Q1. Which protocol helps the administrator to determine whether a detected rogue AP is in the network of the organization?
A. RLDP
B. RCP
C. RDP
D. RAPP
Answer: A
Q2. A controller is connected to a Cisco Catalyst switch. The switch port configuration looks like this:
interface GigabitEthernet 1/0/10
switchport
switchport trunk encapsulation dot1q
switchport trunk allowed vlan 1,20,30,50
switchport trunk native vlan 20
switchport mode trunk
Which controller CLI command assigns its management interface to the native VLAN interface of the Cisco Catalyst switch?
A. config interface vlan management 0
B. config interface vlan management 1
C. config interface vlan management 20
D. config interface vlan management 30
E. config interface vlan management 50
Answer: A
Q3. The administrator needs to create a report that shows all controllers, APs, and Cisco 3300 Series MSEs in the WLAN, including hardware and software information. Which report includes this information?
A. Device > Inventory
B. Mesh > Nodes
C. Network Summary > Executive Summary
D. Network Summary > 802.11 Summary
Answer: A
Q4. RAG DROP
Answer:
Q5. A wireless engineer is designing the wireless networking for a company with offices in two different locations. Which two regulatory bodies should they check to find the maximum EIRP allowed? (Choose two.)
A. IEEE
B. FCC
C. ITU-R
D. ETSI
E. Wi-Fi Alliance
Answer: B,D
Q6. RAG DROP
Answer:
Q7. Which command path correctly describes how to access and troubleshoot clients with Cisco WCS version 7.0?
A. Tools > Clients > select displayed client's MAC address
B. Tools > Clients > enter client's MAC address
C. Monitor > Clients > click displayed client's MAC address
D. Monitor > Clients > enter client's MAC address
Answer: C
Q8. RAG DROP
Answer:
Q9. Microsoft Active Directory integrated machines are not authenticating to the internal WLAN. The WLAN settings are WPA2-AES-802.1x and are authenticating to a Cisco Identity Services Engine server. You investigate and note that non-domain authenticated machines are properly authenticating to the WLAN using their Active Directory credentials. Why would this problem occur?
A. The WLAN is configured improperly in group policy.
B. The ACS server is not joined to the domain, causing authentications to fail.
C. The domain machines are configured to disable the wireless adapter.
D. The non-domain machines are using local accounts that are not authenticated through the domain.
Answer: A
Q10. RAG DROP
Answer:
Q11. Refer to the exhibit. A network administrator is attempting to connect to the GUI of a WLC with interfaces as shown. Which IP address should the network administrator use?
A. 192.168.0.2
B. 192.168.1.2
C. 192.168.2.2
D. 192.168.3.2
E. 192.168.4.2
Answer: B
Q12. A WLAN deployment uses a combination of Cisco Aironet 1260 APs and multiple Cisco 5500 Wireless LAN Controllers to provide wireless LAN access to end-users. The network administrator has decided to use DHCP Option 43 to enable the APs to discover the wireless LAN controllers.
When configuring the DHCP scope, which format should be used for the Cisco WLC addresses?
A. a comma-separated ASCII string of Cisco WLC AP-manager addresses
B. a comma-separated ASCII string of Cisco WLC management addresses
C. a comma-separated ASCII string of Cisco WLC virtual IP addresses
D. a hexadecimal string of Cisco WLC AP-manager addresses
E. a hexadecimal string of Cisco WLC management addresses
F. a hexadecimal string of Cisco WLC virtual IP addresses
Answer: E
Q13. Which wireless topology supports roaming?
A. IBSS
B. BSS
C. ESS
D. bridging
Answer: C
Q14. After installing a Cisco 5508 Wireless Controller using the default settings, how often will the RRM update occur?
A. 30 seconds
B. 60 seconds
C. 300 seconds
D. 600 seconds
E. 3600 seconds
F. 7200 seconds
Answer: D
Q15. Which option lists the key features of Cisco Compatible Extensions v5?
A. Roaming and real-time diagnostics, MFP, a diagnostic channel that allows troubleshooting of the client, client reporting, optional location service, and expedited bandwidth
B. AP assisted roam, Cisco Centralized Key Management, radio measurements, and transmit power control
C. CAC, UPSD, voice metrics, MBSSIDs, location, link tests, and NAC
D. WME, proxy ARP, EAP-FAST, and WPA2, and single sign-on
E. LEAP, WPA, 802.1x and VLANs per AP, TKIP, and WiFi
Answer: A