200-355 Premium Bundle

200-355 Premium Bundle

Implementing Cisco Wireless Network Fundamentals Certification Exam

4.5 
(37590 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
November 21, 2024Last update

Cisco 200-355 Free Practice Questions

Q1. Which two statements about the results of the Cisco WCS version 7.0 client troubleshooting tool are true? (Choose two.) 

A. Results of Layers 1 - 3 are provided. 

B. Results of only Layers 2 and 3 are provided. 

C. Results of Layers 4 - 7 are provided. 

D. The tabulated results vary depending on the client type. 

E. Results are provided in a fixed four-part tabulation. 

F. Results are provided in a fixed six-part tabulation. 

Answer: A,D 

Q2. Which two statements about the requirements to configure inter-controller roaming are true? (Choose two.) 

A. The same mobility domain names are configured across controllers. 

B. The same RF group names are configured across controllers. 

C. The same controller hardware version is configured across controllers. 

D. The same AP manager interface is configured across controllers. 

E. The same virtual interface is configured across controllers. 

F. The same controller software version is configured across controllers. 

Answer: A,E 

Q3. Refer to the exhibit. WLC1 becomes unresponsive due to a power failure at a customer site. How does the access point that is shown in the WLC controller GUI behave now that WLC1 is disabled? 

A. associates to controller 10.201.204.6 

B. associates to controller 10.201.204.11 

C. associates to controller 10.201.204.8 

D. associates to controller 10.201.204.19 

Answer:

Q4. Which two statements about AES-CCMP are true? (Choose two.) 

A. It is an encryption algorithm used in the 802.11i security protocol. 

B. It is defined in 802.1X. 

C. It is the encryption algorithm used in TKIP implementations. 

D. It is required in WPA. 

E. It is required in WPA2. 

Answer: A,E 

Q5. Which two statements about beacon frames used by access points are true? (Choose two.) 

A. They contain SSIDs if this feature is enabled. 

B. They provide vendor proprietary information. 

C. They are another name for an associated request. 

D. They are sent in response to a probe frame. 

E. They include ATIM window information for power save operations. 

Answer: A,B 

Q6. A WLAN deployment uses a combination of Cisco Aironet 1260 APs and multiple Cisco 5500 Wireless LAN Controllers to provide wireless LAN access to end-users. The network administrator has decided to use DHCP Option 43 to enable the APs to discover the wireless LAN controllers. 

When configuring the DHCP scope, which format should be used for the Cisco WLC addresses? 

A. a comma-separated ASCII string of Cisco WLC AP-manager addresses 

B. a comma-separated ASCII string of Cisco WLC management addresses 

C. a comma-separated ASCII string of Cisco WLC virtual IP addresses 

D. a hexadecimal string of Cisco WLC AP-manager addresses 

E. a hexadecimal string of Cisco WLC management addresses 

F. a hexadecimal string of Cisco WLC virtual IP addresses 

Answer:

Q7. Cisco Client Management Frame Protection is running on a mobility group with two controllers. 

Which two MFP requirements protect the network? (Choose two.) 

A. forces clients to authenticate, using a secure EAP method only 

B. implements the validation of wireless management frames 

C. requires Cisco Compatible Extensions v5 

D. requires the use of a nonbroadcast SSID 

E. requires Cisco Compatible Extensions v4 

Answer: B,C 

Q8. When the enterprise-based authentication method is used for WPA2, a bidirectional handshake exchange occurs between the client and the authenticator. 

Which five options are results of that exchange being used on a controller-based network? (Choose five.) 

A. a bidirectional exchange of a nonce used for key generation 

B. binding of a Pairwise Master Key at the client and the controller 

C. creation of the Pairwise Transient Key 

D. distribution of the Group Transient Key 

E. distribution of the Pairwise Master key for caching at the access point 

F. proof that each side is alive 

Answer: A,B,C,D,F 

Q9. An engineer is using WCS' client troubleshooting tool to investigate issues with a client 

device. What is the longest log capture they will be able to take? 

A. 2 minutes 

B. 5 minutes 

C. 10 minutes 

D. 30 minutes 

Answer:

Q10. What are three characteristics of WCS? (Choose three.) 

A. based on a single server licensing system 

B. used for wireless planning 

C. used for real-time tracking of multiple clients 

D. used for wireless management 

E. used for RF fingerprinting 

F. based on a per server licensing system 

Answer: A,B,D 

Q11. Which statement correctly describes the procedure for a lightweight AP to successfully establish a connection to a controller? 

A. The AP authenticates the received Cisco WLC certificate as valid. The AP then sends its certificate to the controller. 

B. The AP sends its certificate to the controller. The AP then authenticates the received Cisco WLC certificate as valid. 

C. The AP sends its certificate to the RADIUS server. The AP then authenticates the controller certificate as valid. 

D. The AP sends its certificate to the RADIUS server. The AP then authenticates the RADIUS certificate as valid. 

E. The AP authenticates the received RADIUS server certificate as valid. The AP then sends its certificate to the RADIUS server. 

F. The AP authenticates the received RADIUS server certificate as valid. The AP then sends its certificate to the controller. 

Answer:

Q12. Which Extensible Authentication Protocol types are supported by the Cisco Unified Wireless Network? 

A. EAP-TLS, PEAP-MSCHAPv2, and PEAP-GTC only 

B. LEAP and EAP-FAST only 

C. EAP-TLS, PEAP-MSCHAPv2, PEAP-GTC, LEAP, and EAP-FAST only 

D. any EAP supported by the RADIUS authentication server 

Answer:

Q13. Refer to the exhibit. 

Which three switch port types are valid for these connections? (Choose three.) 

A. access 

B. port-channel 

C. port-channel trunk 

D. trunk 

E. port-channel access 

F. routed port 

Answer: A,C,D 

Q14. The network administrator has used VLANs to separate VoIP frames from data frames in the wired network. What must the administrator use to separate those frames in the wireless network? 

A. multiple SSIDs 

B. multiple authentications 

C. multiple WEP or WPA keys 

D. multiple channels 

E. multiple 802.11 radios (a, b, g, n) 

Answer:

Q15. RAG DROP 

Answer:  

START 200-355 EXAM