n HP Exam HP2-Z32 Implementing HP MSM Wireless Networks Version: 7.1 [ Total Questions: 115 ] HP HP2-Z32 : Practice Test Question No : 1 What is a proper use for an ingress VLAN in an HP MSM VSC?

More information

Cisco Exactexams Questions & Answers

Cisco Exactexams Questions & Answers Cisco Exactexams 642-737 Questions & Answers Number: 642-737 Passing Score: 800 Time Limit: 120 min File Version: 23.4 http://www.gratisexam.com/ Cisco 642-737 Questions & Answers Exam Name: Implementing

More information

Configuring a VAP on the WAP351, WAP131, and WAP371

Configuring a VAP on the WAP351, WAP131, and WAP371 Article ID: 5072 Configuring a VAP on the WAP351, WAP131, and WAP371 Objective Virtual Access Points (VAPs) segment the wireless LAN into multiple broadcast domains that are the wireless equivalent of

More information

Configuring WDS, Fast Secure Roaming, Radio Management, and Wireless Intrusion Detection Services

Configuring WDS, Fast Secure Roaming, Radio Management, and Wireless Intrusion Detection Services CHAPTER 11 Configuring WDS, Fast Secure Roaming, Radio Management, and Wireless Intrusion Detection Services This chapter describes how to configure your access point/bridges for wireless domain services

More information

Index Numerics Cisco Wireless Control System Configuration Guide OL IN-1

Index Numerics Cisco Wireless Control System Configuration Guide OL IN-1 Numerics 802.11 counters report 14-12 802.11 security trap 10-71 802.11 tags layer 5-44 802.11a policy name 10-52 802.11b/g RRM interval template 10-62, 10-64 802.11b/g RRM threshold template 10-61 802.11b/g

More information

Wireless AC1200 Concurrent Dual Band PoE Access Point

Wireless AC1200 Concurrent Dual Band PoE Access Point DAP-2660 Version 1.00 AirPremier Wireless AC1200 Concurrent Dual Band PoE Access Point Product Overview...5 Introduction... 5 Features... 6 Package Contents... 7 System Requirements... 7 Hardware Overview...8

More information

CertifyMe. CISCO EXAM QUESTIONS & ANSWERS

CertifyMe.   CISCO EXAM QUESTIONS & ANSWERS CertifyMe Number: 642-737 Passing Score: 800 Time Limit: 120 min File Version: 28.9 http://www.gratisexam.com/ CISCO 642-737 EXAM QUESTIONS & ANSWERS Exam Name: Implementing Advanced Cisco Unified Wireless

More information

Configuring FlexConnect Groups

Configuring FlexConnect Groups Information About FlexConnect Groups, page 1, page 3 Configuring VLAN-ACL Mapping on FlexConnect Groups, page 8 Information About FlexConnect Groups To organize and manage your FlexConnect access points,

More information

PASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year

PASS4TEST. IT Certification Guaranteed, The Easy Way!   We offer free update service for one year PASS4TEST \ http://www.pass4test.com We offer free update service for one year Exam : 642-737 Title : Implementing Advanced Cisco Unified Wireless Security (IAUWS) v2.0 Vendor : Cisco Version : DEMO Get

More information

Cisco Exam Questions & Answers

Cisco Exam Questions & Answers Cisco 300-208 Exam Questions & Answers Number: 300-208 Passing Score: 800 Time Limit: 120 min File Version: 38.4 http://www.gratisexam.com/ Exam Code: 300-208 Exam Name: Implementing Cisco Secure Access

More information

Configuring WDS, Fast Secure Roaming, Radio Management, and Wireless Intrusion Detection Services

Configuring WDS, Fast Secure Roaming, Radio Management, and Wireless Intrusion Detection Services 12 CHAPTER Configuring WDS, Fast Secure Roaming, Radio Management, and Wireless Intrusion Detection Services This chapter describes how to configure your access points for wireless domain services (WDS),

More information

P ART 3. Configuring the Infrastructure

P ART 3. Configuring the Infrastructure P ART 3 Configuring the Infrastructure CHAPTER 8 Summary of Configuring the Infrastructure Revised: August 7, 2013 This part of the CVD section discusses the different infrastructure components that are

More information

FlexConnect. Information About FlexConnect

FlexConnect. Information About FlexConnect Information About, on page 1 Restrictions on, on page 6 Configuring, on page 8 Information About (previously known as Hybrid Remote Edge Access Point or H-REAP) is a wireless solution for branch office

More information

WISNETWORKS. WisOS 11ac V /3/21. Software version WisOS 11ac

WISNETWORKS. WisOS 11ac V /3/21. Software version WisOS 11ac WISNETWORKS User Manual V1.1 2016/3/21 Software version 1.0.0021 Table of contents 1. Setup& WMI... 3 1.1 Hardware Setup... 3 1.2 Web Management Interface... 3 2. Status... 4 2.1 Overview... 4 2.1.1 System...

More information

CERIO Corporation OW-310N2

CERIO Corporation OW-310N2 CERIO Corporation OW-310N2 1000mW extreme Power 11N 300Mbps Outdoor Access Point Quick Installation Guide 1. Overview CERIO OW-310N2 Outdoor AP Bridge utilizes a 1000mW high power with Aluminum Extrusion

More information

Workgroup Bridges. Cisco WGBs. Information About Cisco Workgroup Bridges. Cisco WGBs, page 1 Third-Party WGBs and Client VMs, page 9

Workgroup Bridges. Cisco WGBs. Information About Cisco Workgroup Bridges. Cisco WGBs, page 1 Third-Party WGBs and Client VMs, page 9 Cisco WGBs, page 1 Third-Party WGBs and Client VMs, page 9 Cisco WGBs Information About Cisco A workgroup bridge (WGB) is a mode that can be configured on an autonomous IOS access point to provide wireless

More information

Cisco Exam. Volume: 147 Questions

Cisco Exam. Volume: 147 Questions Volume: 147 Questions Question No : 1 Which two VoWLAN configuration parameters are required to implement a Vocera Communications System on a Cisco WLC v7.0? (Choose two.) A. Enable WLC broadcast for WLANs.

More information

accounting (SSID configuration mode) through encryption mode wep

accounting (SSID configuration mode) through encryption mode wep accounting (SSID configuration mode) through encryption mode wep accounting (SSID configuration), page 3 antenna, page 4 authentication key-management, page 6 authentication network-eap, page 8 authentication

More information

Implementing Cisco Unified Wireless Networking Essentials

Implementing Cisco Unified Wireless Networking Essentials Implementing Cisco Unified Wireless Networking Essentials Course Number: 640-721 (IUWNE) Course Length: 5 Days Course Overview This instructor-led provides students with information and practice activities

More information

Cisco Actualtests Exam Questions & Answers

Cisco Actualtests Exam Questions & Answers Cisco Actualtests 642-737 Exam Questions & Answers Number: 642-737 Passing Score: 800 Time Limit: 120 min File Version: 25.4 http://www.gratisexam.com/ Sections 1. 1 2. 2 3. 3 4. 4 5. 5 6. 6 Cisco 642-737

More information

Using Access Point Communication Protocols

Using Access Point Communication Protocols Information About Access Point Communication Protocols, page 1 Restrictions for Access Point Communication Protocols, page 2 Configuring Data Encryption, page 2 Viewing CAPWAP Maximum Transmission Unit

More information

Configuring Layer2 Security

Configuring Layer2 Security Prerequisites for Layer 2 Security, page 1 Configuring Static WEP Keys (CLI), page 2 Configuring Dynamic 802.1X Keys and Authorization (CLI), page 2 Configuring 802.11r BSS Fast Transition, page 3 Configuring

More information

PrepKing. PrepKing

PrepKing. PrepKing PrepKing Number: 642-587 Passing Score: 800 Time Limit: 120 min File Version: 9.0 http://www.gratisexam.com/ PrepKing 642-587 Exam A QUESTION 1 In order for a controller-based access point to be allowed

More information

accounting (SSID configuration mode) through encryption mode wep accounting (SSID configuration mode) through

accounting (SSID configuration mode) through encryption mode wep accounting (SSID configuration mode) through accounting (SSID configuration mode) through encryption mode wep accounting (SSID configuration mode) through encryption mode wep 1 accounting (SSID configuration) accounting (SSID configuration mode)

More information

Configuring WLANsWireless Device Access

Configuring WLANsWireless Device Access CHAPTER 6 This chapter describes how to configure up to 16 WLANs for your Cisco UWN Solution. It contains these sections: WLAN Overview, page 6-2 Configuring WLANs, page 6-2 6-1 WLAN Overview Chapter 6

More information

IEEE a/ac/n/b/g Outdoor Stand-Alone Access Point. Management Guide. ECWO Series. Software Release v1.0.1.

IEEE a/ac/n/b/g Outdoor Stand-Alone Access Point. Management Guide. ECWO Series.   Software Release v1.0.1. IEEE 802.11a/ac/n/b/g Outdoor Stand-Alone Access Point ECWO Series Management Guide Software Release v1.0.1.1 www.edge-core.com Management Guide ECWO Series Outdoor Stand-Alone Access Points 2.4 GHz, 5

More information

Configuring RF Profiles

Configuring RF Profiles Prerequisites for, page 1 Restrictions for, page 1 Information About RF Profiles, page 2 Configuring an RF Profile (GUI), page 5 Configuring an RF Profile (CLI), page 6 Applying an RF Profile to AP Groups

More information

Cisco Exam Questions and Answers (PDF) Cisco Exam Questions BrainDumps

Cisco Exam Questions and Answers (PDF) Cisco Exam Questions BrainDumps Cisco 300-375 Dumps with Valid 300-375 Exam Questions PDF [2018] The Cisco 300-375 Securing Cisco Wireless Enterprise Networks (WISECURE) exam is an ultimate source for professionals to retain their credentials

More information

Cisco TrustSec How-To Guide: Universal Configuration for the Cisco Wireless LAN Controller

Cisco TrustSec How-To Guide: Universal Configuration for the Cisco Wireless LAN Controller Cisco TrustSec How-To Guide: Universal Configuration for the Cisco Wireless LAN Controller For Comments, please email: howtoguides@external.cisco.com Current Document Version: 3.0 August 27, 2012 Table

More information

FortiNAC. Cisco Airespace Wireless Controller Integration. Version: 8.x. Date: 8/28/2018. Rev: B

FortiNAC. Cisco Airespace Wireless Controller Integration. Version: 8.x. Date: 8/28/2018. Rev: B FortiNAC Cisco Airespace Wireless Controller Integration Version: 8.x Date: 8/28/2018 Rev: B FORTINET DOCUMENT LIBRARY http://docs.fortinet.com FORTINET VIDEO GUIDE http://video.fortinet.com FORTINET KNOWLEDGE

More information

Configuring a Wireless LAN Connection

Configuring a Wireless LAN Connection CHAPTER 9 The Cisco Secure Router 520 Series routers support a secure, affordable, and easy-to-use wireless LAN solution that combines mobility and flexibility with the enterprise-class features required

More information

DWS-4000 Series DWL-3600AP DWL-6600AP

DWS-4000 Series DWL-3600AP DWL-6600AP Unified Wired & Wireless Access System Configuration Guide Product Model: Release 1.0 DWS-4000 Series DWL-8600AP DWL-6600AP DWL-3600AP Page 1 Table of Contents 1. Scenario 1 - Basic L2 Edge Setup: 1 Unified

More information

Wireless Domain Services FAQ

Wireless Domain Services FAQ Wireless Domain Services FAQ Document ID: 65346 Contents Introduction What is WDS? How do I configure my AP as a WDS? On what platforms does Cisco Structured Wireless Aware Network (SWAN) WDS run? How

More information

Configuring the Wireless Parameters (CPE and WBS)

Configuring the Wireless Parameters (CPE and WBS) Configuring the Wireless Parameters (CPE and WBS) CHAPTERS 1. Configure Basic Wireless Parameters 2. Configure Wireless Client Parameters 3. Configure Wireless AP Parameters 4. Configure Multi-SSID 5.

More information

Release Notes for Avaya WLAN 9100 AOS-Lite Operating System WAP9112 Release WAP9114 Release 8.1.0

Release Notes for Avaya WLAN 9100 AOS-Lite Operating System WAP9112 Release WAP9114 Release 8.1.0 WLAN 9100 Release Notes Release Notes for Avaya WLAN 9100 AOS-Lite Operating System WAP9112 Release 8.1.0 WAP9114 Release 8.1.0 Avaya Inc - External Distribution 1. Introduction This document provides

More information

Configure n on the WLC

Configure n on the WLC Configure 802.11n on the WLC Document ID: 108184 Contents Introduction Prerequisites Requirements Components Used Related Products Conventions 802.11n An Overview How Does 802.11n Provide Greater Throughput

More information

Deployment Guide for Cisco Guest Access Using the Cisco Wireless LAN Controller, Release 4.1

Deployment Guide for Cisco Guest Access Using the Cisco Wireless LAN Controller, Release 4.1 Deployment Guide for Cisco Guest Access Using the Cisco Wireless LAN Controller, Release 4.1 Last revised: February 1, 2008 Contents Overview section on page 1 Configuring Guest Access on the Cisco Wireless

More information

VIEW Certified Configuration Guide. Cisco

VIEW Certified Configuration Guide. Cisco VIEW Certified Configuration Guide Cisco 4400 Series Wireless LAN Controller (WLC), Wireless Services Module (WiSM), and 3750G Integrated Wireless LAN Controller with 1100, 1200, 1300 Series APs January

More information

Troubleshooting the 792xG Series Wireless IP Phone

Troubleshooting the 792xG Series Wireless IP Phone CHAPTER 3 Troubleshooting the 792xG Series Wireless IP Phone Understanding the 792xG Series Wireless IP Phone The Cisco Unified Wireless IP Phone 792xG Series are 802.11 dual-band wireless devices that

More information

"Charting the Course... Implementing Cisco Unified Wireless Networking Essentials v2.0 (IUWNE) Course Summary

Charting the Course... Implementing Cisco Unified Wireless Networking Essentials v2.0 (IUWNE) Course Summary Course Summary Description Implementing Cisco Unified Wireless Networking Essentials (IUWNE) v2.0 is a five-day instructor-led course that is designed to help students prepare for the CCNA _ wireless certification,

More information

Preface. Manual Revisions. Revision Date Description 1.0 March 3, 2009 DAP-3520 Revision A1 with firmware version Trademarks

Preface. Manual Revisions. Revision Date Description 1.0 March 3, 2009 DAP-3520 Revision A1 with firmware version Trademarks Preface D-Link reserves the right to revise this publication and to make changes in the content hereof without obligation to notify any person or organization of such revisions or changes. Manual Revisions

More information

Cisco Catalyst 6500 Series Wireless LAN Services Module: Detailed Design and Implementation Guide

Cisco Catalyst 6500 Series Wireless LAN Services Module: Detailed Design and Implementation Guide Cisco Catalyst 6500 Series Wireless LAN Services Module: Detailed Design and Implementation Guide Introduction This is the first of a series of documents on the design and implementation of a wireless

More information

Configuring the WMIC for the First Time

Configuring the WMIC for the First Time Configuring the WMIC for the First Time This document describes how to configure basic settings on a Cisco Wireless Mobile Interface Card (WMIC) for the first time. Before You Start Before you install

More information

D. The bank s web server is using an X.509 certificate that is not signed by a root CA, causing the user ID and password to be sent unencrypted.

D. The bank s web server is using an X.509 certificate that is not signed by a root CA, causing the user ID and password to be sent unencrypted. Volume: 119 Questions Question No: 1 John Smith uses a coffee shop's Internet hot-spot (no authentication or encryption) to transfer funds between his checking and savings accounts at his bank's website.

More information

Wireless technology Principles of Security

Wireless technology Principles of Security Wireless technology Principles of Security 1 Wireless technologies 2 Overview This module provides an introduction to the rapidly evolving technology of wireless LANs (WLANs). WLANs redefine the way the

More information

CertifyMe. CertifyMe

CertifyMe. CertifyMe CertifyMe Number: 642-681 Passing Score: 800 Time Limit: 120 min File Version: 8.5 http://www.gratisexam.com/ CertifyMe 642-681 Exam A QUESTION 1 Select two activities that form part of the wireless migration

More information

Exam Code: Exam Name: Implementing Cisco unified Wireless Voice Networks (IUWVN) v2.0

Exam Code: Exam Name: Implementing Cisco unified Wireless Voice Networks (IUWVN) v2.0 642-742 Number: 642-742 Passing Score: 800 Time Limit: 120 min Exam Code: 642-742 Exam Name: Implementing Cisco unified Wireless Voice Networks (IUWVN) v2.0 642-742 QUESTION 1 Which statement describes

More information

Overview of the VoIP Wireless Network

Overview of the VoIP Wireless Network CHAPTER 2 This chapter provides an overview of the interaction between the Cisco Unified Wireless IP Phone 7925G, 7925G-EX, and 7926G and other key components of a VoIP network in a wireless local area

More information

Table of Contents. Product Overview...4 Package Contents...4 System Requirements...4 Introduction...5 Features...7

Table of Contents. Product Overview...4 Package Contents...4 System Requirements...4 Introduction...5 Features...7 Table of Contents Table of Contents Product Overview...4 Package Contents...4 System Requirements...4 Introduction...5 Features...7 Wireless Basics...8 Standards-Based Technology...9 Wireless Installation

More information

Cisco Aironet 350 (DS) AP IOS Software

Cisco Aironet 350 (DS) AP IOS Software Cisco Aironet 350 (DS) AP IOS Software This document details the specifications for configuring the Cisco Aironet 350 series access points (APs) using the IOS software with NetLink Wireless Telephones.

More information

Cisco 440X Series Wireless LAN Controllers Deployment Guide

Cisco 440X Series Wireless LAN Controllers Deployment Guide Cisco 440X Series Wireless LAN Controllers Deployment Guide Cisco customers are rapidly adopting the Cisco Unified Wireless Network architecture for next generation wireless LAN performance and advanced

More information

Cisco Exam Troubleshooting Cisco Wireless Enterprise Networks Version: 7.0 [ Total Questions: 60 ]

Cisco Exam Troubleshooting Cisco Wireless Enterprise Networks Version: 7.0 [ Total Questions: 60 ] s@lm@n Cisco Exam 300-370 Troubleshooting Cisco Wireless Enterprise Networks Version: 7.0 [ Total Questions: 60 ] Cisco 300-370 : Practice Test Question No : 1 An engineer must open a support case with

More information

Implementing Cisco Unified Wireless Networking Essentials Volume 1

Implementing Cisco Unified Wireless Networking Essentials Volume 1 Volume 1 I. Course Introduction A. Learner Skills and Knowledge B. Course Goals and Objectives C. Course Flow D. Additional References 1. Cisco Glossary of Terms E. Your Training Curriculum II. Wireless

More information

EAP200 V2.00. Enterprise Access Point

EAP200 V2.00. Enterprise Access Point EAP200 V2.00 Enterprise Access Point Copyright & Disclaimer Copyright The contents of this publication may not be reproduced in any part or as a whole, stored, transcribed in an information retrieval system,

More information

Web Authentication Proxy on a Wireless LAN Controller Configuration Example

Web Authentication Proxy on a Wireless LAN Controller Configuration Example Web Authentication Proxy on a Wireless LAN Controller Configuration Example Document ID: 113151 Contents Introduction Prerequisites Requirements Components Used Conventions Web Authentication Proxy on

More information

Managing Rogue Devices

Managing Rogue Devices Information About Rogue Devices, page 1 Configuring Rogue Detection (GUI), page 5 Configuring Rogue Detection (CLI), page 8 Information About Rogue Devices Rogue access points can disrupt wireless LAN

More information

VIEW Configuration Guide. Cisco. 1131, 1232 and 1242 Autonomous APs. June 2010 Edition Version D

VIEW Configuration Guide. Cisco. 1131, 1232 and 1242 Autonomous APs. June 2010 Edition Version D VIEW Configuration Guide Cisco 1131, 1232 and 1242 Autonomous APs June 2010 Edition 1725-36193-001 Version D Configuration Guide Patent Information The accompanying product is protected by one or more

More information

Configuring the Access Point/Bridge for the First Time

Configuring the Access Point/Bridge for the First Time CHAPTER 2 Configuring the Access Point/Bridge for the First Time This chapter describes how to configure basic settings on your access point/bridge for the first time. You can configure all the settings

More information

Securing a Wireless LAN

Securing a Wireless LAN Securing a Wireless LAN This module describes how to apply strong wireless security mechanisms on a Cisco 800, 1800, 2800, or 3800 series integrated services router, hereafter referred to as an access

More information

Multicast/Broadcast Setup

Multicast/Broadcast Setup Configuring Multicast Mode, page 1 Mediastream, page 9 Configuring Multicast Domain Name System, page 14 Configuring Multicast Mode Information About Multicast/Broadcast Mode If your network supports packet

More information

Wireless# Guide to Wireless Communications. Objectives

Wireless# Guide to Wireless Communications. Objectives Wireless# Guide to Wireless Communications Chapter 8 High-Speed WLANs and WLAN Security Objectives Describe how IEEE 802.11a networks function and how they differ from 802.11 networks Outline how 802.11g

More information

Cisco Structured Wireless-Aware Network (SWAN) Implementation Guide

Cisco Structured Wireless-Aware Network (SWAN) Implementation Guide Cisco Structured Wireless-Aware Network (SWAN) Implementation Guide The Cisco Structured Wireless-Aware Network (SWAN) provides the framework to integrate and extend wired and wireless networks to deliver

More information

WISNETWORKS. WisOS 11ac V /3/21. Software version WisOS 11ac

WISNETWORKS. WisOS 11ac V /3/21. Software version WisOS 11ac WISNETWORKS User Manual V1.1 2016/3/21 Software version 1.0.0021 Table of contents 1. Setup& WMI... 3 1.1 Hardware Setup... 3 1.2 Web Management Interface... 3 2. Status... 4 2.1 Overview... 4 2.1.1 System...

More information

Document Created by Nick Schuster

Document Created by Nick Schuster Document Created by Nick Schuster Table of Contents Product Overview... 4 Introduction... 4 Features... 5 Package Contents... 6 System Requirements... 6 Hardware Overview... 7 LEDs... 7 Connections...

More information

Cisco Troubleshooting Cisco Wireless Enterprise Networks WITSHOOT v1.1

Cisco Troubleshooting Cisco Wireless Enterprise Networks WITSHOOT v1.1 Course Overview Provides students information to troubleshoot Cisco wireless networks. The course provides guidelines for troubleshooting Wi-Fi architectures of Cisco wireless components. Who Should Attend

More information

Cisco Wireless LAN Controller Module

Cisco Wireless LAN Controller Module Cisco Wireless LAN Controller Module Simple and Secure Wireless Deployment and Management for Small and Medium-Sized Businesses and Enterprise Branch Offices. Figure 1. Cisco Wireless LAN Controller Module

More information

AAA Administration. Setting up RADIUS. Information About RADIUS

AAA Administration. Setting up RADIUS. Information About RADIUS Setting up RADIUS, page 1 Setting up TACACS+, page 26 Maximum Local Database Entries, page 37 Information About Configuring Maximum Local Database Entries, page 37 Configuring Maximum Local Database Entries

More information

Viewing Status and Statistics

Viewing Status and Statistics CHAPTER 7 This chapter explains how to use ADU to view the client adapter s status and its transmit and receive statistics. The following topics are covered in this chapter: Overview of ADU and Statistics

More information

Table of Contents. Product Overview...4 Package Contents...4 System Requirements... 4 Introduction...5 Features... 7

Table of Contents. Product Overview...4 Package Contents...4 System Requirements... 4 Introduction...5 Features... 7 Table of Contents Table of Contents Product Overview...4 Package Contents...4 System Requirements... 4 Introduction...5 Features... 7 Wireless Basics...8 Standards-Based Technology... 9 Wireless Installation

More information

CWNA Exam PW0-100 certified wireless network administrator(cwna) Version: 5.0 [ Total Questions: 120 ]

CWNA Exam PW0-100 certified wireless network administrator(cwna) Version: 5.0 [ Total Questions: 120 ] s@lm@n CWNA Exam PW0-100 certified wireless network administrator(cwna) Version: 5.0 [ Total Questions: 120 ] Topic 1, A A Question No : 1 - (Topic 1) What criteria can an 802.11 wireless client use to

More information

NXC Series. Handbook. NXC Controllers NXC 2500/ Default Login Details. Firmware Version 5.00 Edition 19, 5/

NXC Series. Handbook. NXC Controllers NXC 2500/ Default Login Details. Firmware Version 5.00 Edition 19, 5/ NXC Series NXC 2500/ 5500 NXC Controllers Firmware Version 5.00 Edition 19, 5/2017 Handbook Default Login Details LAN Port IP Address https://192.168.1.1 User Name admin Password 1234 Copyright 2017 ZyXEL

More information

Cisco Implementing Cisco Unified Wireless Voice Networks (IUWVN)

Cisco Implementing Cisco Unified Wireless Voice Networks (IUWVN) Cisco 642-741 Implementing Cisco Unified Wireless Voice Networks (IUWVN) http://killexams.com/exam-detail/642-741 B. Use channels with high AP co-channel interference to avoid channel roams. C. Set the

More information

Add a Wireless Network to an Existing Wired Network using a Wireless Access Point (WAP)

Add a Wireless Network to an Existing Wired Network using a Wireless Access Point (WAP) Add a Wireless Network to an Existing Wired Network using a Wireless Access Point (WAP) Objective A Wireless Access Point (WAP) is a networking device that allows wireless-capable devices to connect to

More information