Q1. You are setting up a laptop to connect to the wireless network of your organization. The protocols that are used for the corporate network are WPA2 Enterprise, PEAP, and AES. Which three parameters do you need to configure in the Windows 7 wireless network properties for this connection? (Choose three.)
A. VLAN
B. encryption type
C. authentication method
D. VRF
E. security type
F. IP address
Answer: B,C,E
Q2. An engineer wants to set up guest wireless that requires users to log in via a splash page prior to accessing the network. Which authentication method should be configured?
A. LDAP
B. RADIUS
C. local authentication
D. WebAuth
E. PSK
Answer: D
Q3. What are two modules of the CCX Lite program? (Choose two.)
A. foundation
B. voice
C. RF power
D. roaming
Answer: A,B
Q4. Which two statements about beacon frames used by access points are true? (Choose two.)
A. They contain SSIDs if this feature is enabled.
B. They provide vendor proprietary information.
C. They are another name for an associated request.
D. They are sent in response to a probe frame.
E. They include ATIM window information for power save operations.
Answer: A,B
Q5. Which type of management tasks can be completed on a Cisco WLC remotely from a wireless client?
A. All management and configuration tasks can be performed from a wireless client except for using debug commands.
B. In the default configuration, no management or configuration is possible through the GUI or CLI on the Cisco WLC.
C. The default configuration of the Cisco WLC allows only CLI access and then only the use of show commands, so no configuration is possible.
D. All management and configuration tasks, except uploads from and downloads to the Cisco WLC, are permitted.
Answer: B
Q6. How can you protect the configuration file from eavesdropping, when uploading from a Cisco WLC?
A. Use the Configuration File Encryption option.
B. Choose an SCP as the transfer method.
C. Connect to the Cisco WLC by using HTTPS.
D. Connect to the Cisco WLC by using SSH.
Answer: A
Q7. Refer to the exhibit.
A customer has enabled the primary DNS server to return the correct controller IP address in response to a CISCO-CAPWAP-CONTROLLER.localdomain request coming from new access points associating to the wireless network. The access points seem to still be receiving the wrong IP address and cannot associate to the primary controller.
Why are the access points receiving the wrong IP information?
A. The DHCP option 43 has an incorrect controller IP address configured.
B. The DNS server must be configured to respond to CISCO-LWAPP-CONTROLLER.localdomain request.
C. The controller and wireless action point need to be Layer 2 adjacent.
D. The controller must be configured for DHCP option 15 request.
Answer: A
Q8. An engineer would like to setup secure authentication for a wireless network that will utilize single sign-on. Which two authentication methods can be used to accomplish this? (Choose two.)
A. LDAP
B. RADIUS
C. Local authentication
D. WEP
E. PSK
Answer: A,B
Q9. Which calculation computes the EIRP of an antenna?
A. EIRP = Tx power (dBm) + Antenna Gain (dBi) - Cable Loss (dB)
B. EIRP= Cable Loss (dB)+ Antenna Gain (dBi) - Tx power (dBm)
C. EIRP = Cable Loss (dB)+ Antenna Gain (dBi) / Tx power (dBm)
D. EIRP = Tx power (dBm) + Antenna Gain (dBi) / Cable Loss (dB)
E. EIRP = Antenna Gain (dBi) - Cable Loss (dB) * Tx power (dBm)
F. EIRP = Tx power (dBm) * Antenna Gain (dBi) / Cable Loss (dB)
Answer: A
Q10. Which three items are allowed on an Ethernet trunk port? (Choose three.)
A. autonomous AP
B. FlexConnect AP
C. local AP
D. monitor AP
E. rogue detector AP
F. sniffer AP
G. SE-Connect AP
H. Cisco WLC
Answer: A,B,E