200-355 Premium Bundle

200-355 Premium Bundle

Implementing Cisco Wireless Network Fundamentals Certification Exam

4.5 
(23670 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
April 20, 2024Last update

Cisco 200-355 Free Practice Questions

Q1. A customer has a corporate SSID that is configured to authenticate against an ACS server to validate client credentials on the corporate SSID. The customer has a firewall logically positioned on the network between the WLC and the ACS server in the network architecture. Which port must the firewall allow to ensure that authentication can occur? 

A. 43 

B. 1812 

C. 5146 

D. 8143 

Answer:

Q2. When deploying a Cisco Cloud Wireless Infrastructure, what two destination ports must be open? (Choose two.) 

A. TCP/5246 

B. UDP/5246 

C. TCP/5247 

D. UDP/5247 

E. TCP/7351 

F. UDP/7351 

G. TCP/7734 

H. UDP/7734 

Answer: F,G 

Q3. After you configure the Cisco 5508 Wireless Controller v7.6, a customer requests an SSID that allows for client web authentication with email input. Which authentication method should be used? 

A. pass-through 

B. authentication 

C. splash page web redirect 

D. conditional web redirect 

E. on MAC filter failure 

Answer:

Q4. To implement a more secure means of communication for voice and data, what technology successfully resists interference by utilizing a wider bandwidth than needed for the transmitting signal? 

A. Spread Spectrum 

B. Microwave 

C. Extended U-NII2 

D. ISM Bands 

Answer:

Q5. What protocol is used to determine the best pathway back to a root access point? 

A. CCKM 

B. WNMP 

C. AWPP 

D. LWAP 

Answer:

Q6. What is the IEEE name for a group of access points that are connected by using the Ethernet? 

A. ESS 

B. BSS 

C. IBSS 

D. ISS 

Answer:

Q7. How many RADIUS servers can be configured globally and per WLAN on a Cisco WLC version 7.0? 

A. 7 global; additional 1 per WLAN 

B. 7 global; additional 3 per WLAN 

C. 17 global; additional 1 per WLAN 

D. 17 global; additional 3 per WLAN 

E. 7 global; reuse of up to 1 maximum per WLAN 

F. 17 global; reuse of up to 1 maximum per WLAN 

G. 17 global; reuse of up to 3 maximum per WLAN 

Answer:

Q8. An AP has been configured for personal wireless access to the Internet. 

Which item should be configured on the wireless client? 

A. RF channel 

B. BSS 

C. PSK 

D. 802.1X/EAP 

E. broadcast SSID 

F. IBSS 

Answer:

Q9. An engineer is trying to determine from the controller CLI whether or not Telnet is enabled on the wireless controller. Which command can be entered to display this information? 

A. show network summary 

B. show aaa auth 

C. show radius summary 

D. show ldap statistics 

Answer:

Q10. You are setting up a laptop to connect to the wireless network of your organization. The protocols that are used for the corporate network are WPA2 Enterprise, PEAP, and AES. Which three parameters do you need to configure in the Windows 7 wireless network properties for this connection? (Choose three.) 

A. VLAN 

B. encryption type 

C. authentication method 

D. VRF 

E. security type 

F. IP address 

Answer: B,C,E 

Q11. Which two formats are supported for uploading background graphics to create a network map in Cisco WCS? (Choose two.) 

A. PNG 

B. JPEG 

C. DWG 

D. TIFF 

Answer: A,B 

Q12. An engineer would like to setup secure authentication for a wireless network that will utilize single sign-on. Which two authentication methods can be used to accomplish this? (Choose two.) 

A. LDAP 

B. RADIUS 

C. Local authentication 

D. WEP 

E. PSK 

Answer: A,B 

Q13. You are sitting in an airport preparing to use a free WLAN. When you look at the connections in your Windows 7 wireless client, you see a network name and three boxes with a yellow shield. 

What does this mean? 

A. You cannot connect to this WLAN. 

B. An open ad hoc network is nearby. 

C. The WLAN in the airport is open. 

D. A secure ad hoc network is nearby. 

E. A secure WLAN is in the airport. 

F. You must provide a username and password to access the WLAN in the airport. 

Answer:

Q14. Which option best describes the limitation of a client that is attempting to manage a WLC while using the client wireless adapter connection to the wireless infrastructure? 

A. Controllers must be managed using only secure protocols (that is, SSH and HTTPS), not nonsecure protocols (that is, HTTP and Telnet). 

B. Read-write access is not available; only read-only access is supported. 

C. Uploads and downloads from the controller are not allowed. 

D. Wireless clients can manage other controllers, but not the same controller and the AP to which the client is associated. 

Answer:

Q15. RAG DROP 

Answer:  

START 200-355 EXAM