P.S. Practical 200-355 answers are available on Google Drive, GET MORE: https://drive.google.com/open?id=1mksJKkffHN_cNBtALTTES-TZic5MtSdG
Q3. A customer wants to deploy a mesh network with 2 root access points and 10 mesh access points. The root access points should be configured as which mode on the WLC?
A. mesh
B. FlexConnect
C. bridge
D. rouge detection
E. sniffer
Answer: C
Q4. A wireless engineer is designing the wireless networking for a company with offices in two different locations. Which two regulatory bodies should they check to find the maximum EIRP allowed? (Choose two.)
A. IEEE
B. FCC
C. ITU-R
D. ETSI
E. Wi-Fi Alliance
Answer: B,D
Q5. Which option is used to form the BSSID in a BSS?
A. AP radio MAC address
B. AP wired MAC address
C. AP serial number
D. client radio MAC address
E. client wired MAC address
F. client serial number
Answer: A
Q6. A customer has requested a single point of policy enforcement for LAN and WLAN. Which deployment model should be used?
A. converged
B. autonomous
C. FlexConnect
D. centralized
Answer: A
Q7. Which Cisco WLC command family can help to troubleshoot communication between an AP and the WLC?
A. (Cisco Controller) >debug capwap
B. (Cisco Controller) >debug ap
C. (Cisco Controller) >debug cac
D. (Cisco Controller) >debug dot11
Answer: A
Q8. A network engineer notices that two mesh APs are having problems communicating. After reviewing the current radio configurations, it is noted that one AP is transmitting at 3 mW while the other is transmitting at 60 mW. How many decibels would the 3-mW AP need its power increased to match the 60-mW AP?
A. 8
B. 12
C. 13
D. 20
E. 57
Answer: C
Q9. Strong security is required, but a centralized RADIUS authenticator has not been implemented.
Which two steps must you take to provide maximum security when using a pre-shared key? (Choose two.)
A. Change the TKIP on a weekly basis.
B. Use a key that includes mixed-case letters, numbers, and symbols with a length greater than 10 characters.
C. Use only with WPA and WPA2, following proper strong key guidelines.
D. Use the longest possible WEP key in your security policy.
Answer: B,C
Q10.
Refer to the exhibit. In an effort to identify RF characteristics at a customer location, an RF engineer uses the Spectrum Analyzer tool that is shown. Which feature that is native to the Spectrum Analyzer is identified by the exhibit?
A. Real-Time FFT
B. Duty Cycle
C. Max Hold
D. Time Domain
Answer: A
Q11. Which statement about customization of a web page that is used on a WLC to authorize guest users is true?
A. The administrator can use either a modified internal login page or the customized web page.
B. The administrator can use only the internal login page, and only the organization logo can be changed.
C. The administrator can use only the internal login page with a customized logo, headline,
and message.
D. The administrator can use only the customized web page that is uploaded to a WLC.
Answer: A
Q12.
Refer to the exhibit. Which two wireless functions is the client experiencing? (Choose two.)
A. Inter-controller Roaming
B. Intra-controller Roaming
C. Layer 2 Roaming
D. Layer 3 Roaming
E. Inter-subnet roaming
F. Re-authentication
Answer: B,C
P.S. Easily pass 200-355 Exam with Certifytools Practical Dumps & pdf vce, Try Free: https://www.certifytools.com/200-355-exam.html (433 New Questions)