200-355 Premium Bundle

200-355 Premium Bundle

Implementing Cisco Wireless Network Fundamentals Certification Exam

4.5 
(22755 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
November 21, 2024Last update

Cisco 200-355 Free Practice Questions

Q1. A customer wants to deploy Cisco Cloud Wireless architecture with 802.11ac capabilities. Which two access points would meet the customers requirements? (Choose two.) 

A. Cisco 3700 Access Points 

B. Cisco MR34 Access Points 

C. Cisco MR18 Access Points 

D. Cisco 3600 Access Points 

E. Cisco MR72 Access Points 

F. Cisco 1570 Access Points 

G. Cisco MR26 Access Points 

Answer: B,E 

Q2. Which statement about the impact of configuring a single SSID to support TKIP and AES encryption simultaneously is true? 

A. The overhead associated with supporting both encryption methods significantly degrades client throughput. 

B. Some wireless client drivers might not handle complex SSID settings and may be unable to associate to the WLAN. 

C. This configuration is unsupported and the Cisco Wireless Control System generates alarms continuously until the configuration is corrected. 

D. This configuration is common for migrating from WPA to WPA2. No problem is associated with using this configuration. 

Answer:

Q3. When using the CLI command eping, configured for auto-anchor mobility wireless guest access, which type of packet is tested? 

A. data packets 

B. mobility unencrypted packets 

C. mobility encrypted packets 

D. SNMP control packets 

E. NTP control packets 

Answer:

Q4. What is a risk when initiating the containment of a rogue AP? 

A. disassociating clients of valid access points that are operated by a neighboring organization 

B. disrupting transmission of neighboring AP clients 

C. breaking the radio of the containing AP 

D. breaking the rogue client radio or its firmware 

Answer:

Q5. What two AP configurations will show RF prediction on maps in WCS? (Choose two.) 

A. Lightweight APs with internal antennas 

B. Lightweight APs with external Cisco antennas 

C. Lightweight APs with external 3rd Party antennas 

D. Autonomous APs with internal antennas 

E. Autonomous APs with external Cisco antennas 

F. Autonomous APs with external 3rd Party antennas 

Answer: A,B 

Q6. When using DHCP option 43, the discovery option supports vendor specific identifiers in order to obtain what IP address? 

A. core router's gateway 

B. closest distribution switch 

C. local WLAN controller 

D. local Radius Server 

Answer:

Q7. Which two statements best describe the LAG configuration between a Cisco WLC and a Cisco Catalyst switch? (Choose two.) 

A. The Catalyst switch should be configured for PAgP. 

B. The Catalyst switch should be configured only for Layer 2 load balancing. 

C. The Catalyst switch should be configured for "on" mode. 

D. The Cisco WLC relies on the connected switch to perform the load-balance of traffic. 

E. The Cisco WLC aggregates multiple management interfaces into a single virtual interface. 

Answer: C,D 

Q8. Which operating mode is valid for controllers in a converged access architecture? 

A. switch peer groups 

B. mobility controller 

C. auto-anchor 

D. foreign anchor 

Answer:

Q9. What AnyConnect module can be used to provide a detailed scan list of the Wi-Fi environment? 

A. DART 

B. Telemetry 

C. Web Security 

D. NAM 

E. Posture 

Answer:

Q10. A client is attached to the Cisco Unified Wireless Network using controllers. 

When the client is using WPA2 and EAP authentication, where are the wireless encryption keys located during the active user session? (Choose two.) 

A. On the access point 

B. On the RADIUS server 

C. On the Cisco WCS 

D. On the client 

E. On the Cisco WLC 

Answer: A,D 

Q11. Refer to the exhibit. In an effort to identify RF characteristics at a customer location, an RF engineer uses the Spectrum Analyzer tool that is shown. Which feature that is native to the Spectrum Analyzer is identified by the exhibit? 

A. Real-Time FFT 

B. Duty Cycle 

C. Max Hold 

D. Time Domain 

Answer:

Q12. Which change can correct inband access to the WLC? 

A. change the switch FastEthernetO/1 duplex setting 

B. change the switch FastEthernetO/1 speed setting 

C. enable the switch FastEthernetO/1 spanning-tree port-fast trunk 

D. change the switch FastEthernetO/1 trunk encapsulation 

E. change the WLC management interface to use DHCP 

F. change the WLC management interface VLAN 

G. change the WLC configuration of NTP 

H. browse to WLC via http://10.10.10.10 

Answer:

Q13. What are two security threats to wireless networks? (Choose two.) 

A. ad-hoc networks 

B. client misassociation 

C. port redirection 

D. cross-site scripting 

Answer: A,B 

Q14. All equipment is operational. Through which two methods can a wireless client receive an IP address when associating to the WLAN? (Choose two.) 

A. The clients can receive an IP address from SW1. 

B. Tie clients can receive an IP address from WLC1. 

C. The clients will not receive an IP address from either DHCP server because of overlapping address ranges. 

D. The clients can receive an IP address in a round-robin maner from either SW1 or WLC1. 

E. The clients can use a static IP address. 

Answer: B,E 

Q15. Which spread spectrum technique uses 11-bit chips to transmit 1 bit of data over a 22-MHz channel? 

A. DSSS 

B. FHSS 

C. OFDM 

D. MIMO 

E. CCK 

Answer:

START 200-355 EXAM