200-355 Premium Bundle

200-355 Premium Bundle

Implementing Cisco Wireless Network Fundamentals Certification Exam

4.5 
(38010 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
December 3, 2024Last update

Cisco 200-355 Free Practice Questions

Q1. RAG DROP 

Answer:  

Q2. RAG DROP 

Answer:  

Q3. Which four options are the characteristics of the original 802.11 protocol? (Choose four.) 

A. Defined DSSS and FHSS as possible methods for modulation 

B. Designed to operate in the 5 GHz ISM frequency spectrum 

C. The most common deployment is three non-overlapping channels that are 20 MHz wide 

D. The protocol sets the maximum throughput at 1 Mb/s or 2 Mb/s 

E. Defined FHSS and OFDM as possible methods for modulation 

F. The most common deployment is three non-overlapping channels that are 22 MHz wide 

G. Designed to operate in the 2.4 GHz ISM frequency spectrum 

H. The protocol sets the maximum throughput at 1 Mb/s 

Answer: A,D,F,G 

Q4. When using Cisco WCS version 7.0, which two features are available for the client troubleshooting tool when a Cisco Compatible Extensions v5 wireless client gets connected? (Choose two.) 

A. Request CleanAir reports from the client 

B. Send text messages to the client 

C. Aggregated Cisco ACS authentication client information 

D. Request the client to ping the DHCP-supplied IP gateway 

E. Display a summary of client event history 

Answer: B,D 

Q5. Which open standard defines the combination of Extensible Authentication Protocol with Advanced Encryption Standard for providing strong wireless LAN client security? 

A. IEEE 802.1X 

B. IEEE 802.11i 

C. WEP 

D. WPA 

E. WPA2 

Answer:

Q6. A customer has completed the installation of an 802.11ac greenfield deployment at their corporate headquarters. They would like to leverage 802.11ac enhanced speeds on the trusted employee WLAN. In order to configure the employee WLAN, what Layer 2 security policies are valid? 

A. WPA2 (TKIP) 

B. WPA(AES) 

C. OPEN 

D. WEP 

Answer:

Q7. After installing a Cisco 5508 Wireless Controller using the default settings, how often will the RRM update occur? 

A. 30 seconds 

B. 60 seconds 

C. 300 seconds 

D. 600 seconds 

E. 3600 seconds 

F. 7200 seconds 

Answer:

Q8. What does RF determine? 

A. cycle pattern size 

B. how often a wave occurs 

C. signal size 

D. quantity of energy injected in a signal 

Answer:

Q9. Which option lists the key features of Cisco Compatible Extensions v5? 

A. Roaming and real-time diagnostics, MFP, a diagnostic channel that allows troubleshooting of the client, client reporting, optional location service, and expedited bandwidth 

B. AP assisted roam, Cisco Centralized Key Management, radio measurements, and transmit power control 

C. CAC, UPSD, voice metrics, MBSSIDs, location, link tests, and NAC 

D. WME, proxy ARP, EAP-FAST, and WPA2, and single sign-on 

E. LEAP, WPA, 802.1x and VLANs per AP, TKIP, and WiFi 

Answer:

Q10. Which statement describes a security weakness of a WPA2 with a PSK? 

A. The compromised key can be used for another connection. 

B. The key can be eavesdropped from the wireless medium. 

C. The key can be recreated from a few eavesdropped frames. 

D. The key is not case-sensitive and is vulnerable to compromise by brute-force methods. 

Answer:

Q11. All equipment is operational. Through which two methods can a wireless client receive an IP address when associating to the WLAN? (Choose two.) 

A. The clients can receive an IP address from SW1. 

B. Tie clients can receive an IP address from WLC1. 

C. The clients will not receive an IP address from either DHCP server because of overlapping address ranges. 

D. The clients can receive an IP address in a round-robin maner from either SW1 or WLC1. 

E. The clients can use a static IP address. 

Answer: B,E 

Q12. Refer to the exhibit. In an effort to identify RF characteristics at a customer location, an RF engineer uses the Spectrum Analyzer tool that is shown. Which feature that is native to the Spectrum Analyzer is identified by the exhibit? 

A. Real-Time FFT 

B. Duty Cycle 

C. Max Hold 

D. Time Domain 

Answer:

Q13. What 802.1x role is responsible for moving a port to the authorized state? 

A. Supplicant 

B. Authenticator 

C. Authentication Server 

D. RADIUS Server 

Answer:

Q14. To mitigate DoS attacks on a network, what security method should be implemented? 

A. WEP 

B. 802.1x 

C. Non-broadcast SSID 

D. Client MFP 

Answer:

Q15. Refer to the exhibit. 

You made a manual configuration change to a controller and now you need to compare the controller configuration seen on Cisco WCS to the configuration that is present in the controller. 

Which menu can you use to do compare the configurations? 

A. Reports 

B. Monitor 

C. Configure 

D. Services 

E. Administration 

F. Tools 

Answer:

START 200-355 EXAM