200-355 Premium Bundle

200-355 Premium Bundle

Implementing Cisco Wireless Network Fundamentals Certification Exam

4.5 
(35055 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
April 20, 2024Last update

Cisco 200-355 Free Practice Questions

Q1. Which command path correctly describes how to access and troubleshoot clients with Cisco WCS version 7.0? 

A. Tools > Clients > select displayed client's MAC address 

B. Tools > Clients > enter client's MAC address 

C. Monitor > Clients > click displayed client's MAC address 

D. Monitor > Clients > enter client's MAC address 

Answer:

Q2. The network administrator wants an access point to be able to find rogue APs and to support location-based services. Which AP mode meets this requirement while having the radios up and preventing client connections? 

A. monitor 

B. sniffer 

C. rogue-detection 

D. H-REAP 

Answer:

Q3. What is the difference between the IEEE, the WiFi Alliance, and the FCC, ETSI, and TELEC? 

A. The IEEE and FCC are responsible for the standards that apply to wireless networks. The WiFi Alliance, ETSI, and TELEC are the governmental agencies that regulate compliance with local standards. 

B. The IEEE is responsible for Layer 1 and Layer 2 protocols. The WiFi Alliance is responsible for interoperability testing. The FCC, ETSI, and TELEC are responsible for radio frequency and transmission power-level regulations and standards in the U.S., Europe, and Japan. 

C. The IEEE is responsible for Layer 1 and Layer 2 protocols. The FCC, ETSI, and TELEC are responsible for interoperability testing and compliance. The WiFi Alliance is responsible for radio frequency and transmission power-level regulations and standards on a global basis. 

D. The IEEE and FCC are responsible for the Layer 3 protocol support and frequency and power-level regulations in the United States. ETSI and TELEC are responsible for frequency and power-level regulations in Europe and Japan. The WiFi Alliance is responsible to interoperability testing. 

Answer:

Q4. Which two factors must be considered when evaluating an RF interferer for severity? (Choose two.) 

A. distance from the AP 

B. dBm 

C. the type of security crack being used 

D. duty cycle 

E. number of interfering IP stations in the cell 

F. duplicate SSID 

Answer: B,D 

Q5. An engineer wants to set up guest wireless that requires users to log in via a splash page prior to accessing the network. Which authentication method should be configured? 

A. LDAP 

B. RADIUS 

C. local authentication 

D. WebAuth 

E. PSK 

Answer:

Q6. Refer to the exhibit. An engineer is configuring a SSID to utilize the management interface on the WLC. The management interface is configured with an untagged VLAN in the wireless controller interface settings. The controller is connected to a neighboring switch via the interface shown in the diagram. 

Which VLAN will traffic coming from the newly created SSID use to traverse the wired network? 

A. 1 

B. 20 

C. 44 

D. 50 

Answer:

Q7. You are setting up a laptop to connect to the wireless network of your organization. The protocols that are used for the corporate network are WPA2 Enterprise, PEAP, and AES. Which three parameters do you need to configure in the Windows 7 wireless network properties for this connection? (Choose three.) 

A. VLAN 

B. encryption type 

C. authentication method 

D. VRF 

E. security type 

F. IP address 

Answer: B,C,E 

Q8. Which three severity levels are in the Cisco WCS alarm dashboard? (Choose three.) 

A. Critical 

B. Flash 

C. Major 

D. Minor 

E. Trivial 

F. Urgent 

Answer: A,C,D 

Q9. What WCS report displays hardware type, software distribution, and CDP information? 

A. Device > AP Profile Status 

B. Device > AP Summary 

C. Network Summary > Executive Summary 

D. Device > Inventory 

E. Network Summary > 802.11n Summary 

Answer:

Q10. Which Cisco AnyConnect module allows you to set the parameters that are needed to connect to the wireless network? 

A. NAM 

B. DART 

C. posture 

D. telemetry 

Answer:

Q11. An enterprise needs their iPhones to connect to the EAP-TLS network. How should the devices be configured? 

A. push profile and certificate through Configuration Utility 

B. configure directly through Settings application 

C. email certificate to device then configure through Settings application 

D. download certificate from web page then configure through Settings application 

E. push profile and certificate through iTunes 

Answer:

Q12. What is an MBSSID? 

A. a virtual AP configured on a physical AP that share a single physical device, which is one half-duplex radio 

B. a set of physical APs configured in a BSA to form cells that are controlled by a single controller 

C. the group of clients that are allowed to gain access to one or more SSIDs configured in an AP 

D. the identified overlap area between two cells, which identifies the clients that are operating in that area at any given time 

Answer:

Q13. What is a function of the service port on a WLC? 

A. controls mobility manager communications on all physical ports 

B. controls out-of-band management for system recovery and maintenance 

C. controls communication with Cisco Aps 

D. controls communications for all physical ports 

Answer:

Q14. The network administrator receives complaints of slow wireless network performance and performs a sniffer trace of the wireless network in preparation for migration to 802.11n. The sample capture shows frames that contains AP beacons with NonERP_Present bit set to 1 and frames with RTS/CTS. 

Which two conclusions can be interpreted from these frames? (Choose two.) 

A. The network is performing slowly because 802.11n clients are already mixed with 802.11g clients. 

B. The network is performing slowly because 802.11b clients still exist in the network. 

C. The network is performing slowly because a wireless client is incorrectly configured, which results in RF interference. 

D. Possible 802.11b wireless clients are located only in the AP cell radius where the sniffer capture was performed. 

E. Possible 802.11b wireless clients could be located anywhere in the wireless network. 

Answer: B,E 

Q15. Old 2.4-GHz wireless laptops are unable to connect. What is the most likely cause of this problem? 

A. WLAN > General properties are incorrectly configured. 

B. WLAN > QoS properties are incorrectly configured. 

C. WLAN > Security properties are incorrectly configured. 

D. WLAN > Advanced properties are incorrectly configured. 

E. Wireless > AP > 802.11 b/g/n AP is incorrectly configured. 

F. Wireless > AP > 802.11 b/g/n > Network is incorrectly configured. 

Answer:

START 200-355 EXAM