Act now and download your Cisco 200-355 test today! Do not waste time for the worthless Cisco 200-355 tutorials. Download Far out Cisco Implementing Cisco Wireless Network Fundamentals exam with real questions and answers and begin to learn Cisco 200-355 with a classic professional.
Q21. A company wants to implement wireless in all 20 remote office locations and wants centralized management of these remote sites. What application would meet the requirements?
A. Control And Provisioning of Wireless Access Points
B. Cisco point- to multi-point wireless bridging
C. Cisco autonomous access points in FlexConnect mode
D. Split MAC architecture utilizing LWAPP and WLC
Answer: D
Q22. When the enterprise-based authentication method is used for WPA2, a bidirectional handshake exchange occurs between the client and the authenticator.
Which five options are results of that exchange being used on a controller-based network? (Choose five.)
A. a bidirectional exchange of a nonce used for key generation
B. binding of a Pairwise Master Key at the client and the controller
C. creation of the Pairwise Transient Key
D. distribution of the Group Transient Key
E. distribution of the Pairwise Master key for caching at the access point
F. proof that each side is alive
Answer: A,B,C,D,F
Q23. Which CLI command is used on a Cisco WLC to troubleshoot mobility, rogue detection, and load-balancing events?
A. debug dot11
B. debug capwap all
C. show dot11 details
D. show capwap details
Answer: A
Q24. How many dBm is 40 mW?
A. 10 dBm
B. 16 dBm
C. 20 dBm
D. 22 dBm
E. 40 dBm
Answer: B
Q25. An engineer is adding a controller to a WCS. What three categories of parameters are needed? (Choose three.)
A. IP parameters
B. SNMP Parameters
C. Mobility Parameters
D. Telnet/SSH Parameters
E. TFTP Parameters
F. RADIUS Parameters
Answer: A,B,D
Q26. What are two wireless configuration utilities for Apple Mac computers? (Choose two.)
A. AirPort
B. AirPort Extreme
C. AirManager
D. AirManager Supreme
E. AirAssistant Ultimate
Answer: A,B
Q27. A customer has a corporate SSID that is configured to authenticate against an ACS server to validate client credentials on the corporate SSID. The customer has a firewall logically positioned on the network between the WLC and the ACS server in the network architecture. Which port must the firewall allow to ensure that authentication can occur?
A. 43
B. 1812
C. 5146
D. 8143
Answer: B
Q28. What is the function of the Cisco AnyConnect DART tool?
A. creates a compressed bundle of client logs and information
B. visualizes a WLAN environment, showing the possible locations of problems
C. gathers statistics from neighboring clients for comparison to the baseline
D. helps to troubleshoot a WLAN connection by using easy-to-use wizards and statistic viewers
Answer: A
Q29. The existing Cisco Unified Wireless Controller is running version 7.0 code for both the controllers and the Cisco WCS. A controller has been configured with an appropriate rogue rule condition to report discovered APs to the Cisco WCS.
Which default alarm level is used to display all rogue APs in the Alarm Summary?
A. Critical
B. Flash
C. Urgent
D. Major
E. Minor
Answer: E
Q30. What authentication method requires a certificate on both the client and authentication server?
A. PEAP
B. EAP-TLS
C. EAP-FAST
D. WPA-PSK
E. WEP
F. EAP-TTLS
Answer: B
To know more about the 200-355, click here.