• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/116

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

116 Cards in this Set

  • Front
  • Back
For the following items ,which one correctly describes fading?

A. A function of the frequency and should be provided in the cable specification by the vendor.

B. Another signal source is producing energy on the channel in which you are trying to operate.

C. A time-varying change in the path loss of a link with the time variance governed by the movement of objects in the environment, including the transmitter and receiver themselves.

D. The desired signal reaches the receiving antenna via multiple paths, each of which has a different
propagation delay and path loss.
Answer: C
Observe the following statements, which limitation applies to the use of the Cisco WLAN Solution Management over Wireless feature?

A. Read-write access is not available; only read-only access is supported.

B. Controllers must be managed using only secure protocols (that is, SSH and HTTPS), not nonsecure
protocols (that is, HTTP and Telnet).

C. Uploads and downloads from the controller are not allowed.

D. Wireless clients can manage other controllers however not the same controller and AP to which the client is associated.
Answer: C
As a network technician ,you must know CiscoWiSMs . Up to how many CiscoWiSMs are supported in a single mobility group operating under v5.0 code?

A. 16
B. 12
C. 24
D. 5
Answer: B
You work as a network technician at Cisco.com, read this subject carefully ,then answer the question.
The existing Cisco Unified Wireless Controller is running v5.0 code for both the controllers and the Cisco
WCS. A controller has been configured with an appropriate rogue rule condition to report discovered APs to the Cisco WCS.What default alarm level is used to display all rogue APs in the Alarm Summary?

A. Major
B. Critical
C. Flash
D. Minor
Answer: D
What are the four types of wireless networks?(Choose four)

A. Wireless PAN
B. LAN
C. MAN
D. VLAN
E. WAN
Answer: ABCE
Cisco Client Management Frame Protection is running on a mobility group with two controllers. For the
following options ,which two MFP requirements protect the network? (Choose two.)

A. requires the use of a nonbroadcast SSID

B. requires CCXv5

C. implements the validation of wireless management frames

D. forces clients to authenticate, using a secure EAP method only
Answer: BC
What happens when client exclusion is enabled with a timeout value of zero ?

A. Clients are excluded indefinitely.

B. Client exclusion is disabled.

C. Clients are never excluded.

D. Clients must be explicitly included by specifying the MAC address.
Answer: A
The central office is currently using a combination of 4400 and 2100 series WLAN controllers running
v4.2 and a variety of LWAPP-enabled access points servicing both 2.4 GHz and 5 GHz. The WLAN deployment has been extended to each remote office by implementing a 526 WLAN controller running v4.1
and several 521 access points. Wireless client deployment uses EAP-TLS authentication by use of a
centralized RADIUS server plus 802.11n for performance. After the first remote office deployment, remote office users complain that they are not connecting via 802.11n.
Which will most likely cause this problem?

A. The 521 AP does not support 5 GHz, which prohibits 802.11n.

B. The 521 AP and 526 WLAN controllers do not support AES, which prohibits 802.11n.

C. The 526 WLAN controller does not support external authentication via RADIUS, prohibiting
authentication.

D. The 526 WLAN controller does not support 802.11n with either v4.1 or v4.2.
Answer: D
How do the characteristics that are available on the Cisco WCS for Linux version differ from those of the
Cisco WCS for Windows version?

A. Cisco WCS for Linux is required for deployments.

B. Assuming that there are no differences in hardware, a Cisco WCS for Linux can support up to 750 wireless LAN controllers. A Cisco WCS for Windows can support up to 250 wireless LAN controllers.

C. Cisco WCS for Windows includes support for Cisco Spectrum Expert clients. Cisco WCS for Linux does not support Cisco Spectrum Expert clients.

D. There are no differences in features between the Linux and Windows versions of Cisco WCS.
Answer: D
What is the typical maximum range of a wireless PAN?

A. 45 feet
B. 50 feet
C. 55 feet
D. 60 feet
Answer: B
Which one of the following CLI commands displays the controller configuration in a way that is similar to
the way that it is shown on Cisco IOS routers?

A. show run-config
B. show config
C. show run config
D. show running-config
Answer: D
Observe the following attacks, which two does Management Frame Protection help to mitigate?
(Choose two.)

A. War Driving
B. Man-in-the-Middle
C. Eavesdropping
D. Denial of Service
Answer: BD
Which device(s) will Lightweight access points send control traffic to?

A. The Wireless Control System.
B. Other access points.
C. The Wireless Controller.
D. Lightweight access points don't send control traffic.
Answer: C
For the following elements ,which three define the 802.11n implementation of MIMO? (Choose three.)

A. Channel Bonding
B. Maximal Ratio Combining
C. Spatial Multiplexing
D. Transmit Beam Forming
Answer: BCD
True or false: A wireless PAN consumes little power from small handheld computer devices.

A. True
B. false
Answer: A
In the AP Layer 3 controller discovery process, after the LWAPP Discovery Request is broadcast on a local subnet, which action will AP take next?

A. Send an LWAPP response to the master controller if known.

B. Send an LWAPP discovery request to controllers learned via OTAP if operational.

C. Wait 5 seconds and resend a Discovery Request to the local subnet.

D. Determine whether the controller responses are the primary controller.
Answer: B
Which three values will be used to calculate Effective Isotropic Radiated Power? (Choose three.)

A. antenna bandwidth
B. antenna gain
C. cable loss
D. transmission power
Answer: BCD
When importing a single campus map into the Cisco WCS 5.0, which four file formats will be used?
(Choose four.)

A. BMP
B. PNG
C. GIF
D. JPEG
E. JPG
Answer: BCDE
You are a network engineer at Cisco.com, When creating a wireless profile in the Cisco ADU and you have selected the WPA/WPA2/CCKM radio button option, what other decision will you make and then configure on this same screen?

A. the SSID of the wireless client

B. the length and value of the pre-shared key

C. the EAP type to be used for authentication

D. the encryption type
Answer: C
What is a common standard for wireless LANs?(Choose two)

A. IEEE 802.11
B. IEEE 802.3z
C. Wi-Fi
D. IEEE 802.16
Answer: AC
Match the proper relationship between interface description and the appropriate.
1. Designed to be analogous to VLANs for wireless LAN client device
2. The only port that is active when the controller is in boot mode
3. This interface is the only consistently*pingable* in-band interface IP address on the Cisco WLC
4. Used for Layer 3 communications between the Cisco WLC and the lightweight access points
5. Used to support mobility management. DHCP relay, and guest web authencation.
I.AP Manager
II.Dynamic
III.Management
IV.Service Port
V.Virtual

A. I-4,II-1,III-5,IV-2,V-3
B. I-4,II-1,III-2,IV-5,V-3
C. I-4,II-1,III-5,IV-3,V-2
D. I-4,II-1,III-2,IV-3,V-5
Answer: A
Which roaming situation using controllers in a Cisco Unified Wireless Network requires a client by use of WPA2 with PKC to reauthenticate to the network?

A. A wireless client roams to another AP on the same controller.

B. A wireless client roams to another AP after being out of range of the network for 2 minutes.

C. A wireless client roams to another AP on a different controller in the same mobility domain.

D. A wireless client roams to another AP on a controller in a different mobility domain.
Answer: D
Which three methods of authentication are usually used in enterprise wireless networks? (Choose three.)

A. AES
B. CCKM
C. PEAP
D. EAP-FAST
E. EAP-TLS
Answer: CDE
You are a network technician at Cisco.com ,study the options carefully.A client is attached to the Cisco Unified Wireless network by use of controllers. When the client is using WPA2 and EAP authentication,
where are the wireless encryption keys located during the active user session? (Choose two.)

A. on the client
B. on the Cisco WCS
C. on the RADIUS server
D. on the access point
Answer: AD
What relatively new standard applies to wireless MANs?

A. IEEE 802.11
B. IEEE 802.3z
C. Wi-Fi
D. IEEE 802.16
Answer: D
Which statement best describes an infrastructure basic service set according to IEEE 802.11
specifications?

A. No relaying of signals from one client to another client.

B. Also called an Ad Hoc Network.

C. Enables the use of ESS.

D. The BSSID is generated from the first wireless client that starts up in the IBSS.
Answer: C
Which of the following items increases bandwidth and resists multipath problems by carrying data in subcarriers?

A. Narrow Band Frequency

B. Direct Sequence Spread Spectrum

C. Frequency Hopping Spread Spectrum

D. Orthogonal Frequency Division Multiplexing
Answer: D
In which format are the files saved ,when creating new configuration profiles in Cisco Secure Services
Client?

A. .TXT
B. .RTF
C. .HTML
D. .XML
Answer: D
A controller is connected to a Cisco IOS Catalyst switch. The following is the switch port configuration:
interface GigabitEthernet 1/0/10
switchport
switchport trunk encapsulation dot1q
switchport trunk allowed vlan 1,20,30,50
switchport trunk native vlan 20
switchport mode trunk
Which one of the controller CLI commands assigns its management interface to the Cisco IOS Catalyst switch native vlan interface?

A. config interface vlan management 0

B. config interface vlan management 20

C. config interface vlan management 30

D. config interface vlan management 1
Answer: A
True or false: A computer device stores data in analog form.

A. True
B. false
Answer: B
Which two statements correctly describe beacon frames used by access points? (Choose two.)

A. provides vendor proprietary information

B. contains SSIDs if this feature is enabled

C. sent in response to a probe frame

D. is another name for an associated request
Answer: AB
What is the reason that Cisco recommends using Tftpd32 version 3.0 or later when upgrading wireless
LAN controller software to release 4.1 or later?

A. Tftpd32 is Cisco Compatible Extensions version 4 compliant

B. Tftpd32 supports TFTP file transfers larger than 32 MB

C. Tftpd32 is a component of CiscoWorks LMS

D. Tftpd32 supports EoIP tunneling which is required for remote Cisco WLC upgrades
Answer: B
For the following options, which set of commands assigns a standalone access point an IP address of
10.0.0.24 with a 27-bit subnet mask and a gateway of 10.0.0.1?

A. config t
interface Dot11Radio0
ip address 10.0.0.24 255.255.255.224
exit
ip default-gateway 10.0.0.1

B. config t
interface BVI1
ip address 10.0.0.24 255.255.255.224
exit
ip default-gateway 10.0.0.1

C. config t
interface BVI1
ip address 10.0.0.24 255.255.255.192
exit
ip default-gateway 10.0.0.1

D. config t
interface FastEthernet1
ip address 10.0.0.24 255.255.255.224
exit
ip default-gateway 10.0.0.1
Answer: B
If you have the Cisco ADU installed but wish to use the Windows Zero Config utility to configure a
wireless network profile, which action should you take first?

A. Uninstall the Cisco ADU.

B. Define a common profile in both the Cisco ADU and WZC.

C. In the WZC utility, make sure that the box labeled "Use Windows to configure my Wireless Network
Settings" is checked.

D. Define the wireless profile in the Wireless Networks tab in WZC.
Answer: C
On what layers of the OSI reference model do wireless networks operate?(Choose two)

A. Physical layer
B. Network layer
C. data link layer.
D. session layer
Answer: AC
How to differ application-specific devices from laptop computers in the way they support Cisco
Compatible Extensions?

A. There is no differentiation. ASDs and laptops must both support the same CCX features.

B. ASDs are required to support only CCXv1 and v2 features. Laptops must support all CCX features.

C. Several features that are required for laptops are not required for ASDs.

D. ASDs are required to support only CCXv5 management features, while laptops are optional features.
Answer: C
When choosing an EAP type for your Cisco ADU security profile, in order to authenticate
successfully ,what must you ensure?

A. that the time set on the clocks for the wireless client and the authenticator are close to the same time

B. that the client and authentication server support the same encryption protocol

C. that the EAP type that you selected is supported by the authentication server

D. that the EAP type selected is known not to exchange any of its credentials in the clear
Answer: C
EAP-FAST is an authentication protocol that creates a secure tunnel without using certificates.
EAP-FAST was first supported where?

A. CCXv4
B. CCXv1
C. CCXv3
D. CCXv2
Answer: C
For the following items ,which is derived from measuring the RF duty cycle?

A. LWAPP header length
B. dynamic channel selection
C. RF utilization
D. transmit power control
Answer: C
RF signals offer relatively short range as compared to light signals. True or false?

A. True
B. false
Answer: B
Which security benefit is enabled by use of Management Frame Protection?

A. Prevents the formation of client ad hoc networks within the RF coverage domain.

B. Protects the network infrastructure from denial-of-service attacks that attempt to flood the network with
associations and probes.

C. Detects network reconnaissance probes, like those used by tools like NetStumbler, that attempt to
discover the wireless network topology.

D. Provides encryption of administrator sessions between a wireless client and a wireless LAN controller.
Answer: B
Observe the following items carefully, In 802.1X, which is the supplicant?

A. the device that performs the authentication

B. the point of access

C. the machine that attempts to access the network

D. the machine in the network that keeps a list of conditions
Answer: C
Which three primary components describe TKIP? (Choose three.)

A. Message Integrity Check
B. Dynamic WEP
C. Per-Packet Key Hashing
D. Broadcast Key Rotation
Answer: ACD
802.1X defined which three roles? (Choose three.)

A. Authenticatee
B. AAA Server
C. Authentication Server
D. Supplicant
E. Authenticator
Answer: CDE
Spread spectrum generally requires user licenses. True or false?

A. True
B. false
Answer: B
Which one of the following CLI commands would be used on a Cisco WLC to troubleshoot mobility,
rogue detection, and load-balancing events?

A. debug dot11
B. debug lwapp
C. show dot11 details
D. show lwapp details
Answer: A
Examine the following items carefully, which three Cisco Unified Wireless Network capabilities use
information that Radio Resource Management neighbor messages provide? (Choose three.)

A. Aggressive Load Balancing

B. Over-the-Air Provisioning

C. Hybrid Remote Edge Access Point

D. Inter-controller Mobility (that is, Mobility Groups)

E. Rogue AP Classification

F. Dynamic Channel Assignment
Answer: BEF
What is the effect of configuring a single SSID to simultaneously support both TKIP and AES
encryption?

A. This is a common configuration for migrating from WPA to WPA2. There is no problem associated with
using this configuration.

B. Some wireless client drivers might not handle complex SSID settings and may be unable to associate to the WLAN.

C. The overhead associated with supporting both encryption methods will significantly degrade client throughput.

D. This is an unsupported configuration and the Cisco Wireless Control System will continuously generate
alarms until the configuration is corrected.
Answer: B
For the following items ,which is the Default Local Database size for authenticating local users?

A. 512 entries
B. 4096 entries
C. 1024 entries
D. 2048 entries
Answer: A
Which statement is true about the authorization aspect of AAA?

A. Authorization takes place after a successful authentication and provides the Cisco WLC the information needed to allow client access to network resources.

B. Successful authorization will provide encryption keys that will be used to secure the wireless
communications between client and AP.

C. Authorization is the validation of successful DHCP address delivery to the wireless client.

D. Authorization must be successfully completed in order to proceed with the authentication phase.
Answer: A
Which two descriptions are correct about LWAPP? (Choose two.)

A. communication between the AP and the WLC

B. Lightweight Access Point provisioning

C. Cisco proprietary

D. communication between the AP and client
Answer: AC
Which type of Extensible Authentication Protocol is supported by the Cisco Unified Wireless Network?

A. LEAP and EAP-FAST only

B. EAP-TLS, PEAP-MSCHAPv2 and PEAP-GTC only

C. EAP-TLS, PEAP-MSCHAPv2, PEAP-GTC, LEAP, EAP-FAST only

D. Any EAP supported by the RADIUS authentication server
Answer: D
Observe the following options, can you tell me which modulation technique allows you to achieve a data rate of 54Mb/s in the 2.4GHz-band?

A. Differential Binary Phase Shift Keying

B. Differential Quadrature Phase Shift Keying

C. Complimentary Code Keying

D. Quadrature Amplitude Modulation
Answer: D
What is the general maximum coverage area of a wireless PAN?

A. Within 30 feet
B. Within 35 feet
C. Within 40 feet
D. Within 45 feet
Answer: A
Omni antennas are very easy to install. How are omni antennae in a wireless network most commonly
polarized?

A. horizontally
B. circularly
C. vertically
D. both horizontally and vertically
Answer: C
As a network technician ,can you tell me which two services are offered on Cisco Unified Wireless
Networks running controller v5.0 but not offered on Cisco Mobility Express Solution by use of 526
controllers with v4.2 code? (Choose two.)

A. GUI management
B. Authentication using 802.1X
C. Guest access
D. Location services
E. IDS/IPS
Answer: DE
During the WPA authentication process, which key is the 4-way handshake used to establish?

A. Pairwise Session Key
B. Pairwise Master Key
C. Pairwise Multiple Key
D. Pairwise Transient Key
Answer: D
Which condition must exist in order to seamlessly roam between two wireless cells in a Cisco Unified
Wireless Network using controllers?

A. The client's password must be the same on both APs.

B. The next cell should be on the same channel as the client's current cell.

C. The wireless client must use an EAP authentication method with the infrastructure authenticator.

D. The next cell should provide the same SSID as the client's current cell.
Answer: D
Which IEEE standards group uses Bluetooth as the basis for the standard?

A. IEEE 802.15
B. IEEE 802.11
C. IEEE 802.13
D. IEEE 802.16
Answer: A
RRM plays a critical role in optimizing, fairly allocating and adaptively reusing the scarce resources in wireless communication. Which two tasks does RRM routinely perform? (Choose two.)

A. antenna selection
B. AP address assignment
C. transmit power control
D. encryption method assignment
E. channel assignment
Answer: CE
Which four parameters need to be configured for local EAP-FAST on the controller? (Choose four.)

A. Server Key
B. TTL for PAC
C. Client Key
D. PAC
E. Authority ID
F. Authority ID Information
Answer: ABEF
More often than not, what is the difference in transmit power between an AP operating at Tx Power
Level 1 and the same AP operating at Tx Power Level 3?

A. 11 dB
B. 2 dB
C. 6 dB
D. 3 dB
Answer: C
Which governing body analyzes the applications and environments in which wireless networks are
used?

A. FCC
B. EIRP
C. ETSI
D. IEEE
Answer: D
In what frequency band does Bluetooth operate?

A. 2.2 GHz
B. 2.4 GHz
C. 2.6 GHz
D. 3.0 GHz
Answer: B
When using the enterprise-based authentication method for WPA2, a bidirectional handshake
exchange occurs between the client and the authenticator. Which five options will be the results of that
exchange by use of controller based network?

A. proof that each side is alive

B. creation of the Pairwise Transient Key

C. distribution of the Group Transient Key

D. binding of a Pairwise Master Key at the client and the controller

E. a bidirectional exchange of a nonce used for key generation
Answer: ABCDE
Which four features are of WPA? (Choose four.)

A. unicast and broadcast key management

B. authenticated key management using 802.1X

C. a message integrity check protocol to prevent forgeries

D. support for a key caching mechanism

E. a larger initialization vector, increased to 48 bits
Answer: ABCE
Which two actions will you take to begin to troubleshoot an access point that fails to successfully join a
wireless LAN controller? (Choose two.)

A. SSH to the Cisco WCS

B. SSH to the AP

C. Cisco WLC command: debug lwapp events enable

D. SSH to the Cisco WLC
Answer: CD
ETSI produces globally-applicable standards for Information and Communications Technologies (ICT).
What does the current European Telecommunications Standards Institute rule state is the 2.4-GHz
maximum transmitter output power for point-to-point installations?

A. 20 dBm
B. 17 dBm
C. 30 dBm
D. 16 dBm
Answer: B
A Bluetooth-enabled device is always transmitting. True or false?

A. True
B. false
Answer: B
The office is now operational using one 2106 WLAN controller with six 1131 APs and one 526 WLAN
controller with three 521 APs.When the 526 loses power, the 521 APs do not build up a connection with the 2106 WLAN controller. What will most likely cause this problem?

A. The 2106 controller and 526 controller do not share the same mobility group name.

B. The 521 APs were not configured with the 2106 controller as the secondary controller.

C. The 2106 controller and 526 controller were not configured correctly using the sysname and MAC address for a mobility group.

D. The 2106 controller does not support the 521 APs.
Answer: D
Which CLI command will be used on the Cisco WLC to show detailed information for a client related to a
lightweight access point?

A. show exclusionlist
B. debug dot11
C. show client detailed
D. show arp switch
Answer: C
Which two attributes are used to characterize antenna performance? (Choose two.)

A. harmony
B. gain
C. beamwidth
D. attenuation
Answer: BC
For the following interfaces ,which one is considered a dynamic interface?

A. the LAG interface
B. the AP manager interface
C. the virtual interface
D. a WLAN client data interface
Answer: D
What is the highest possible data rate of an IrDA device?

A. 2 Mbps
B. 4 Mbps
C. 6 Mbps
D. 8 Mbps
Answer: B
Which statement is true about the procedure for a lightweight AP to successfully establish a connection
to a controller?

A. AP sends its certificate to the RADIUS server. AP then authenticates the controller certificate as valid.

B. AP sends its certificate to the controller. AP then authenticates the received Cisco WLC certificate as valid.

C. AP sends its certificate to the RADIUS server. AP then authenticates the RADIUS certificate as valid.

D. AP authenticates the received Cisco WLC certificate as valid. AP then sends its certificate to the
controller.
Answer: B
Which of the following options has Bluetooth RF characteristics?

A. frequency hopping - 5-GHz range

B. continuous transmitting - 5-GHz range

C. continuous transmitting - 2.4-GHz range

D. frequency hopping - 2.4-GHz range
Answer: D
Which description is correct about an Ad Hoc Network?

A. Mesh Network
B. Basic Service Set
C. Independent Basic Service Set
D. Extended Service Set
Answer: C
Which command path is correct regarding how to access the Cisco WCS 5.0 ability to troubleshoot
clients?

A. Monitor -> Clients -> select displayed client's MAC address

B. Tools -> Clients -> select displayed client's MAC address

C. Tools -> Clients -> enter client's MAC address

D. Monitor -> Clients -> enter client's MAC address
Answer: D
WEP is a mandatory encryption mechanism. True or false?

A. True
B. false
Answer: B
What two statements best describe AES-CCMP? (Choose two.)

A. It is required in WPA2.

B. It is required in WPA.

C. It is defined in 802.1X.

D. It is the encryption algorithm used in TKIP implementations.

E. It is an encryption algorithm used in the 802.11i security protocol.
Answer: AE
As a network technician, can you tell me when would rate shifting down by a client occur?

A. when the distance to the AP has increased and the missed-symbol rate has increased

B. when the noise level has decreased and the signal level has increased

C. when the distance to the AP has increased and the signal level has increased

D. when multipath has decreased and the missed-symbol rate has decreased
Answer: A
By doing what is the configuration of a wireless LAN controller as a RADIUS client ensured?

A. implementing an EAP exchange between the CiscoSecure RADIUS server and the controller

B. using an encrypted tunnel between the CiscoSecure RADIUS server and the controller

C. defining a RADIUS server secret at both the CiscoSecure RADIUS server and the controller

D. adding the MAC address of the physical port of the controller into the trusted client table of the
CiscoSecure RADIUS server
Answer: C
For the following physical layer encoding technologies, which one is common to both the IEEE
802.11g and the IEEE 802.11a standards?

A. DSSS
B. BPSK
C. CCK
D. OFDM
Answer: D
In what frequency band does 802.11a operate in?

A. 2.2 GHz
B. 2.4 GHz
C. 2.6 GHz
D. 5 GHz
Answer: D
Which primary methods is of configuration management for the Mobility Express Solution?

A. CLI and Web GUI
B. CCA and Web GUI
C. CCA and CLI
D. CLI, Web GUI, and CCA
Answer: B
On a Cisco Unified Wireless Controller, which three Access Point modes allow for client connectivity? (Choose three.)

A. Local Mode
B. Bridge Mode
C. H-REAP Mode
D. Monitor Mode
Answer: ABC
What information is needed to add a Cisco WLC into the Cisco WCS?

A. IP address of virtual interface

B. IP address of AP manager interface

C. IP address of management interface

D. IP address of service port
Answer: C
Observe the following items, which open standard defines the combination of Extensible Authentication
Protocol with Advanced Encryption Standard to provide strong wireless LAN client security?

A. WEP
B. IEEE 802.11i
C. WPA
D. IEEE 802.1X
Answer: B
How many non-overlapping channels are available with 802.11b wireless LANs?

A. One
B. Two
C. Three
D. Four
Answer: C
What is the reason that wireless analog video signals that are operating in the 2.4-GHz band are
particularly harmful to Wi-Fi service?

A. Analog Video modulation is the same as Wi-Fi and causes interference.

B. Analog video is a constant signal with 100% duty cycle.

C. Analog video is a strong signal and increases the SNR.

D. Analog video signals are slow frequency hopping and tend to affect the entire band.
Answer: B
One of the advantages of implementing EAP-FAST is that it is not necessary to implement which item as part of your authentication infrastructure?

A. a RADIUS server

B. a Certificate Authority infrastructure

C. a client that supports EAP-FAST

D. an access control server
Answer: B
An indoor 1240 AP is booting and has obtained an IP address by use of DHCP. The AP has confirmed
prior controller IP addresses from a previously joined mobility group stored in NVRAM.Which action will AP take next?

A. DHCP option 43.

B. Layer 2 LWAPP discovery broadcast.

C. Layer 3 LWAPP discovery broadcast.

D. DNS resolution of CISCO-LWAPP-CONTROLLER.localdomain.
Answer: A
You work as a network engineer at Cisco.com, study the subject carefully.AWLAN deployment will use a combination of Cisco Aironet AP 1240s and multiple Cisco 4404 Wireless LAN Controllers to provide
wireless LAN access to end-users. The network administrator has decided to use DHCP Option 43 to
enable the APs to discover the wireless LAN controllers. When configuring the DHCP scope, which format should be used for the Cisco WLC addresses?

A. a comma-separated ASCII string of Cisco WLC virtual IP addresses

B. a comma-separated ASCII string of Cisco WLC AP-manager addresses

C. a comma-separated ASCII string of Cisco WLC management addresses

D. a hexadecimal string of Cisco WLC management addresses
Answer: D
True of false: 802.11g operates at up to 54 Mbps and interoperates with 802.11b.

A. True
B. false
Answer: A
Which maximum number is of lightweight APs that can be supported from a single Cisco WCS
Navigator management console with Cisco WCS and Cisco WLC running v5.0 code?

A. 20,000
B. 5,000
C. 10,000
D. 30,000
Answer: D
A lightweight AP has been deployed in local mode in a network consisting of 10 wireless LAN controllers
in a single mobility group. The AP has been configured to use primary, secondary, and tertiary WLCs.
Because of a major power failure, the AP's primary, secondary, and tertiary Cisco WLCs are all unavailable.
Which action will be taken next by the AP?

A. The AP will attempt to join the Cisco WLC with the greatest amount of available capacity.

B. The AP will attempt to join a Cisco WLC configured as a "Master Controller."

C. The AP state will transition to AP Fallback Mode and continue providing limited WLAN services (that is, no new client authentications) until a WLC is again available.

D. The AP will reboot and repeatedly attempt to join the configured primary, secondary, and tertiary Cisco WLCs in that order. The process will continue until one of the configured WLCs is again available.
Answer: B
Which two functions are the pre-shared key used for when using the Pre-Shared Key authentication
method for WPA or WPA2? (Choose two.)

A. to derive the nonce at each side of the exchange

B. to derive the Pairwise Transient Key

C. to act as the Group Transient Key during the bidirectional handshake

D. to act as the Pairwise Master Key during the bidirectional handshake
Answer: BD
Which client application utility allows wireless configuration on Linux platforms?

A. Cisco Secure Services Client
B. Airport Extreme
C. Cisco Aironet Desktop Utility
D. NetworkManager
Answer: D
Which 802.11 frequencies are available almost worldwide?

A. 2.2 GHz
B. 2.4 GHz
C. 2.6 GHz
D. 5 GHz
Answer: B
Which authentication method best supports a large enterprise deployment where over the air security is a necessity?

A. PSK with WEP

B. WPA with PSK

C. Open Authentication with Web Authentication

D. WPA2 with EAP-FAST
Answer: D
Which three elements compose the Cisco Secure Services Client suite? (Choose three.)

A. Cisco Secure Services Client Administration Utilities

B. Cisco Secure Services Client

C. Cisco Secure Services Client
Auditor

D. Cisco Secure Services Client Log Packager
Answer: ABD
Which one of the following items applies to TKIP?

A. is used to encrypt a WEP authenticated session

B. is part of the initial key exchange used to derive a pairwise temporal key

C. is used to encrypt the data for WPA sessions

D. is used to secure the initial authentication credential exchange between client and authenticator
Answer: C
Cisco wireless requires that controllers within a mobility group have which three common
characteristics? (Choose three.)

A. controllers must be in the same subnet

B. virtual interface IP address

C. mobility group name

D. version of controller code
Answer: BCD
A learning bridge forwards all packets. True or false?

A. True
B. false
Answer: B
Which two statements best describe WiMAX technology? (Choose two.)

A. WiMAX works only for licensed frequencies.

B. WiMAX is capable of working as a long-range system over several miles.

C. Typically, fixed WiMAX networks have a higher gain direction antenna installed near the client.

D. WiMAX is defined by 802.11i.
Answer: BC
You work as a network technician at Cisco.com,study the situation carefully ,then answer the
question.The corporate network locates all RADIUS servers at the centralized data center for authentication.
The remote offices use access points operating in H-REAP mode using v5.0 code with various local and
central switch WLANs. When a remote office has lost connectivity to the main corporate network due to a
WAN outage, which two statements are true about the status of that remote office when H-REAP access
points are operating in standalone mode? (Choose two.)

A. All clients will continue association until the respective authentication timers expire.

B. All Cisco APs with 16 MB of RAM or more can operate as standalone H-REAP.

C. If configured, clients using WPA or WPA2 with PSK and locally switched WLANs will continue to operate.

D. If configured, locally switched WLANs will continue operation using Local-EAP for EAP-LEAP and
EAP-FAST for up to twenty users.
Answer: CD
The Cisco 526 Wireless Express Mobility Controller is a network appliance that automatically
optimizes the basic wireless network and supports advanced mobility services on top of that network. A new
Cisco Mobility Express 526 controller using v4.2 code direct from the factory is accessible by which default
IP address?

A. 172.16.100.1
B. 10.10.1.1
C. 172.16.1.1
D. 192.168.1.1
Answer: D
Using Cisco WCS v5.0, which configuration command option allows you to see a summary of all
access points in the Cisco WCS database?

A. Configure -> Config Groups
B. Configure -> Access Points
C. Configure -> Chokepoints
D. Configure -> Controllers
Answer: B
Which standards do wireless MANs employ?(Choose three)

A. Wi-Fi
B. IEEE 802.11
C. IEEE 802.13
D. IEEE 802.16
Answer: ABC
Which four file formats will be used when importing a single campus map into the Cisco WCS 5.0?
(Choose four.)

A. .BMP
B. .JPEG
C. .JPG
D. .PNG
E. .GIF
Answer: BCDE
For the following options ,which AP to Wireless LAN Controller discovery process requires a previous
association of the AP with a Cisco WLC?

A. AP priming
B. DHCP Option 6
C. DHCP Option 43
D. defining a master controller
Answer: A
What unit of measurement is used for representing the strength of an antenna's radiation pattern?

A. dBi
B. mW
C. dBm
D. GHz
Answer: A
A controller-based wireless solution can avoid interference by dynamically adjusting which two access point transmission features? (Choose two.)

A. transmit power levels
B. switch port parameters
C. operating RF channel
D. SSID names
Answer: AC
True or false: FDMA requires users to take turns transmitting signals.

A. True
B. false
Answer: B
WPA uses TKIP and is a subset of the 802.11i standard. True or false?

A. True
B. false
Answer: A
Approximately up to what range do direct infrared systems operate?

A. 0.5 mile
B. 1 mile
C. 1.5 mile
D. 2.0 mile
Answer: B