Q1. Which option is used to form the BSSID in a BSS?
A. AP radio MAC address
B. AP wired MAC address
C. AP serial number
D. client radio MAC address
E. client wired MAC address
F. client serial number
Answer: A
Q2. Which portion of a WLAN deployment can WLC message logs help to troubleshoot?
A. RF issues
B. encryption issues between APs and clients
C. configuration verification issues
D. infrastructure and client Issues
E. AP placement issues
Answer: D
Q3. An engineer is gathering information for a wireless survey of a hospital. What three pieces of information must be collected for an active survey to assess the outcome best suited for the facility? (Choose three.)
A. presence of microwave ovens
B. number of patients that are at the facility
C. utilization of Location Services or voice applications
D. floor plans of adjacent facilities
E. use of wireless for secure records
F. spectrum analysis to locate all the computer work stations
G. existing Network Switch types and model numbers
H. type of devices present on the new wireless network
Answer: A,C,H
Q4. What is the difference between the IEEE, the WiFi Alliance, and the FCC, ETSI, and TELEC?
A. The IEEE and FCC are responsible for the standards that apply to wireless networks. The WiFi Alliance, ETSI, and TELEC are the governmental agencies that regulate compliance with local standards.
B. The IEEE is responsible for Layer 1 and Layer 2 protocols. The WiFi Alliance is responsible for interoperability testing. The FCC, ETSI, and TELEC are responsible for radio frequency and transmission power-level regulations and standards in the U.S., Europe, and Japan.
C. The IEEE is responsible for Layer 1 and Layer 2 protocols. The FCC, ETSI, and TELEC are responsible for interoperability testing and compliance. The WiFi Alliance is responsible for radio frequency and transmission power-level regulations and standards on a global basis.
D. The IEEE and FCC are responsible for the Layer 3 protocol support and frequency and power-level regulations in the United States. ETSI and TELEC are responsible for frequency and power-level regulations in Europe and Japan. The WiFi Alliance is responsible to interoperability testing.
Answer: B
Q5. RAG DROP
Answer:
Q6. What tool can be used to increase accuracy of WCS heat maps?
A. Map Editor
B. Planning Tool
C. CleanAir
D. Cisco Spectrum Expert
Answer: A
Q7. A customer is deploying the Cisco 5508 Wireless Controller in a unified wireless solution. Which command must be configured on the neighboring switch port if the management interface on the WLC is configured to send untagged traffic to ensure that management traffic utilizes VLAN 10?
A. switchport trunk native vlan 10
B. spanning-tree portfast
C. switchport trunk allowed vlan 10
D. channel-group 10
Answer: A
Q8. Which protocol helps the administrator to determine whether a detected rogue AP is in the network of the organization?
A. RLDP
B. RCP
C. RDP
D. RAPP
Answer: A
Q9. A customer cannot access the GUI on the Cisco 5508 Wireless Controller from the management interface due to network failure. Which interface can the customer use to access the WLC GUI until the network issues are resolved?
A. virtual
B. dynamic
C. console port
D. service port
Answer: D
Q10. Access points must discover a wireless LAN controller before they can become an active part of the network. In which order does an access point try to discover a controller?
A. Layer 3 CAPWAP or LWAPP broadcast discovery DHCP option 43 Locally stored controller IP address discovery DNS controller name resolution
B. Layer 3 CAPWAP or LWAPP broadcast discovery Locally stored controller IP address discovery DNS controller name resolution DHCP option 43
C. Layer 3 CAPWAP or LWAPP broadcast discovery Locally stored controller IP address discovery DHCP option 43 DNS controller name resolution
D. DNS controller name resolution DHCP option 43 Layer 3 CAPWAP or LWAPP broadcast discovery Locally stored controller IP address discovery
Answer: C
Q11. Refer to the exhibit.
Which syslog facility option is shown?
A. an information field, which is added to every message that comes from the WLC
B. a security feature, which is set on the syslog server
C. the type of syslog server
D. the Cisco WLC identifier for this syslog server
Answer: A
Q12. RAG DROP
Answer:
Q13. Which type of frames are ACK and CF-ACK?
A. control
B. management
C. RTS/CTS
D. association
Answer: A
Q14. Which two types of encryption does Windows support for WPA2 security for wireless connections? (Choose two.)
A. AES
B. DES
C. PGP
D. TKIP
E. WEP
Answer: A,D
Q15. Which two pieces of information are needed for the wireless client to connect to the wireless network? (Choose two.)
A. SSID
B. security settings
C. channel number
D. AP name
Answer: A,B