-
Which two statements are true about encrypting RMAN backup?()
A . The transparent encryption of backups uses the encryption wallet
B . The database uses the same encryption key for every encrypted backup
C . The password encryption of backups only uses the password while creating and restoring backup
D . If transparent encryption is configured, you cannot use the SET ENCRYPTION BY PASSWORD command to make password-protected backups.
-
Which two statements about the Wireless Location Appliance are true? ()
A . A Wireless Location Appliance acts as a server to one or more Cisco WCSs. It collects, stores, and passes on data from its associated Cisco WLAN controllers.
B . Before using the Web interface, the initial configuration of the Wireless Location appliance must be done using the command-line interface (CLI).
C . The Cisco 2000, 2700, 4100, and 4400 are examples of Wireless Location Appliances.
D . The Wireless Location Appliance visually displays the location information of WLAN devices and forwards this information to third-party applications using the Simple Network Management Protocol (SNMP).
E . The Wireless Location Appliance visually tracks up to 15,000 WLAN devices and can store this information for 90 days.
-
Which two statements are true about encrypting RMAN backup?() (Choose two.)
A . The transparent encryption of backups uses the encryption wallet
B . The database uses the same encryption key for every encrypted backup
C . The password encryption of backups only uses the password while creating and restoring backup
D . If transparent encryption is configured, you cannot use the SET ENCRYPTION BY PASSWORD command to make password-protected backups.
-
Which two statements best describe enhanced wireless security encryption?()
A . TKIP protects RC4 encryption keys
B . CKIP and TKIP protect AES encryption keys
C . TKIP encryption is more processor intensive than AES encryption is
D . WPA requires TKIP encryption, whereas WPA2 supports AES encryption
E . WPA requires AES encryption, whereas WPA2 supports TKIP encryptio
-
Which two of these data encryption AIM modes are found on the 3800 family of Cisco ISR Routers? (Choose two.)()
A . BPII
B . SPII-Plus
C . FPII
D . EPII-Plus
E . HPII
F . HPII-PIu
-
Which two statements best describe the wireless security standard that is defined by WPA (Choose two.)()。
A . It specifies use of a static encryption key that must be changed frequently to enhance security
B . It requires use of an open authentication method
C . It specifies the use of dynamic encryption keys that change each time a client establishes a connection
D . It requires that all access points and wireless devices use the same encryption key
E . It includes authentication by PSK
-
Which design topology incurs a performance penalty since there are two encryption-decryption cycles between any two remote sites?()
A . peer-to-peer
B . partial mesh
C . hub and spoke
D . full mesh
-
Which design topology incurs a performance penalty since there are two encryption-decryption cycles between any two remote sites?()
A . peer-to-peer
B . hub and spoke
C . partial mesh
D . full mesh
-
Which two wireless security statements are true?()
A . A TACACS+ server is required to implement 802.1x.
B . MIC protects against man-in-the-middle and replay attacks.
C . The 802.1x standard provides encryption services for wireless clients.
D . The AES (symmetric block cipher) is specified in the IEEE 802.11i specification.
E . The IEEE 802.11i specification uses RC4 as its encryption mechanism.
F . WPA requires TKIP and AES as encryption methods.
-
Which two of these statements best describe the benefits of Cisco’s wireless IDS functionality? (Choose two.) ()
A . AirDefense for wireless IDS is required by autonomous APs.
B . 2.40Hz CK management can monitor both 802.11 and non-802.11 CK interference.
C . APs only monitor the RF channels that are servicing the clients.
D . Cisco or CCX compatible client cards can extend the CK IDS service for autonomous APs.
E . Autonomous APs must be dedicated IDS sensors while lightweight APs can combine client traffic and RF monitoring.
-
Which two statements are true about encrypting RMAN backup?()
A . The transparent encryption of backups uses the encryption wallet
B . The database uses the same encryption key for every encrypted backup
C . The password encryption of backups only uses the password while creating and restoring backup
D . If transparent encryption is configured, you cannot use the SET ENCRYPTION BY PASSWORD command to make password-protected backu
-
Which two Cisco Wireless Control System (WCS) statements are true?()
A . the WCS Base version includes all the features of the WCS Location version as well as additional enhancements
B . the WCS Base version provides on-demand location of rogue access points and clients to within 33 feet (10 meters)
C . WCS adds a graphical view of multiple Cisco Wireless LAN controllers and managed access points
D . WCS includes a network management tool which is similar to a site survey tool
E . WCS uses the CDP protocol to communicate with the controller
-
Which two statements best describe the Cisco Unified Wireless Network?()
A . The Cisco Unified Wireless Network provides the framework to segregate wired and wirelessnetworks to deliver the best security for companies that are deploying WLANs.
B . The Cisco Unified wireless Network provides the framework to integrate and extend wired andwireless networks to deliver the lowest-possible total cost or ownership for companies that aredeploying WLANs
C . The Cisco Unified Wireless Network extends "wireless awareness" into important elements ofthe network infrastructure, providing the same level of security for WLANs that organizations havecome to expect from their VPNs.
D . The Cisco unified Wireless Network extends "wireless awareness" into important elements ofthe network infrastructure, providing the same level of security scalability, reliability ease ofdeployment and management for WLANs that organizations have come to expect from their wiredLANs.
-
Which two statements about the Wired Equivalent Privacy (WEP) encryption mechanism are true? ()
A . the two methods of authentication using the WEP encryption are open and shared key
B . the 802.11 standard defines WEP security using 128-bit keys
C . WEP can provide stronger authentication through the use of LEAP, PEAP, or EAP-FAST
D . WEP is a scalable encryption solution that uses static keys for authentication
E . WEP security provides only one-way authentication
F . WEPv2 offers improved encryption by replacing the RC4 encryption mechanism with the AES (symmetric block cipher) mechanism
-
Which two statements about a wireless repeater topology are true?()
A . A wireless repeater is an access point that is not connected to the wired LAN.
B . The repeater feature is only available in lightweight access point topologies.
C . The SSID of the root access point must be configured on the repeater access point.
D . This topology requires a 10 - 15 percent overlap between a wired access point and the wireless repeater.
E . This topology requires a 15 - 25 percent overlap between a wired access point and the wireless repeater.
F . To avoid interference, the repeater access point must use a different channel from what the root access point uses.
-
Which two statement best describes the Cisco Unified Wireless Network? ()
A . The Cisco Unified Wireless Network provides the framework to segregate wired and wireless networks to deliver the best security for companies that are deploying WLANs
B . The Cisco Unified Wireless Network provides the framework to integrate and extend wired and wireless networks to deliver the lowest-possible total cost of ownership for companies that are deploying WLANs
C . The Cisco Unified Wireless Network extends wireless awareness into important elements of the network infrastructure, providing the same level of security for WLANs that organizations have come to expect from their VPNs
D . The Cisco Unified Wireless Network extends wireless awareness into important elements of the network infrastructure, providing the same level of security, sociability, reliability, ease of deployment, and management for WLANs that organizations have come to expect from their wired LAN
-
Which two statements regarding the Wireless LAN Solution Engine (WLSE) are true?()
A . To support fault and policy reporting,the WLSE requires a Wireless Control System (WCS).
B . When WLSE detects an AP failure,it automatically increases the power and cell coverage of nearbyAPs.
C . WLSE requires the 2700 location appliance to offer location tracking.
D . WLSE can locate rogue APs and automatically shut them down.
E . WLSE configuration is done using the command line interface (CLI) or a WEB based template.
-
Which two statements about the wireless control system (WCS) are true?()
A . the Cisco WCS is designed to support 1500 Cisco WLAN controllers and up to 50 APs
B . the Cisco WCS runs on a dedicated network device such as the Cisco 2700 network appliance
C . the Cisco WCS runs on various windows and Linux platforms
D . the Cisco WCS screen displays four main menu sheet tab consisting of Monitor, Configure, Security, and Alam
E . the Cisco WCS uses the SNMP protocol to communicate with the controller
-
Which two components are unique to controller-based wireless installations? ()
A . Mobility Services Engine
B . WLAN controller
C . Cisco Wireless Control System
D . rugged/exterior access points
E . interior access point
-
Which two of these statements describe important aspects of performing a wireless site survey? (Choose two.) ()
A . An 802.11 g access point with a variety of antennas can be used in all standard site surveys.
B . Site surveys can be performed manually or through assisted site survey.
C . Channel power during testing starts at the default minimum and gradually increases to the maximum.
D . Overlapping access points can create performance problems.
E . Surveys should be done after hours in an office building or during reduced inventory levels in warehouses.
-
Which two statements about the Wireless Location Appliance are true?()
A . a Wireless Location Appliance acts as a server to one or more Cisco WCSs. It collects, stores, and passes on data from its associated Cisco WLAN controllers
B . before using the Web interface, the initial configuration of the Wireless Location Appliance must be done using the command-line interface (CLI)
C . the Cisco 2000, 2700, 4100, and 4400 are examples of Wireless Location Appliance.
D . the Wireless Location Appliance visually displays the location information of WLAN devices and forwards this information to third-party applications using the Simple Network devices and forwards this information to third-party applications using the Simple Network Management Protocol (SNMP)
E . the Wireless Location Appliance visually tracks up to 15,000 WLAN devices and can store this information for 90 days.
-
Which two statements regarding the Wireless LAN Solution Engine (WLSE) are true? ()
A . To support fault and policy reporting, the WLSE requires a Wireless Control System (WCS).
B . When WLSE detects an AP failure, it automatically increases the power and cell coverage of nearby APs.
C . WLSE requires the 2700 location appliance to offer location tracking.
D . WLSE can locate rogue APs and automatically shut them down.
E . WLSE configuration is done using the command line interface (CLI) or a WEB based template.
-
Which two statements regarding the Wireless LAN Solution Engine (WLSE) are true ?()
A . to support fault and policy reporting, the WLSE requires a Wireless Control System (WCS)
B . when WLSE detects an AP failure, it automatically increases the power and cell coverage of nearby APs
C . WLSE requires the 2700 location appliance to offer location tracking
D . WLSE can locate rogue APs and automatically shut them down
E . WLSE configuration is done using the command line interface (CLI) or a WEB based template
-
A company finished upgrading the wireless encryption to WPA2 Enterprise. The administratorreceives a call from a user who is unable to connect to the company wireless.Which of the following is MOST likely causing the connection problem?()
A. The laptop is missing the software supplicant
B. The access point SSID is hidden.
C. The laptop only supports TKIP and AES encryption,
D. The access point is on the wrong channel.