web analytics

PassLeader 200-355 Exam Dumps Collection with VCE and PDF (Question 141 – Question 160)

New 200-355 exam questions from PassLeader 200-355 dumps! Welcome to download the newest PassLeader 200-355 VCE and PDF dumps: http://www.passleader.com/200-355.html (410 Q&As)

P.S. Free 200-355 dumps are available on Google Drive shared by PassLeader: https://drive.google.com/open?id=0B-ob6L_QjGLpcXZkRGszbGJmUkE

An AP was reset while working on the correct association to a Cisco WCS version 7.0. Which item was cleared during the reset?

A.    static IP address
B.    the location ID of the AP
C.    WLC primary, secondary, tertiary
D.    AP name
E.    certificate
F.    Nothing was cleared

Answer: F
Reset – Sets the table to the default display so nothing will be cleared.

Which two actions would you use to begin to troubleshoot an access point that fails to join a wireless LAN controller successfully? (Choose two.)

A.    SSH to the AP
B.    SSH to the Cisco WCS
C.    SSH to the Cisco WLC
D.    Issue the Cisco WLC commandebug capwap events enable
E.    Issue the Cisco WLC commanshow capwap events

Answer: CD
The controller supports the use of the Telnet and Secure Shell (SSH) protocols to troubleshoot lightweight access points. Using these protocols makes debugging easier, especially when the access point is unable to connect to the controller. You can monitor the APs dialog with the controller using the debug capwap family of commands.

Refer to the exhibit. You made a manual configuration change to a controller and now you need to compare the controller configuration seen on Cisco WCS to the configuration that is present in the controller. Which menu can you use to do compare the configurations?
A.    Reports
B.    Monitor
C.    Configure
D.    Services
E.    Administration
F.    Tools

Answer: C

Which portion of a WLAN deployment can WLC message logs help to troubleshoot?

A.    RF issues
B.    encryption issues between APs and clients
C.    configuration verification issues
D.    infrastructure and client Issues
E.    AP placement issues

Answer: D
The message logs include information related to the network infrastructure, client issues, authentication issues, and AP association issues.

Configurations are commonly uploaded and downloaded to a WLC. Which options are other examples of a file that can be uploaded from a Cisco 2500 Series WLC?

A.    packet capture
B.    crash file
C.    code
D.    login banner
E.    PAC

Answer: B
From Management > Tech Support, you can access useful information, such as controller crash files or AP crash logs (which logs the reasons for the crash). These files are usually transmitted to advanced tech support or TAC but usually not managed directly by Wireless CCNAs. Then, from the Command > Upload page in the web interface, you can upload the configuration file or other system files (event logs, message logs, trap logs, crash file, debug file, wireless attack signatures file, etc.

The wireless network is using controller-based APs and version 7.0 MR1. The APs appear to be connected properly to the controllers. A wireless user near one of the APs reports that they are unable to connect to the network with their pre-shared key. Which option shows the GUI path where you can check the connection status of that client?

A.    WLANs > WLAN_ID > Advanced
B.    Security > Clients
C.    Security > Advanced > Clients
D.    Monitor > Clients
E.    Wireless > 802.11b/g/n > clients

Answer: D
Choose Monitor > Clients to open the Clients page. This page lists all of the clients that are associated to the controller’s access points. It provides the following information for each client:

You are about to use a hotel’s guest wireless services using a wireless laptop. Which three items do you need to establish a wireless connection? (Choose three.)

A.    SSID name
B.    RF channel
C.    RF signal
D.    802.1X/EAP credentials
E.    pre-shared key
F.    web page
G.    WPA/WPA2 settings

Answer: ACF
Another common authentication method, especially for guest networks (for example, in hotels, where Internet access must be simple, requiring only an SSID with decent RF signal in each room and a web page to authenticate the user, regardless of the underlying operating system), is Web authentication.

You have an Apple IOS iPhone4 that is used on your home Wi-Fi network and a personal laptop that is used on your work’s enterprise wireless network. At your office, you are unable to see the enterprise wireless network on your iPhone4. What is the most likely cause of this issue?

A.    WPA2 CPU intensive encryption is not supported on the client.
B.    WPA2 must be enabled on the client.
C.    A new profile must be created on the client.
D.    Wi-Fi must be enabled on the client.
E.    The enterprise is 2.4 GHz only.
F.    The enterprise is 5 GHz only.
G.    The RF channel must be adjusted on the client.

Answer: F
The iPhone4 only supports 2.4 Ghz wireless. 5 Ghz wireless support was added with the iPhone5.

When Cisco AnyConnect modules are installed on a PC, which module must be installed first?

A.    telemetry
B.    web security
C.    VPN
D.    NAM
E.    DART
F.    posture
G.    CSSC

Answer: C
The VPN module is mandatory for all other modules to function correctly and must be installed first. Even if the VPN module is not selected for installation, it will be pushed and installed on the client.

You have an organization that has a growing number of standalone APs. You would like to migrate to lightweight APs and manage them through Cisco WCS. Which software platform allows you to make this migration?

A.    The enterprise version of Cisco WCS allows this migration and provides the most flexibility in the number of APs supported.
B.    CiscoWorks WLSE is the only management platform that allows this migration, but it is limited to 500 APs.
C.    You can migrate your network to Cisco WCS single server with the CiscoWorks WLSE upgrade software upgrade.
D.    You can migrate the network by using either the single server or enterprise software platforms, both using the CiscoWorks WLSE upgrade software upgrade.

Answer: C

Which statement best describes the ability of a wireless client to access and transmit a data frame to an AP?

A.    The client listens to the media until polled by the AP using PCF to send its data.
B.    The client listens to the media until a data frame is finished, at which time it transmits, unless a collision of data frames has occurred.
C.    The client uses random countdown timers to start the transmission of a data frame.
D.    The client listens to the media and countdown timers to start the transmission of a data frame.

Answer: D

Which statement about ZigBee technology is true?

A.    It has low power consumption.
B.    It is designed only for point-to-point communications.
C.    It ranges up to 250 meters.
D.    It supports data rates up to 1 and 2 Mb/s.

Answer: A
ZigBee is based on the IEEE 802.15.4 protocol for WPAN, and aims at developing hardware and applications with a low data rate but also low power consumption and low complexity –for example, to control sensors. ZigBee-based products can access up to 16 separate 5 MHz channels in the 2.4 GHz band and are not compatible with 802.11 devices. The maximum power of ZigBee is 60 mW. Devices use low.

Which four options are the characteristics of the original 802.11 protocol? (Choose four.)

A.    Defined DSSS and FHSS as possiblemethods for modulation
B.    Designed to operate in the 5 GHz ISM frequency spectrum
C.    The most common deployment is three non-overlapping channels that are 20 MHz wide
D.    The protocol sets the maximumthroughput at 1 Mb/s or 2 Mb/s
E.    Defined FHSS and OFDM aspossible methods for modulation
F.    The most common deployment is three non-overlapping channels that are 22 MHz wide
G.    Designed to operate in the2.4 GHz ISM frequency spectrum
H.    The protocol sets the maximum throughput at1 Mb/s

Answer: ACDG
FHSS is still described in the original 802.11 protocol, but another technique was preferred and adopted by all 802.11 networks: Direct Sequence Spread Spectrum. Instead of small channels and a jumping sequence, the information is sent over a wider channel. This channel is 22 MHz wide (if the center frequency is 2.412, this channel spans from 2.401 GHz to 2.423 GHz) and does not move (no hopping, which is why the sequence is said to be direct instead of hopping). Then, over this 22 MHz channel, several bits of information are sent in parallel. If a source of interference affects part of the channel, it will prevent only the bits sent in that frequency from reaching the receiver.

Which two attacks does Management Frame Protection help to mitigate? (Choose two.)

A.    Eavesdropping
B.    Denial of Service
C.    War Driving
D.    Man-in-the-Middle

Answer: BD

Drag and Drop Questions


Drag and Drop Questions


Drag and Drop Questions


Drag and Drop Questions


Drag and Drop Questions


Drag and Drop Questions


New 200-355 exam questions from PassLeader 200-355 dumps! Welcome to download the newest PassLeader 200-355 VCE and PDF dumps: http://www.passleader.com/200-355.html (410 Q&As)

P.S. Free 200-355 dumps are available on Google Drive shared by PassLeader: https://drive.google.com/open?id=0B-ob6L_QjGLpcXZkRGszbGJmUkE