-
In the Company wireless LAN, what is the function of the Service Set Identifier (SSID)?()
A . The SSID must match on both the Company client and the Company access point and provides MAC Address Authentication to authenticate the client to the access point.
B . The SSID should be configured on the Company client site only and provides data-privacy functions and authentication to the access point.
C . The SSID must match on both the Company client and the Company access point and provides encryption keys for authentication to the access point.
D . The SSID must match on both the Company client and the Company access point. The SSID is advertised in plain-text in the access point beacon messages.
E . None of the other alternatives apply
-
You install a wireless router and disable the Service Set Identifier (SSID) broadcast feature. You need to configure your computer to connect to the wireless network. What should you do? ()
A . Click the Connect to a network link, right-click the appropriate network, and then click the Connect option.
B . Click the View computers and devices link, right-click the wireless router, and then click the Enable option.
C . Click the Set up a connection or network link, and then click the Set up a wireless Ad hoc network option.
D . Click the Set up a connection or network link, and then click the Manually connect to a wireless network option.
-
Which two statements about the Wireless Location Appliance are true? ()
A . A Wireless Location Appliance acts as a server to one or more Cisco WCSs. It collects, stores, and passes on data from its associated Cisco WLAN controllers.
B . Before using the Web interface, the initial configuration of the Wireless Location appliance must be done using the command-line interface (CLI).
C . The Cisco 2000, 2700, 4100, and 4400 are examples of Wireless Location Appliances.
D . The Wireless Location Appliance visually displays the location information of WLAN devices and forwards this information to third-party applications using the Simple Network Management Protocol (SNMP).
E . The Wireless Location Appliance visually tracks up to 15,000 WLAN devices and can store this information for 90 days.
-
LDAP is being used throughout the Company wireless network. Which statement about the Lightweight Access Point Protocol (LWAPP) protocol is true?()
A . The processing of 802.11 data and management protocols and access point capabilities is distributed between a lightweight access point and a centralized WLAN controller.
B . LWAPP advertises its WDS capability and participates in electing the best WDS device for the wireless LAN.
C . LWAPP aggregates radio management forward information and sends it to a wireless LAN solution engine.
D . LWAPP authenticates all access points in the subnet and establishes a secure communication channel with each of them.
E . None of the other alternatives apply
-
As an experienced technician, you are responsible for infrastructure design and global configuration changes. You are asked to deploy a Voice over Wireless LAN for your company. If the cells have the same channel, the separation between them should be:()
A . 19dbm
B . 10dbm
C . 67dbm
D . 86dbm
-
Which one is not the feature of the Cisco Unified Wireless Network architecture?()
A . network unification
B . remote access
C . mobility services
D . network management
-
The Cisco Unified Wireless Network minimizes the TCO and maximizes wireless network uptimeby optimizing which two deployment, management, and security features?()
A . unified wireless and wired infrastructure for a single point of control for all WLAN traffic
B . simplified management of central or remotely located access points
C . extension features to wired network services, such as denial of service prevention and ACLs
D . threat defense with a robust wired IDS
-
Which wireless LAN statistics are reported from the Cisco Unified Wireless IP Phone 7921G via a directly connected web browser?()
A . duplicate sender packets
B . unicast packet retry rate
C . unicast packet retry ratio
D . association rejectio
-
Which three of the following are elements of the Cisco Unified Wireless Network?()
A . Unified advanced service
B . client devices
C . Catalyst switches
D . network management
E . mesh access points
F . VPN concentrator
-
LDAP is being utilized throughout the Company Wireless network. Which issue or set of issues does the Lightweight Access Point Protocol (LWAPP) address? ()
A . Reduction of processing in wireless controllers
B . Distributed approach to authentication, encryption, and policy enforcement
C . Access point discovery, information exchange, and configuration
D . Provides security by blocking communication between access points and wireless clients
E . None of the other alternatives apply.
-
As the Company wireless administrator, you required to be knowledgeable about the wireless LAN components. Which two statements about these components are true? ()
A . In the autonomous access point solution, control is provided by the WLAN controller.
B . In the lightweight access point solution, WLAN management is provided by the WLAN Control System (WCS).
C . In the autonomous access point solution, control is provided by the WDS (Wireless Domain Services).
D . Cisco Aironet autonomous access points cannot be supported by the Cisco Unified Wireless Network.
E . Ii the lightweight access point solution, WLAN management is provided by the WLAN Solution Engine (WLSE).
F . Cisco Aironet lightweight access points cannot be supported by the Cisco Unified Wireless Network.
-
Refer to the exhibit. The wireless user is moving from right to left towards AP2.
What are three reasons that the wireless client would initiate roaming?()
https://assets.asklib.com/images/image2/2018073011464176099.jpg
A . The minimum data retry count from AP1 is exceeded.
B . The maximum data retry count from AP1 is exceeded.
C . The client has missed too many beacons from AP1.
D . The client data rate from AP1 has been reduced.
E . The client has received too many beacons from AP2.
F . The client data rate from AP2 has been increased.
-
The LWAPP (Lightweight Access Point Protocol) is in use within the Company wireless LAN. Which statement is true about this protocol?()
A . Real-time frame exchange is accomplished within the access point.
B . The control traffic between the client and the access point is encapsulated with the LWAPP.
C . Authentication, security, and mobility are handled by the access point.
D . Data traffic between the client and the access point is encapsulated with LWAPP.
E . None of the other alternatives apply
-
Which one is not the feature of the Cisco Unified Wireless Network architecture?()
A . network unification
B . remote access
C . mobility services
D . network management
-
Under which three conditions does a client initiate roaming between wireless cells in the Company WLAN? ()
A . The access point has broadcast too many SSIDs.
B . The wireless client has missed too many beacons from the access point.
C . The maximum data retry count, initiated by the wireless client, is exceeded.
D . The wireless client has reduced the data rate.
E . The access point has requested client reauthentication.
F . The wireless client has missed too many IAPP (Inter Access Point Protocol) updates.
-
The Lightweight Access Point Protocol (LWAPP) is in use within the Company wireless network. Which two statements correctly describe features of this protocol? ()
A . Control traffic between an access point and a controller is encrypted within LWAPP.
B . Data traffic between an access point and a controller is encrypted within LWAPP.
C . Layer 3 mode packets are transmitted in TCP frames.
D . Data traffic between an access point and a controller is encapsulated within LWAPP.
E . VLAN tagging and QoS markings are applied at the access point.
-
You need to determine the correct wireless LAN topology for use in the Company network. Which three statements are true about the various WLAN topologies?()
A . In ad hoc mode, the Independent Basic Service Set (IBSS) is a framework in which mobile clients connect directly without an intermediate access point.
B . In Infrastructure mode, the Basic Service Set (BSS) is a framework in which mobile clients use a single access point for connecting to each other or to wired network resources.
C . In Infrastructure mode, the Extended Services Set (ESS) is a framework in which two or more Basic Service Sets are connected by a common distribution system (DS).
D . In Infrastructure mode, the Independent Basic Service Setet (IBSS) is a framework in which mobile clients connect directly without an intermediate access point.
E . In ad hoc mode, the Basic Service Set (BSS) is a framework in which mobile clients use a single AP for connecting to each other or to wired network resources.
F . In ad hoc mode, the Extended Services Set (ESS) is a framework in which two or more Basic Service Sets are connected by a common distribution system (DS)
-
Your computer has a wireless network adapter installed. However, the computer fails to connect to the wireless network. You need to ensure that the computer is able to connect to the wireless network. What should you do?()
A . Change the Network Category setting of the wireless connection to Public.
B . Enable the Internet Connection Sharing feature on the wireless network adapter.
C . Rename the wireless network adapter to match the Service Set Identifier (SSID) of the wireless network.
D . Configure the wireless network adapter to connect to the appropriate wireless network from the Connect to a network list.
-
What are three functions of the Cisco wireless LAN controller, which is being used in the Company Centralized WLAN solution network? ()
A . Authentication
B . Mobility
C . Security management
D . Transmission of beacon frames
E . Real-time portions of MAC management
F . Real-time aspects of the 802.11 prtocol management
G . SNMP collectio
-
Which set of statements describes the correct order and process of a Company wireless user client associating with a wireless access point in the Company network? ()
A . 1. Access point sends probe request .2. Client sends probe response.3. Client initiates association.4. Access point accepts association.5. Client adds access point MAC address to association table.
B . 1. Client sends probe request.2. Access point sends probe response.3. Client initiates association.4. Access point accepts association.5. Access point adds client MAC address to association table.
C . 1. Client sends probe request.2. Access point sends probe response.3. Access point initiates association.4. Client accepts association.5. Access point adds client MAC address to association table.
D . 1. Access point sends probe request .2. Client sends probe response.3. Client initiates association.4. Access point accepts association.5. Access point adds client MAC address to association table.
E . 1. Client sends probe request.2. Access point sends probe response.3. Client initiates association.4. Access point accepts association.5. Client adds access point MAC address to association table.
F . None of the other alternatives apply.
-
On the Company wireless LAN, A client is searching for an access point (AP). What is the correct process order that this Company client and access point goes through in order to create a connection?()
A . association request/response, probe request/response, authentication request/response
B . association request/response, authentication request/response, probe request/response
C . probe request/response, authentication request/response, association request/response
D . probe request/response, association request/response, authentication request/response
E . None of the other alternatives apply
-
Which three devices are used by the Cisco Wireless Control System (WCS) for wireless management?()
A . WLAN controllers
B . WLAN Solution Engine (WLSE)
C . Cisco Wireless Control System (WCS)
D . Cisco Wireless Location Appliance
E . lightweight access point (AP)
F . autonomous access point (AP)
-
A company finished upgrading the wireless encryption to WPA2 Enterprise. The administratorreceives a call from a user who is unable to connect to the company wireless.Which of the following is MOST likely causing the connection problem?()
A. The laptop is missing the software supplicant
B. The access point SSID is hidden.
C. The laptop only supports TKIP and AES encryption,
D. The access point is on the wrong channel.
-
A company has a business application that provides its users with many different reports:receivables reports, payables reports, revenue projects, and so on. The company has just purchased some new, state-of-the-art, wireless printers, and a programmer has been assigned the task of enhancing all of the reports to use not only the company‘s old printers, but the new wireless printers as well. When the programmer starts looking into the application, the programmer discovers that because of the design of the application, it is necessary to make changes to each report to support the new printers.Which two design concepts most likely explain this situation?()
A.Inheritance
B.Low cohesion
C.Tight coupling
D.High cohesion
E.Loose coupling
F.Object immutability