Q1. A customer has a corporate SSID that is configured to authenticate against an ACS server to validate client credentials on the corporate SSID. The customer has a firewall logically positioned on the network between the WLC and the ACS server in the network architecture. Which port must the firewall allow to ensure that authentication can occur?
A. 43
B. 1812
C. 5146
D. 8143
Answer: B
Q2. When deploying a Cisco Cloud Wireless Infrastructure, what two destination ports must be open? (Choose two.)
A. TCP/5246
B. UDP/5246
C. TCP/5247
D. UDP/5247
E. TCP/7351
F. UDP/7351
G. TCP/7734
H. UDP/7734
Answer: F,G
Q3. After you configure the Cisco 5508 Wireless Controller v7.6, a customer requests an SSID that allows for client web authentication with email input. Which authentication method should be used?
A. pass-through
B. authentication
C. splash page web redirect
D. conditional web redirect
E. on MAC filter failure
Answer: A
Q4. To implement a more secure means of communication for voice and data, what technology successfully resists interference by utilizing a wider bandwidth than needed for the transmitting signal?
A. Spread Spectrum
B. Microwave
C. Extended U-NII2
D. ISM Bands
Answer: A
Q5. What protocol is used to determine the best pathway back to a root access point?
A. CCKM
B. WNMP
C. AWPP
D. LWAP
Answer: C
Q6. What is the IEEE name for a group of access points that are connected by using the Ethernet?
A. ESS
B. BSS
C. IBSS
D. ISS
Answer: A
Q7. How many RADIUS servers can be configured globally and per WLAN on a Cisco WLC version 7.0?
A. 7 global; additional 1 per WLAN
B. 7 global; additional 3 per WLAN
C. 17 global; additional 1 per WLAN
D. 17 global; additional 3 per WLAN
E. 7 global; reuse of up to 1 maximum per WLAN
F. 17 global; reuse of up to 1 maximum per WLAN
G. 17 global; reuse of up to 3 maximum per WLAN
Answer: G
Q8. An AP has been configured for personal wireless access to the Internet.
Which item should be configured on the wireless client?
A. RF channel
B. BSS
C. PSK
D. 802.1X/EAP
E. broadcast SSID
F. IBSS
Answer: C
Q9. An engineer is trying to determine from the controller CLI whether or not Telnet is enabled on the wireless controller. Which command can be entered to display this information?
A. show network summary
B. show aaa auth
C. show radius summary
D. show ldap statistics
Answer: A
Q10. You are setting up a laptop to connect to the wireless network of your organization. The protocols that are used for the corporate network are WPA2 Enterprise, PEAP, and AES. Which three parameters do you need to configure in the Windows 7 wireless network properties for this connection? (Choose three.)
A. VLAN
B. encryption type
C. authentication method
D. VRF
E. security type
F. IP address
Answer: B,C,E
Q11. Which two formats are supported for uploading background graphics to create a network map in Cisco WCS? (Choose two.)
A. PNG
B. JPEG
C. DWG
D. TIFF
Answer: A,B
Q12. An engineer would like to setup secure authentication for a wireless network that will utilize single sign-on. Which two authentication methods can be used to accomplish this? (Choose two.)
A. LDAP
B. RADIUS
C. Local authentication
D. WEP
E. PSK
Answer: A,B
Q13. You are sitting in an airport preparing to use a free WLAN. When you look at the connections in your Windows 7 wireless client, you see a network name and three boxes with a yellow shield.
What does this mean?
A. You cannot connect to this WLAN.
B. An open ad hoc network is nearby.
C. The WLAN in the airport is open.
D. A secure ad hoc network is nearby.
E. A secure WLAN is in the airport.
F. You must provide a username and password to access the WLAN in the airport.
Answer: B
Q14. Which option best describes the limitation of a client that is attempting to manage a WLC while using the client wireless adapter connection to the wireless infrastructure?
A. Controllers must be managed using only secure protocols (that is, SSH and HTTPS), not nonsecure protocols (that is, HTTP and Telnet).
B. Read-write access is not available; only read-only access is supported.
C. Uploads and downloads from the controller are not allowed.
D. Wireless clients can manage other controllers, but not the same controller and the AP to which the client is associated.
Answer: C
Q15. RAG DROP
Answer: