Register Now

Login

Lost Password

Lost your password? Please enter your email address. You will receive a link and will create a new password via email.

Login

Register Now

Welcome to All Test Answers

Wireless Technology Test 2

• Question 1
1 out of 1 points

Which one of the following options should you select to configure WPA2 personal on a WLAN?

PSK
Answers: TKIP
CCMP

PSK
802.1x

• Question 2
1 out of 1 points

Which one of the following roles is used to anchor a wireless client and its IP address to a wired network and IP subnet?
Selected Answer:
PoP
Answers: PoD
PoE

PoP
PoC
PoA

• Question 3
1 out of 1 points

Which of the following is the most deterministic strategy you can use to push a specific AP to join a specific controller?
Selected Answer:
Configure the primary controller
Answers: Select the least-loaded controller
Configure the master controller
Use DHCP option 43

Configure the primary controller

• Question 4
2 out of 2 points

Which of the following methods can you use to perform the initial setup of a wireless LAN controller? (Choose all that apply.)
Selected Answers:
Web browser

CLI
Answers:
Web browser
FTP
TFTP

CLI

• Question 5
1 out of 1 points

A distribution system port is usually configured in which one of the following modes?
Selected Answer:
802.1Q trunk
Answers: LACP trunk negotiation

802.1Q trunk
Access mode
Recovery mode

• Question 6
1 out of 1 points

Which one of the following comes first in an LAP’s state machine, after it boots?
Selected Answer:
Discover WLCs
Answers: Build a CAPWAP tunnel
Download a configuration

Join a WLC

Discover WLCs

• Question 7
1 out of 1 points

By default, which one of the following methods and intervals does an AP use to detect a failed controller?
Selected Answer:
CAPWAP keepalive, 30 seconds
Answers: ICMP, 30 seconds

CAPWAP keepalive, 30 seconds
CAPWAP discovery, 30 seconds
ICMP, 60 seconds
CAPWAP keepalive, 60 seconds

• Question 8
1 out of 1 points

Which one of the following is used to relay DHCP requests from wireless clients?
Selected Answer:
Virtual interface
Answers: Management interface
Service port interface
Dynamic interface

Virtual interface

• Question 9
1 out of 1 points

Which of the following are necessary components of a secure wireless connection? (Choose all that apply.)
Selected Answers:
All of these answers are correct.
Answers:
All of these answers are correct.
Encryption
Authentication
MIC

• Question 10
1 out of 1 points

Which one of the following provides the most efficient means for roaming, as measured by the time to complete the roam?
Selected Answer:
Intracontroller roaming
Answers: All of these answers because each takes an equal amount of time
Layer 3 intercontroller roaming

Intracontroller roaming
Layer 2 intercontroller roaming

• Question 11
1 out of 1 points

In a Cisco converged wireless network, multiple controllers can be grouped together into which one of the following entities to make localized roaming more efficient?
Selected Answer:
Switch Peer Group
Answers: Mobility Peer Group

Switch Peer Group
High availability group
Mobility Domain
Mobility Subdomain

• Question 12
1 out of 1 points

A client roams from controller A to controller B. If it undergoes a Layer 3 roam, which one of the following best describes the role of controller A?

Selected Answer:
Anchor controller
Answers: Master controller

Host controller
Foreign controller

Anchor controller

• Question 13
1 out of 1 points

You can configure the priority value on an AP to accomplish which one of the following?
Selected Answer:
To define which APs will be preferred when joining a controller
Answers: To set the controller it will try to join first

To define which APs will be preferred when joining a controller
To identify the least-loaded controller to join
To set the SSID that will be advertised first

• Question 14
1 out of 1 points

The TPC algorithm is used for which one of the following purposes?
Selected Answer:
To adjust the transmit power level
Answers: To adjust the transmitting primary channel
To detect problems in transmission perimeter coverage

To adjust the transmit power level
To adjust the transmission control protocol rate

• Question 15
2 out of 2 points

Which of the following parameters are necessary when creating a new WLAN with the controller GUI? (Choose all that apply.)
Selected Answers:
Interface

SSID
Answers:
Interface
VLAN number
IP subnet
BSSID

SSID

• Question 16
1 out of 1 points

Which one of the following makes the decision for a device to roam from one AP to another?
Selected Answer:
The client device
Answers:
The client device
The original AP
The candidate AP
The wireless LAN controller

• Question 17
1 out of 1 points

If an LAP needs to download a new software image, how does it get the image?
Selected Answer:
From a WLC
Answers:
From a WLC
From an FTP server
You must preconfigure it.
From a TFTP server

• Question 18
1 out of 1 points

Suppose a data WLAN and a guest WLAN are configured on a controller and mapped to two VLANs. Which one of the following is a true statement?
Selected Answer:
The controller cannot route packets between the two WLANs.
Answers:
The controller cannot route packets between the two WLANs.
The controller can route packets between the two WLANs, but not the two VLANs.
The controller will bridge traffic between the two WLANs.
The controller can route traffic between the two WLANs.

• Question 19
1 out of 1 points

To create a guest WLAN, which one of the following must be configured on a wireless controller?
Selected Answer:
A regular WLAN
Answers:
A regular WLAN
A guest mobility group
A private WLAN
A guest BSS

• Question 20
1 out of 1 points

When a client moves its association from one autonomous AP to another, it is actually leaving and joining which one of the following?
Selected Answer:
BSS
Answers:
BSS
ESS
SSID
DS

• Question 21
1 out of 1 points

If an AP tries every available method to discover a controller, but fails to do so, what happens next?
Selected Answer:
It reboots and starts discovering again.
Answers:
It reboots and starts discovering again.
It broadcasts on every possible subnet.
It tries to contact the default controller at 10.0.0.1.
It uses IP redirect on the local router.

• Question 22
2 out of 2 points

Which two of the following things are bound together when a new WLAN is created?
Selected Answers:
Controller interface

SSID
Answers:
Controller interface
AP

SSID
VLAN

• Question 23
1 out of 1 points

Ten lightweight APs are joined to a wireless LAN controller. If a client roams from one of the APs to another, which one of the following correctly describes the roam?

Selected Answer:
Intracontroller roaming

Answers: Indirect roaming
Intercontroller roaming

Autonomous roaming

Intracontroller roaming

• Question 24
1 out of 1 points

A CAPWAP tunnel terminates on which one of the following controller interfaces?
Selected Answer:
AP-manager interface
Answers:
AP-manager interface
Service port interface
Dynamic interface
Virtual interface

• Question 25
1 out of 1 points

What is the maximum number of WLANs you can configure on a Cisco wireless controller?
Selected Answer:
512
Answers:
512
16
1024
8

• Question 26
1 out of 1 points

If the DCA algorithm detects that an AP is experiencing interference or excessive noise, what might it do to mitigate the problem?
Selected Answer:
Change the AP’s channel number
Answers: Direct the client to a different band
Increase the AP’s transmit power level
Decrease the AP’s transmit power level

Change the AP’s channel number

• Question 27
1 out of 1 points

After copying a new code image file to a controller, how should you copy the same code release to the lightweight APs?
Selected Answer:
Do nothing; each AP will get the new image as it rejoins the controller
Answers: Put the address of a TFTP server in the DHCP options field
Connect to each AP and copy the file there
Use Commands > Download to APs

Do nothing; each AP will get the new image as it rejoins the controller

• Question 28
1 out of 1 points

Which one of the following correctly finishes this sentence? By default, all guest WLANs defined on controllers in an enterprise…
Selected Answer:
are isolated from each other.
Answers: are connected by CAPWAP tunnels.
are merged into one VLAN and subnet.
must be assigned the same WLAN ID number.

are isolated from each other.

• Question 29
1 out of 1 points

Which one of the following is used for remote out-of-band management of a controller and the initial controller setup?
Selected Answer:
Service port
Answers: Virtual interface

Service port
Distribution system port
AP-manager interface

• Question 30
1 out of 1 points

You can configure only one data rate as mandatory on an AP. True or false?
Selected Answer: False
Answers: True
False

• Question 31
1 out of 1 points

Before mobility can be successfully implemented in a Cisco converged wireless network, a controller designated as a Mobility Anchor must be linked with which one of the following?
Selected Answer:
MC
Answers: MO

MC
MA
MD

• Question 32
1 out of 1 points

Which one of the following controller functions terminates CAPWAP tunnels from lightweight APs?

Selected Answer:
MA

Answers: MD
MC

MA

MO

• Question 33
1 out of 1 points

Which one of the following is used to cache authentication key information to make roaming more efficient?
Selected Answer:
CCKM
Answers: PGP

CCKM
EoIP
CCNA

• Question 34
1 out of 1 points

Which one of the following authentication methods requires digital certificates on both the AS and the supplicants?
Selected Answer:
EAP-TLS
Answers: TKIP
PEAP

EAP-TLS
WEP

• Question 35
1 out of 1 points

In a Layer 2 roam, what mechanism is used to tunnel client data between the two controllers?
Selected Answer:
None of these answers
Answers: GRE tunnel

None of these answers
CAPWAP tunnel
EoIP tunnel

• Question 36
2 out of 2 points

Suppose you use a web browser to access a controller and make a configuration change. You make sure to click on the Apply button. A short time later, the controller loses power and then reboots. Which two of the following answers correctly describes the result?

The Apply button made the change active, but didn’t save it across the reboot

You would need to click the Save Configuration link to save the change permanently
Answers: The Apply button saved the change permanently
To save the change permanently, you would need to use the copy run start command from the CLI

The Apply button made the change active, but didn’t save it across the reboot

You would need to click the Save Configuration link to save the change permanently

• Question 37
1 out of 1 points

WPA2 differs from WPA in which one of the following ways?
Selected Answer:
Mandates CCMP
Answers: Allows TKIP
Allows WEP
Allows TLS

Mandates CCMP

• Question 38
2 out of 2 points

A pre-shared key is used in which of the following wireless security configurations?
Selected Answers:
WPA2 personal mode

WPA personal mode
Answers:
WPA2 personal mode

WPA personal mode
WPA enterprise mode
WPA2 enterprise mode

• Question 39
1 out of 1 points

The 5-GHz radio in one of several APs in a building has failed. Which one of the following algorithms should be able to detect the failure?
Selected Answer:
Coverage hole detection
Answers: DCA
Dead radio detection

Coverage hole detection
CCA

• Question 40
1 out of 1 points

Each converged controller that is in the access layer must function as which one of the following roles?
Selected Answer:
MA
Answers: MC
ME

MA
MO

• Question 41
1 out of 1 points

An AP sends 802.11 broadcast management frames at which one of the following data rates?
Selected Answer:
The lowest mandatory data rate
Answers: The highest mandatory data rate

The lowest mandatory data rate
All supported data rates
The lowest supported data rate

• Question 42
1 out of 1 points

The WLAN ID number is advertised to wireless clients.
Selected Answer: False
Answers: True
False

• Question 43
1 out of 1 points

When a client roams from one controller to another, it must obtain a new IP address from a DHCP server. True or false?

Selected Answer: False
Answers: True
False

• Question 44
1 out of 1 points

An RF group is automatically formed by which one of the following?
Selected Answer:
Any controllers that can overhear neighbor messages with identical RF group names sent between their APs
Answers: All controllers that can overhear neighbor messages with identical mobility group names sent between their APs
All clients that share the same SSID
All APs that share the same channel

Any controllers that can overhear neighbor messages with identical RF group names sent between their APs

• Question 45
1 out of 1 points

Which one of the following controller interfaces maps a WLAN to a VLAN?
Selected Answer:
Dynamic interface
Answers: Virtual interface
WLAN interface

Dynamic interface
Bridge interface

• Question 46
1 out of 1 points

A network consists of four controllers: A, B, C, and D. Mobility group 1 consists of controllers A and B, while mobility group 2 consists of controllers C and D. Which one of the following answers describes what will happen when a client tries to roam between controllers B and C?
Selected Answer:
Roaming is possible, but CCKM and key caching will not work.
Answers:
Roaming is possible, but CCKM and key caching will not work.
Roaming is not possible.
Only Layer 3 roaming is possible.
Roaming is seamless and efficient.

• Question 47
1 out of 1 points

The term Layer 3 roaming refers to which one of the following types of client roam in a Cisco unified wireless network?
Selected Answer:
Intercontroller roaming
Answers:
Intercontroller roaming
RRM roaming
Intracontroller roaming
Autonomous AP roaming

• Question 48
1 out of 1 points

Which one of the following is the default state of 802.11n and 802.11ac support and the default channel width on a Cisco wireless LAN controller?
Selected Answer:
Enabled; 20-MHz channels
Answers:
Enabled; 20-MHz channels
Disabled; 40-MHz channels
Enabled; 80-MHz channels
Enabled; 40-MHz channels
Disabled; 20-MHz channels

• Question 49
1 out of 1 points

Which one of the following runs the DCA algorithm?
Selected Answer:
RF group leader
Answers: Master controller
Each controller

RF group leader
NCS or Cisco Prime Infrastructure

• Question 50
1 out of 1 points

Which one of the following is necessary to merge guest WLANs from multiple controllers onto a common guest WLAN on a controller?
Selected Answer:
Mobility anchor
Answers:
Mobility anchor
Master controller
RF group
Prime Infrastructure templates
Global WLAN

• Question 51
1 out of 1 points

In a wireless guest network, which one of the following statements is correct?
Selected Answer:
A client associates with a guest foreign controller and is tunneled to a guest mobility anchor controller.
Answers: A client associates with a guest mobility anchor and then must reassociate with a guest foreign controller.

A client associates with a guest foreign controller and is tunneled to a guest mobility anchor controller.
A client associates with a guest mobility anchor controller and is tunneled to a guest foreign controller.
A client associates with a guest foreign controller and then must reassociate with a guest mobility anchor controller.

• Question 52
1 out of 1 points

Suppose that you have just powered up a new controller. If you connect to the controller’s console port, in which one of the following modes will you find the controller?
Selected Answer:
Initial setup mode
Answers: ROMMON mode

Initial setup mode
Discovery mode
Promiscuous mode

• Question 53
1 out of 1 points

Which one of the following is currently the most secure data encryption and integrity method for wireless data?
Selected Answer:
CCMP
Answers: WPA
TKIP

CCMP
WEP

• Question 54
2 out of 2 points

Which of the following wireless security methods have been deprecated due to their weaknesses? (Choose all that apply.)

WEP

TKIP
Answers: EAP

WEP
AES
CCMP

TKIP

• Question 55
1 out of 1 points

Which one of the following correctly identifies the scope of the RRM algorithms?
Selected Answer:
All APs joined to controllers in an RF group
Answers: All APs joined to all controllers

All APs joined to controllers in an RF group
All APs of a specific model
All APs joined to one controller

• Question 56
1 out of 1 points

Which of the following are ways that an AP can learn of WLCs that it might join? (Choose all that apply.)

All of these
Answers: Subnet broadcast
DNS
Primed entries

All of these
DHCP
List from a previously joined controller

• Question 57
1 out of 1 points

A Cisco unified wireless network architecture consists of two controllers and a number of APs. The APs are distributed equally across the two controllers. Each AP is configured with one controller as primary and the other controller as secondary. Based on this information, which one of the following redundancy models is being used?
Selected Answer:
N+N redundancy
Answers: No redundancy
N+N+1 redundancy
N+1 redundancy

N+N redundancy

• Question 58
1 out of 1 points

Suppose that an AP is joined to the WLC that is configured as the primary controller. At a later time, that controller fails and the AP joins its secondary controller. Once the primary controller is restored to service, which feature would allow the AP to rejoin it?
Selected Answer:
AP Fallback
Answers:
AP Fallback
AP Priority
AP Failover
CAPWAP Rejoin

• Question 59
1 out of 1 points

Which one of the following authentication methods uses a certificate to authenticate the AS but not the client?
Selected Answer:
PEAP
Answers: LEAP

PEAP
EAP-FAST
EAP-TLS

• Question 60
1 out of 1 points

Which one of the following should be used to contain visitors and transient users of a wireless network?
Selected Answer:
Guest WLAN
Answers: Broadcast SSID
WPA2 enterprise

Guest WLAN
One-time WEP

• Question 61
1 out of 1 points

A centralized wireless LAN controller maintains how many code image files?
Selected Answer:
2
Answers:
2
1
Unlimited
3

• Question 62
1 out of 1 points

What is the maximum number of WLANs that can be enabled on a Cisco lightweight AP?

Selected Answer:
16

Answers: 1024
512

16

8

• Question 63
1 out of 1 points

A wireless controller port is used for which one of the following purposes?
Selected Answer:
Provide a physical connection to a switch port
Answers:
Provide a physical connection to a switch port
Construct CAPWAP tunnel packets
Provide a physical connection to an AP
Create a logical connection to a WLAN

• Question 64
1 out of 1 points

To perform an initial configuration of a converged wireless controller, to which one of the following should you connect with your web browser?
Selected Answer:
Access switch management address
Answers: Dynamic interface
Virtual interface

Access switch management address
Console port

• Question 65
1 out of 1 points

A Cisco WLC is configured for 802.1x authentication, using an external RADIUS server. The controller takes on which one of the following roles?
Selected Answer:
Authenticator
Answers:
Authenticator
Authentication server
Adjudicator
Supplicant

• Question 66
1 out of 1 points

Which one of the following correctly describes the single logical link formed by bundling all of a controller’s distribution system ports together?
Selected Answer:
LAG
Answers: PHY
DSP

LAG
GEC

• Question 67
1 out of 1 points

Which one of the following is used as the 802.11 authentication method when 802.1x is used on a WLAN?
Selected Answer:
Open authentication
Answers: WEP
EAP
WPA

Open authentication

• Question 68
1 out of 1 points

Which one of the following correctly describes a mandatory data rate?
Selected Answer:
A data rate that must be supported by a client before it can associate with an AP
Answers:
A data rate that must be supported by a client before it can associate with an AP
The highest data rate used by an AP and its clients
A data rate required by the IEEE 802.11 standards body
A data rate that must be used by wireless clients all the time

• Question 69
1 out of 1 points

Which one of the following will an AP try first in order to select a controller to join?
Selected Answer:
Primed address
Answers: Wait for a controller to send a Join Request
DHCP option 43
Least-loaded controller

Primed address
Master controller

• Question 70
1 out of 1 points

Which one of the following is used to protect the integrity of data in a wireless frame?
Selected Answer:
MIC
Answers: EAP
WEP
WIPS

MIC

• Question 71
1 out of 1 points

Which one of the following is a wireless encryption method that has been found to be vulnerable and is not recommended for use?
Selected Answer:
WEP
Answers: AES
EAP
WPA

WEP

• Question 72
2 out of 2 points

Which of the following is required to implement MFP on a WLAN to protect both the wireless infrastructure and the client? (Select all that apply.)

CCXv5

WPA2
Answers: CCXv4 or v5

CCXv5
WPA
WEP

WPA2

• Question 73
2 out of 2 points

Which two of the following file transfer methods can be used to move a centralized controller code image file onto a controller?

FTP

TFTP
Answers: RCP

FTP

TFTP
SSH
HTTP
XMODEM

• Question 74
1 out of 1 points

To save a copy of a controller’s configuration, which of the following methods could you use?
Selected Answer:
Use Commands > Upload File
Answers: Use Commands > Files > Save Configuration

Use Commands > Upload File
Use Commands > Configuration > TFTP
Use Commands > Download File

• Question 75
1 out of 1 points

Which of the following pairs of phrases makes this sentence correct? You can configure _____________ as a ______________ for a guest WLAN.
Selected Answer:
multiple controllers, mobility anchor
Answers: only one controller, mobility anchor

multiple controllers, mobility anchor
a mobility anchor, foreign controller
a foreign controller, mobility anchor

• Question 76
1 out of 1 points

Suppose you need to transfer a code image file from a TFTP server on your PC to a controller. Which of the following file copy directions should you choose?
Selected Answer:
Download
Answers: Upload

Download
None of the above; it isn’t possible to transfer an image file via TFTP
None of the above; a controller automatically gets its image from WCS/NCS/PI

• Question 77
1 out of 1 points

Which one of the following is a limiting factor when multiple WLANs are offered on an AP and its radio channel?
Selected Answer:
The airtime used for each WLAN’s beacons
Answers:
The airtime used for each WLAN’s beacons
The speed of the controller interface
The number of APs joined to the controller
Co-channel interference between WLANs on the AP

About

Leave a reply

Captcha Click on image to update the captcha .

error: Content is protected !!