200-355 Premium Bundle

200-355 Premium Bundle

Implementing Cisco Wireless Network Fundamentals Certification Exam

4.5 
(14040 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
April 16, 2024Last update

Cisco 200-355 Free Practice Questions

Q1. Which description best describes upfade in a multipath environment? 

A. In this situation, multiple signal paths are not sent at exactly the same time. The receiver receives a positive crest on the primary signal and a negative crest on the secondary signal. 

B. In this situation, the multiple signal paths are distorted and difficult to understand. 

C. In this situation, the multiple signal paths are weaker than they should be because the signals are out of phase with each other. 

D. In this situation, the signal is stronger than it should be because multiple signal paths are received twice at exactly the same time, which results in the multiple signals being in-phase. 

Answer:

Q2. You have brought your MacBook Pro running OS 10.6 to work and intend use the enterprise wireless network. This network is using EAP-FAST and 2.4 GHz for data and 5 GHz for VoWLAN. 

Which statement about the laptop configuration and wireless connection is true? 

A. Install a USB wireless adapter and configure 

B. Install Apple EAP-Fast plug-in and configure 

C. Install Cisco AnyConnect v2.4 and configure 

D. Configure Apple network preferences for EAP-FAST 

E. The laptop does not support EAP-FAST and will be unable to connect 

F. The laptop only supports 5 GHz and will be unable to connect 

Answer:

Q3. In a typical wireless network using WPA, WPA2 or VPN, why is it still possible for a rogue client to launch a DOS attack? 

A. WPA and WPA2 are not considered strong encryption algorithms and are easily cracked. 

B. 802.11 management frames are easily compromised. 

C. Cisco Compatible Extensions v5 are required with WPA, WPA2, or VPN to keep rogues from launching attacks in the wireless network. 

D. The message integrity check frames are never encrypted or authenticated, which allows rogues to spoof clients. 

Answer:

Q4. The administrator has noticed that the configuration on a controller is different than in Cisco WCS. How can the administrator fix this issue? 

A. The configuration can be copied from the controller to the Cisco WCS or from the WCS to the controller. 

B. The configuration can be copied only from the Cisco WCS to the controller. 

C. The configuration can be copied only from the controller to the Cisco WCS. 

D. The controller must be removed from the Cisco WCS and then added again. 

Answer:

Q5. An AP using version 7.0 MR1 broadcasts a Layer 3 CAPWAP discovery message on the local IP subnet. Which step does the AP take next? 

A. Determine if the controller responses include the primary controller. 

B. Determine if the controller responses include the master controller. 

C. Send a discovery request using DHCP option 43. 

D. Send a discovery request using DNS. 

E. Send a discovery request using locally stored information on the AP. 

F. Send a discovery request using OTAP. 

Answer:

Q6. Which two factors must be considered when evaluating an RF interferer for severity? (Choose two.) 

A. distance from the AP 

B. dBm 

C. the type of security crack being used 

D. duty cycle 

E. number of interfering IP stations in the cell 

F. duplicate SSID 

Answer: B,D 

Q7. Which type of basic radiation pattern does a Yagi antenna have? 

A. circular 

B. semicircular 

C. straight line 

D. cone 

Answer:

Q8. A client is deploying lightweight APs. Those with LAN connections to the controller would be considered what mode of deployment, while access points deployed across a higher latency connection are deployed in what mode? 

A. HREAP; Bridge 

B. Local; Bridge 

C. HREAP; Flex Connect 

D. Local; Flex Connect 

Answer:

Q9. Which Cisco AnyConnect module allows troubleshooting for core Cisco AnyConnect problems? 

A. telemetry 

B. web security 

C. VPN 

D. NAM 

E. DART 

F. posture 

G. CSSC 

Answer:

Q10. What must be done for Cisco WLC and Cisco WCS to communicate? 

A. The IP address and subnet mask of the Cisco WLC must be configured in the Cisco WCS. 

B. The IP address and subnet mask of the Cisco WCS must be configured in the Cisco WLC. 

C. The identity certificate of the Cisco WLC must be added to the Cisco WCS. 

D. The Cisco WLC and Cisco WCS must exchange identity certificates. 

Answer:

Q11. Which two destinations can Cisco WCS administrators specify for a scheduled report? (Choose two.) 

A. a file on the Cisco WCS 

B. a specified email address 

C. a specified World Wide Web server 

D. a TFTP server 

Answer: A,B 

Q12. Which CAPWAP AP management-access method is available as the default setting? 

A. only the console port 

B. the console port and SSH 

C. the console port, SSH, and HTTPS 

D. SSH only 

Answer:

Q13. A Cisco WCS administrator has marked an alarm as acknowledged. For how many days does Cisco WCS prevent the alarm from reappearing, even if the source of the alarm reoccurs? 

A. 1 

B. 7 

C. 10 

D. 30 

Answer:

Q14. Which two Cisco Unified Wireless Network capabilities use information that is provided by Radio Resource Management neighbor messages in version 7.0 MR1? (Choose two.) 

A. aggressive load balancing 

B. dynamic channel assignment 

C. hybrid remote edge access point 

D. inter-controller mobility (that is, mobility groups) 

E. rogue AP classification 

Answer: B,E 

Q15. Which Cisco AnyConnect module provides wireless connectivity? 

A. telemetry 

B. web security 

C. VPN 

D. NAM 

E. DART 

F. posture 

G. CSSC 

Answer:

START 200-355 EXAM