-
Three access ports have been installed and configured to a small office.What term defines the wireless topology?()
A . IBSS
B . BSS
C . ESS
D . SSID
-
Which three of these are elements of the Cisco Unified Wireless Network architecture?()
A . cell phones
B . remote access
C . mobility services
D . network management
E . network unification
F . network decentralizatio
-
Refer to the exhibit. Which three options are available when the Cisco Wireless Control System (WCS) discovers rogue access points on the LAN?()https://assets.asklib.com/images/image2/2018072416180978608.jpg
A . The WCS sends new rouge access point notifications.
B . The WCS locates and monitors rouge access points until they are eliminated or acknowledged.
C . The WCS reconfigures the rouge access point with proper authentication credentials.
D . The WCS sends deauthenticate and disassociate messages to the rouge access point.
E . The WCS contains rouge access points by sending their clients deauthenticate and disassociate messages
F . The WCS sends deauthenticate and disassociate messages to all wireless clients on the network.
-
Which two statements about the Wireless Location Appliance are true? ()
A . A Wireless Location Appliance acts as a server to one or more Cisco WCSs. It collects, stores, and passes on data from its associated Cisco WLAN controllers.
B . Before using the Web interface, the initial configuration of the Wireless Location appliance must be done using the command-line interface (CLI).
C . The Cisco 2000, 2700, 4100, and 4400 are examples of Wireless Location Appliances.
D . The Wireless Location Appliance visually displays the location information of WLAN devices and forwards this information to third-party applications using the Simple Network Management Protocol (SNMP).
E . The Wireless Location Appliance visually tracks up to 15,000 WLAN devices and can store this information for 90 days.
-
What are three basic parameters to configure on a wireless access point?()
A . SSID
B . RTS/CTS
C . AES-CCMP
D . TKIP/MIC
E . RF channel
F . authentication method
-
Which two statements best describe enhanced wireless security encryption?()
A . TKIP protects RC4 encryption keys
B . CKIP and TKIP protect AES encryption keys
C . TKIP encryption is more processor intensive than AES encryption is
D . WPA requires TKIP encryption, whereas WPA2 supports AES encryption
E . WPA requires AES encryption, whereas WPA2 supports TKIP encryptio
-
Which three of these are elements of the Cisco Unified Wireless Network architecture?()
A . cell phones
B . remote access
C . mobility services
D . network management
E . network unification
F . network decentralizatio
-
In order to enhance worker productivity, a Cisco wireless network has been implemented at all locations. Which three statements regarding WLAN are true?()
A . A WLAN client will operate in half-duplex mode.
B . The Aironet 1230 access point is an example of an access point that operates solely as a lightweight access point.
C . Ad hoc mode allows mobile clients to connect directly without an intermediate AP.
D . WLANs are designed to share the medium and can easily handle an increased demand of channel contention.
E . A lightweight AP receives control and configuration from a WLAN controller to which it is associated.
F . Another term for infrastructure mode is independent service set (IBSS).
-
Which three actions are required to access the network statistics on a remote Cisco Unified Wireless IP Phone 7921G via a web browser?()
A . Browse to the phone using the MAC address of the phone.
B . Use HTTPS:// preceding the address of the phone.
C . Change web access to read/write for the MAC address of the phone on Cisco Unified Communications Manager.
D . Enter the username and password of the phone.
E . Ensure that the host is on the same subnet as the remote phone.
-
Which is NOT part of a typical wireless site survey?()
A . Implementation suggestions
B . Access point locations
C . Security requirements
D . Access point mounting method
-
Which three of the following are elements of the Cisco Unified Wireless Network?()
A . Unified advanced service
B . client devices
C . Catalyst switches
D . network management
E . mesh access points
F . VPN concentrator
-
Which two wireless security statements are true?()
A . A TACACS+ server is required to implement 802.1x.
B . MIC protects against man-in-the-middle and replay attacks.
C . The 802.1x standard provides encryption services for wireless clients.
D . The AES (symmetric block cipher) is specified in the IEEE 802.11i specification.
E . The IEEE 802.11i specification uses RC4 as its encryption mechanism.
F . WPA requires TKIP and AES as encryption methods.
-
Refer to the exhibit. The wireless user is moving from right to left towards AP2.
What are three reasons that the wireless client would initiate roaming?()
https://assets.asklib.com/images/image2/2018073011464176099.jpg
A . The minimum data retry count from AP1 is exceeded.
B . The maximum data retry count from AP1 is exceeded.
C . The client has missed too many beacons from AP1.
D . The client data rate from AP1 has been reduced.
E . The client has received too many beacons from AP2.
F . The client data rate from AP2 has been increased.
-
Under which three conditions does a client initiate roaming between wireless cells in the Company WLAN? ()
A . The access point has broadcast too many SSIDs.
B . The wireless client has missed too many beacons from the access point.
C . The maximum data retry count, initiated by the wireless client, is exceeded.
D . The wireless client has reduced the data rate.
E . The access point has requested client reauthentication.
F . The wireless client has missed too many IAPP (Inter Access Point Protocol) updates.
-
Which two Cisco Wireless Control System (WCS) statements are true?()
A . the WCS Base version includes all the features of the WCS Location version as well as additional enhancements
B . the WCS Base version provides on-demand location of rogue access points and clients to within 33 feet (10 meters)
C . WCS adds a graphical view of multiple Cisco Wireless LAN controllers and managed access points
D . WCS includes a network management tool which is similar to a site survey tool
E . WCS uses the CDP protocol to communicate with the controller
-
Which two statements best describe the Cisco Unified Wireless Network?()
A . The Cisco Unified Wireless Network provides the framework to segregate wired and wirelessnetworks to deliver the best security for companies that are deploying WLANs.
B . The Cisco Unified wireless Network provides the framework to integrate and extend wired andwireless networks to deliver the lowest-possible total cost or ownership for companies that aredeploying WLANs
C . The Cisco Unified Wireless Network extends "wireless awareness" into important elements ofthe network infrastructure, providing the same level of security for WLANs that organizations havecome to expect from their VPNs.
D . The Cisco unified Wireless Network extends "wireless awareness" into important elements ofthe network infrastructure, providing the same level of security scalability, reliability ease ofdeployment and management for WLANs that organizations have come to expect from their wiredLANs.
-
Which three benefits are realized by implementing Wireless LAN Solution Engine (WLSE)?()
A . improved WLAN security
B . simplified AP deployment
C . dynamic RF management
D . on-demand location of rogue APs
E . system-wide control of status and alarm monitoring
F . automatic channel and power level adjustment
-
Which two statements about a wireless repeater topology are true?()
A . A wireless repeater is an access point that is not connected to the wired LAN.
B . The repeater feature is only available in lightweight access point topologies.
C . The SSID of the root access point must be configured on the repeater access point.
D . This topology requires a 10 - 15 percent overlap between a wired access point and the wireless repeater.
E . This topology requires a 15 - 25 percent overlap between a wired access point and the wireless repeater.
F . To avoid interference, the repeater access point must use a different channel from what the root access point uses.
-
You need to determine the correct wireless LAN topology for use in the Company network. Which three statements are true about the various WLAN topologies?()
A . In ad hoc mode, the Independent Basic Service Set (IBSS) is a framework in which mobile clients connect directly without an intermediate access point.
B . In Infrastructure mode, the Basic Service Set (BSS) is a framework in which mobile clients use a single access point for connecting to each other or to wired network resources.
C . In Infrastructure mode, the Extended Services Set (ESS) is a framework in which two or more Basic Service Sets are connected by a common distribution system (DS).
D . In Infrastructure mode, the Independent Basic Service Setet (IBSS) is a framework in which mobile clients connect directly without an intermediate access point.
E . In ad hoc mode, the Basic Service Set (BSS) is a framework in which mobile clients use a single AP for connecting to each other or to wired network resources.
F . In ad hoc mode, the Extended Services Set (ESS) is a framework in which two or more Basic Service Sets are connected by a common distribution system (DS)
-
Which two statement best describes the Cisco Unified Wireless Network? ()
A . The Cisco Unified Wireless Network provides the framework to segregate wired and wireless networks to deliver the best security for companies that are deploying WLANs
B . The Cisco Unified Wireless Network provides the framework to integrate and extend wired and wireless networks to deliver the lowest-possible total cost of ownership for companies that are deploying WLANs
C . The Cisco Unified Wireless Network extends wireless awareness into important elements of the network infrastructure, providing the same level of security for WLANs that organizations have come to expect from their VPNs
D . The Cisco Unified Wireless Network extends wireless awareness into important elements of the network infrastructure, providing the same level of security, sociability, reliability, ease of deployment, and management for WLANs that organizations have come to expect from their wired LAN
-
What are three functions of the Cisco wireless LAN controller, which is being used in the Company Centralized WLAN solution network? ()
A . Authentication
B . Mobility
C . Security management
D . Transmission of beacon frames
E . Real-time portions of MAC management
F . Real-time aspects of the 802.11 prtocol management
G . SNMP collectio
-
Which three devices are used by the Cisco Wireless Control System (WCS) for wireless management?()
A . WLAN controllers
B . WLAN Solution Engine (WLSE)
C . Cisco Wireless Control System (WCS)
D . Cisco Wireless Location Appliance
E . lightweight access point (AP)
F . autonomous access point (AP)
-
Which three statements are true about implementing wireless LANs in the network using Ciscodevices?()
A . Antenna power is a relative value reference to dBi
B . LWAPP allows encrypted communications between lightweight access points and WLANcontrollers.
C . Characteristics of antennas are directionality, gain, and polarization
D . Power over Ethernet (PoE) is only available when a WLAN controller is integrated into thenetwork
E . The WLAN solution Engine (WLSE) is used to control lightweight access points
F . One of the advantages of the lightweight WLAN solution is that the devices act indepently
-
Which two statements about the Wireless Location Appliance are true?()
A . a Wireless Location Appliance acts as a server to one or more Cisco WCSs. It collects, stores, and passes on data from its associated Cisco WLAN controllers
B . before using the Web interface, the initial configuration of the Wireless Location Appliance must be done using the command-line interface (CLI)
C . the Cisco 2000, 2700, 4100, and 4400 are examples of Wireless Location Appliance.
D . the Wireless Location Appliance visually displays the location information of WLAN devices and forwards this information to third-party applications using the Simple Network devices and forwards this information to third-party applications using the Simple Network Management Protocol (SNMP)
E . the Wireless Location Appliance visually tracks up to 15,000 WLAN devices and can store this information for 90 days.