Proper study guides for Improve Cisco CCNA - Wireless Associate - IUWNE certified begins with Cisco 640-722 preparation products which designed to deliver the High quality 640-722 questions by making you pass the 640-722 test at your first time. Try the free 640-722 demo right now.
Q41. - (Topic 5)
When using Cisco WCS version 7.0, which two features are available for the client troubleshooting tool when a Cisco Compatible Extensions v5 wireless client gets connected? (Choose two.)
A. Request CleanAir reports from the client
B. Send text messages to the client
C. Aggregated Cisco ACS authentication client information
D. Request the client to ping the DHCP-supplied IP gateway
E. Display a summary of client event history
If Cisco Compatible Extension Version 5 clients are available, a Messaging tab as shown in figure appears. Use this tab to send an instant text message to the user of this client. From the Message Category drop-down list, choose a message and click Send.
Figure 11-20 Messaging Tab
Q42. - (Topic 7)
What authentication method requires a certificate on both the client and authentication server?
Q43. - (Topic 1)
You are setting up a laptop to connect to the wireless network of your organization. The protocols that are used for the corporate network are WPA2 Enterprise, PEAP, and AES. Which three parameters do you need to configure in the Windows 7 wireless network properties for this connection? (Choose three.)
B. encryption type
C. authentication method
E. security type
F. IP address
On the Security tab, you can specify the following security types:
No authentication (Open)
Shared or Shared key authentication (The Security tab is the only location where you can configure shared key authentication because its use is highly discouraged.)
Based on the selected security type, you can configure either a network security key or specify and configure a network authentication method. If you specify WPA-Enterprise, WPA2-Enterprise, or 802.1x as your security type, you must configure the following (as shown in the previous figure):
Choose a network authentication methodSelect an Extensible Authentication Protocol (EAP) method and click Settings to configure the EAP type as needed.
Remember my credentials for this connection each time I’m logged on: Specifies that when the user logs off, the user credential data is not removed from the registry. If you clear the checkbox, the next time the user logs on, he will be prompted for credentials (such as user name and password).
If you specify the use of WPA-Personal or WPA2-Personal as your security type or No authentication (Open) or Shared as your security type with WEP as your encryption type, you must configure a network security key, as shown in Figure 10.
Q44. - (Topic 3)
You have brought your MacBook Pro running OS 10.6 to work and intend use the enterprise wireless network. This network is using EAP-FAST and 2.4 GHz for data and 5 GHz for VoWLAN.
Which statement about the laptop configuration and wireless connection is true?
A. Install a USB wireless adapter and configure
B. Install Apple EAP-Fast plug-in and configure
C. Install Cisco AnyConnect v2.4 and configure
D. Configure Apple network preferences for EAP-FAST
E. The laptop does not support EAP-FAST and will be unable to connect
F. The laptop only supports 5 GHz and will be unable to connect
MacBook Pro using 10.6 supports 2.4Ghz only, so the EAP-FAST should be used. 5Ghz support was added to MacBook later.
Q45. - (Topic 2)
Which two statements about the requirements to configure inter-controller roaming are true? (Choose two.)
A. The same mobility domain names are configured across controllers.
B. The same RF group names are configured across controllers.
C. The same controller hardware version is configured across controllers.
D. The same AP manager interface is configured across controllers.
E. The same virtual interface is configured across controllers.
F. The same controller software version is configured across controllers.
All controllers must be configured with the same mobility group name.
All controllers must be configured with the same virtual interface IP address.
If necessary, you can change the virtual interface IP address by editing the virtual interface name on the Controller > Interfaces page.
If all the controllers within a mobility group are not using the same virtual interface, inter-controller roaming may appear to work, but the handoff does not complete, and the client loses connectivity for a period of time.
Q46. - (Topic 2)
Which Cisco WLC command family can help to troubleshoot communication between an AP and the WLC?
A. (Cisco Controller) >debug capwap
B. (Cisco Controller) >debug ap
C. (Cisco Controller) >debug cac
D. (Cisco Controller) >debug dot11
Example debugs available for this shown below:
WLC side debug commands:
(Cisco Controller) >debug capwap?
. events Configures debug of CAPWAP events and state
. errors Configures debug of CAPWAP errors
. detail Configures debug of CAPWAP detail
. info Configures debug of CAPWAP info
. packet Configures debug of CAPWAP packet
. payload Configures debug of CAPWAP payloads
. hexdump Configures debug of CAPWAP payloads
Q47. - (Topic 7)
Wireless clients are experiencing loss of connectivity while roaming between controllers. To fix this, what configuration should be the same on all controllers within the mobility group?
A. management interface IP address
B. IP address of the virtual interface
C. AP Manager interface IP address
D. IP address of the Service Port
Q48. - (Topic 5)
Which two destinations can Cisco WCS administrators specify for a scheduled report? (Choose two.)
A. a file on the Cisco WCS
B. a specified email address
C. a specified World Wide Web server
D. a TFTP server
Reports are saved in either CSV or PDF format and are either saved to a file on WCS for
later download or e-mailed to a specific e-mail address.
The reporting types include the following:
. Current, which provides a snap shot of the data from the last polling cycle without continuously polling .
. Historical, which retrieves data from the device periodically and stores it in the WCS database .
. Trend, which generates a report using aggregated data. Data can be periodically collected based from devices on user-defined intervals, and a schedule can be established for report generation.
With WCS, you also have the ability to export any report that you can view, sort reports into logical groups, and archive for long-term storage.
Q49. - (Topic 1)
If an antenna has a dBd of 8.6, what is the dBi value?
Antenna performance is measured in dBi (the antennas gain/loss over a theoretical isotropic antenna) dBd (the antennas gain/loss over a dipole antenna)
dBi = dBd + 2.15
dBd = dBi – 2.15
Q50. - (Topic 6)
. THIS TASK DOES NOT REQUIRE DEVICE CONFIGURATION.
. To access the multiple-choice questions, click on the numbered boxes on the left of the top panel.
. There is one multiple-choice question with this task. Be sure to answer the question before selecting the Next button.
You are deploying a small wireless test network in a lab. The network is made up of a wireless controller (WLC1), a dual radio access point (AP1) and a switch (SW1) that is configured as a DHCP server. The IP subnet being used for this network is 10.10.10.0/24. You would like to test how clients join the network and from which DHCP server they receive an address.
All equipment is operational. Through which two methods can a wireless client receive an IP address when associating to the WLAN? (Choose two.)
A. The clients can receive an IP address from SW1.
B. Tie clients can receive an IP address from WLC1.
C. The clients will not receive an IP address from either DHCP server because of overlapping address ranges.
D. The clients can receive an IP address in a round-robin manner from either SW1 or WLC1.
E. The clients can use a static IP address.
As shown below, the DHCP server functionality has been enabled on the WLC1. Aside from DHCP, all clients can always statically assign themselves an IP address.
To know more about the 640-722, click here.