642-586

Advanced Wireless LAN for System Engineers


QUESTION NO: 1
How many access points can be placed on a floor map in Cisco WCS?
A. 200
B. 100
C. 150
D. 50
Answer: B


QUESTION NO: 2
When designing a wireless VoIP network and using the G.711 codec, what is the maximum number of concurrent calls for a single 802.11b cell?
A. 7
B. 9
C. 5
D. 11
Answer: A


QUESTION NO: 3
Which feature was introduced in Cisco Compatible Extensions program version 2?
A. EAP-Cisco Wireless (LEAP)
B. radio management
C. EAP-FAST
D. WMM
Answer: B


QUESTION NO: 4
Which component of the Cisco Integrated Security Solution is responsible for preventing Day Zero security risks, such as Internet worms?
A. Cisco Secure ACS
B. CiscoWorks Wireless LAN Solution Engine
C. Cisco Security Agent

D. Cisco Catalyst 6500 Series wireless LAN services module
Answer: C


QUESTION NO: 5
Which security protocols are supported by a REAP in standalone mode?
A. TLS, WEP, and WPA TKIP
B. WEP, WPA-PSK, and WPA2-PSK
C. WPA AES, WPA-PSK, and WPA2-PSK
D. WPA-PSK, PEAP MSCHAP, and WEP
Answer: B


QUESTION NO: 6
An integrated services router that is configured as a backup RADIUS server for wireless clients can support a maximum of how many user accounts?
A. 400 to 500
B. 900 to 1000
C. none
D. 1 to 50
Answer: B

QUESTION NO: 7
Which two AAA servers are supported by the Cisco wireless LAN controller? (Choose two.)
A. Interlink
B. Aradial Technologies
C. Meetinghouse
D. Cisco Secure ACS
E. Microsoft Internet Authentication Service
Answer: D,E
QUESTION NO: 8

A wireless using core feature set products uses which protocol for radio management?
A. SNMP
B. WLCCP
C. CCKM
D. LWAPP
Answer: B


QUESTION NO: 9
Which three are key components of a site survey? (Choose three.)
A. documentation
B. pre-survey assessment
C. facility walkthrough
D. access point staging
E. client configuration
F. coverage verification
Answer: A,B,C
QUESTION NO: 10 DRAG DROP
Drag Drop question

Answer: QUESTION NO: 11



In a non-WDS environment, the local authentication services on an autonomous access point can be used to authenticate which three devices? (Choose three.)
A. clients that are using the native Microsoft wireless supplicant
B. nonroot bridge
C. workgroup bridge
D. repeater access point
E. root access point
F. root bridge
Answer: B,C,D
QUESTION NO: 12
A customer is initially deploying 37 lightweight access points per site with local WLAN controllers at each site. If the customer plans to expand to a maximum of 45 access points, which WLAN controller is most appropriate?
A. Cisco 4402 Wireless LAN Controller
B. Cisco 4404 Wireless LAN Controller
C. Cisco 4136 Wireless LAN Controller
D. Cisco 2006 Wireless LAN Controller
Answer: A
QUESTION NO: 13

A customer wants to use the 4.9-GHz band to provide connectivity for public service vehicles. The customer also wishes to have 802.11 wireless connectivity from PDAs to the vehicles. Which configuration option would provide the desired support?
A. 4.9-GHz interface in access point mode, 802.11 interface in bridge mode
B. 4.9-GHz interface in access point mode, 802.11 interface in access point mode
C. 4.9-GHz interface in bridge mode, 802.11 interface in access point mode
D. 4.9-GHz interface in bridge mode, 802.11 interface in bridge mode

Answer: C


QUESTION NO: 14
Which threat is detected by the WLSE?
A. phishing attacks
B. out-of-date antivirus definitions
C. rogue access points
D. malware
Answer: C


QUESTION NO: 15
How is the bridge group name used in a wireless mesh deployment?
A. It is used as a password in communication preceding LWAPP.
B. It is used to join the outdoor mesh network with the controller mobility group.
C. It is used to retrieve the secret shared key.
D. It logically groups access points to avoid interference from neighboring networks.
Answer: D

QUESTION NO: 16
Which two threats are detected by the Cisco WCS? (Choose two.)
A. malware
B. spam
C. denial of service attacks
D. rogue access points

E. out-of-date antivirus definitions
Answer: C,D
QUESTION NO: 17
Which statement describes how RSSI information is processed in a WLAN with a location manager using advanced feature set products?
A. The location appliance computes the RSSI information.
B. WLAN controllers compute RSSI information.
C. Access points aggregate RSSI information.
D. The WCS collects the RSSI information from the 802.11 devices.

Answer: A


QUESTION NO: 18
The WLSE Express local authentication server supports a maximum how many clients?
A. 300
B. 2500
C. 1000
D. 100
Answer: C


QUESTION NO: 19
What is used to encrypt data traffic between the access point and the controller?
A. Data traffic is encrypted with MD5 hashing.
B. Data traffic is encrypted with AES CCMP.
C. Data traffic is not encrypted.
D. Data traffic is encrypted with AES CBMAC.
Answer: C
QUESTION NO: 20

OFDM provides which improvement over DSSS in the 2.4-GHz range?
A. greater resistance to multipath interference
B. morenonoverlapping channels
C. more bandwidth per channel
D. full duplex communication
Answer: A


QUESTION NO: 21
Implementing Wireless Domain Services on an autonomous access point provides which two benefits? (Choose two.)
A. radio management
B. local authentication services
C. quality of service
D. VLAN support
E. fast secure roaming
Answer: A,E
QUESTION NO: 22
The Cisco 3200 Series mobile access router has integrated wireless support for which two frequency ranges? (Choose two.)
A. 2.400 to 2.4835 GHz
B. 5.150 to 5.250 GHz
C. 5.725 to 5.825 GHz
D. 4.940 to 4.990 GHz
E. 900 to 928 MHz
Answer: A,D


QUESTION NO: 23
Which three authentication methods are supported by Cisco Secure ACS? (Choose three.)
A. EAP-TTLS
B. EAP-PEAP


C. EAP-SIM
D. EAP-FAST
E. EAP-MD5
F. EAP-Cisco Wireless (LEAP)
Answer: B,D,F

QUESTION NO: 24
The Worthington, Lane, Andrews and Newton manufacturing company has three facilities that are located in the city of Columbia, South Carolina, with the corporate office located in downtown Columbia. The R&D facility is located on the north side of the city 4 miles (6.4 km) from the corporate office, and is leasing office space in a five-story building. The manufacturing facility is located 6 miles (9.6 km) to the northwest of the corporate office and 2 miles (3.2 km) west of the R&D facility. Users at the manufacturing plant require network connectivity for file sharing and e-mailing, while the users at the R&D facility require high-speed Internet access with the ability to send large CAD drawings to the corporate office and large machine control files to the manufacturing facility. Presently, the manufacturing facility is connected to the corporate office by a 64-Kbps leased-line, and the R&D facility is connected to both the corporate office and the manufacturing facility by a dedicated T1 line. The company plans to add a second line of development at the R&D facility within the next 60 days. However, the current T1 lines are at a constant 70-percent utilization rate. Currently, a T1 line costs US$750 per month for each line. The current projected lead time for installation of additional lines is 90 days, if the current cable plant will support it. A wireless bridging solution would provide which three benefits to the customer? (Choose three.)
A. guaranteed bandwidth
B. immunity to weather
C. rapid deployment
D. increased bandwidth
E. elimination of monthly charges
F. lower total cost of ownership
Answer: C,D,F


QUESTION NO: 25
Which two threats are detected by means of the Cisco Network Admission Control? (Choose two.)
A. spam
B. rogue access points

C. malware
D. denial of service attacks
E. out-of-date antivirus definitions
Answer: C,E
QUESTION NO: 26
When using Cisco advanced feature set products, integrated guest access supports how many users?
A. 2500
B. 1000
C. 2000
D. 1500


Answer: A


QUESTION NO: 27
The local authentication service on an autonomous access point supports which two authentication types? (Choose two.)
A. EAP-TLS
B. PEAP-MSCHAP
C. EAP-FAST
D. PEAP-GTC
E. EAP-Cisco Wireless (LEAP)
Answer: C,D

QUESTION NO: 28
Which two statements correctly describe the Cisco Catalyst Wireless Services Module (WiSM)? (Choose two.)
A. It supports up to 200 access points per module.
B. It has a maximum of four modules per chassis.
C. It has a maximum of six modules per chassis.
D. It supports up to 100 access points per module.
E. It has a maximum of five modules per chassis.

F. It supports up to 300 access points per module.
Answer: E,F

QUESTION NO: 29
Which two key features are unique to the wireless advanced feature set using lightweight access points? (Choose two.)
A. dynamic RF control without advanced management
B. access point registration via digital certificate
C. rogue access point detection
D. fast secure roaming
E. access point participation in RF management
Answer: A,B

QUESTION NO: 30
Which feature was introduced in Cisco Compatible Extensions program version 1?
A. radio management
B. WMM
C. EAP-Cisco Wireless (LEAP)

D. EAP-FAST
Answer: C
QUESTION NO: 31
Which proposed IEEE 802.11 standard will increase the data rate beyond 54 Mbps?
A. 802.11s
B. 802.11n
C. 802.11j
D. 802.11c
Answer: B
QUESTION NO: 32

The Cisco 4404 Wireless LAN Controller will support a maximum of how many REAPs?
A. 200
B. 150
C. 100

D. 50


Answer: C


QUESTION NO: 33
When using the Cisco Wireless IP Phone 7920, a separate voice VLAN is recommended. Which two security statements indicate why? (Choose two.)
A. Quality of service can be applied to the voice VLAN.
B. The Cisco Wireless IP Phone 7920 uses Cisco Wireless (LEAP).
C. The Cisco Wireless IP Phone 7920 uses 802.11b.
D. The voice VLAN can provide Layer 3 fast secure roaming.
E. Appropriate ACLs can be applied to the voice VLAN.
Answer: B,E
QUESTION NO: 34
A customer brings you a previously completed site survey for the initial wireless implementation from 12 months ago. The customer currently has six access points deployed in the facility. The survey shows that installed coverage provides for a 15-percent overlap between cells at a data rate of 5.5 Mbps, and a 5-percent overlap at a data rate of 11 Mbps. In this scenario, the site survey shows that this installation would be adequate to support what?
A. data collection
B. wireless VoIP
C. videoconferencing
D. 802.11a clients

Answer: A


QUESTION NO: 35
Which property of the advanced feature set products prevents rogue access points from attaching to the network?

A. All management traffic is encrypted between the access point and the controller.
B. The controller does not retain its configuration when it is removed from the network.
C. The access point and the controller use X.509 certificates to verify identity.
D. The access point does not retain its configuration when it is removed from the network.
Answer: C


QUESTION NO: 36
When using advanced feature set products and web authentication, integrated guest access allows secure guest authentication via which protocol?
A. Cisco Wireless
B. IPSec
C. HTTPS
D. PEAP-GTC
Answer: C


QUESTION NO: 37
In a mesh network, what is the recommended hop count limit of a pole-top access point from its associated roof-top root access point?
A. 8
B. 10
C. 4
D. 2
Answer: C
QUESTION NO: 38
Which method is used to determine the best path across a wireless mesh network?
A. hop count
B. STP
C. AWP

D. EIGRP
Answer: C QUESTION NO: 39



Which two statements correctly describe the Cisco Catalyst Wireless Services Module (WiSM)? (Choose two.)
A. It requires a supervisor 32 or 720.
B. It requires a supervisor 720 only.
C. It requires a supervisor 32 only.
D. It has a maximum of 18 modules per mobility group.
E. It has a maximum of 24 modules per mobility group.
F. It has a maximum of 12 modules per mobility group.
Answer: B,F
QUESTION NO: 40
When designing a wireless VoIP network, what is the recommended lowest data rate?
A. 2 Mbps
B. 5.5 Mbps
C. 11 Mbps
D. 1Mbp
Answer: C


QUESTION NO: 41
The WLSE can update firmware on which two devices? (Choose two.)
A. bridge
B. switch
C. router
D. access point
E. client
Answer: A,D
QUESTION NO: 42

Which three authentication methods are supported on the WLSE Express local authentication server? (Choose three.)
A. EAP-PEAP
B. EAP-TTLS
C. EAP-MD5
D. EAP-Cisco Wireless (LEAP)

E. EAP-SIM
F. EAP-FAST
Answer: A,D,F

QUESTION NO: 43
A customer brings you a previously completed site survey for the initial wireless implementation from 12 months ago. The customer currently has six access points deployed in the warehouse. The survey shows that the installed coverage provides for a 15-percent overlap between cells at
5.5 Mbps, and a 5-percent overlap at 11 Mbps. This solution has proven to provide adequate coverage and roaming capabilities for the data applications. However, the customer has recently moved to a VoIP telephony solution and has attempted to add seven Cisco 7920 wireless IP phones with limited success. Why has the customer only had limited success with the current deployment to meet the data needs?
A. inadequate data rate
B. inadequate overlap
C. too many Cisco 7920 wireless IP phones per access point
D. inadequate throughput
Answer: B


QUESTION NO: 44
Which security feature was introduced in Cisco Compatible Extensions program version 3?
A. radio management
B. AES
C. EAP-Cisco Wireless (LEAP)
D. CKIP and CMIC
Answer: B QUESTION NO: 45



A customer is adding a new branch office with 60 access points and 120 users that requires WDS to support a wireless VoIP application on a single subnet. Additionally, the customer requires local authentication services to provide authentication capability in the event of a WAN failure. Which product will support the customer requirements?
A. Cisco 3745 Multiservice Access Router
B. Cisco 2851 Integrated Services Router
C. Cisco 2811 Integrated Services Router
D. Cisco 3845 Integrated Services Router
Answer: D


QUESTION NO: 46
Which advanced feature set device is provided with a Kensington lock slot?
A. switch
B. controller
C. Cisco WCS
D. access point
Answer: D


QUESTION NO: 47
A wireless security assessment has been performed for a network that is composed of Windows 2000 and Windows XP wireless clients. The client wishes to use 802.1x authentication using certificate services. Which EAP types are appropriate?
A. PEAP-MSCHAP and EAP-Cisco Wireless (LEAP)
B. EAP-Cisco Wireless (LEAP) and PEAP-GTC
C. PEAP-GTC and EAP-FAST
D. EAP-Cisco Wireless (LEAP) and EAP-FAST
Answer: D
QUESTION NO: 48
Which two activities are included in a Wireless Security Posture Assessment? (Choose two.)

A. find WLAN traffic that is leaking from the customer building
B. check access point configurations and compare them against recommended security practices
C. scan all host systems and log all open ports
D. ensure that the client is using a strong password policy
E. check all systems to ensure that the patches are being applied in a timely manner
Answer: A,B
QUESTION NO: 49
Which three faults are generated by radio management? (Choose three.)
A. ad-hoc networks
B. friendly access point
C. rogue access point
D. AAA server availability
E. securitymisconfiguration
F. interference detection
Answer: A,C,F

QUESTION NO: 50
Centralized authentication with Cisco Secure ACS provides which security benefit to the WLAN?
A. CHAP
B. PEAP-GTC
C. PAP
D. MD5


Answer: B


QUESTION NO: 51
Typical mesh access-point placements in a suburban environment should be separated by how many feet?
A. the average reachable distance that a backhaul link is capable of establishing
B. 300 to 350 feet
C. 800 to 1000 feet
D. 100 to 150 feet

Answer: B


QUESTION NO: 52 DRAG DROP
Drag Drop question

Answer:


QUESTION NO: 53
How many WLAN controllers can Cisco WCS, with a base default license, support?
A. 125
B. 100
C. 50
D. 75
Answer: C



QUESTION NO: 54 DRAG DROP
Drag Drop question

Answer:


QUESTION NO: 55
A customer has a small remote site with 10 access points. In which scenario would a WLSE Express be appropriate to implement?
A. EAP-FAST security is required and an AAA server is available.
B. EAP-Cisco Wireless (LEAP) security is required and no external AAA server is available.
C. EAP-FAST security is required and no external AAA server is available.

D. EAP-Cisco Wireless (LEAP) security is required and an external AAA server is available.
Answer: C


QUESTION NO: 56
Which EAP authentication is used by the Cisco Wireless LAN controller for local authentication?
A. EAP-TLS
B. PEAP-GTC
C. EAP-MD5
D. PEAP-MSCHAP
E. No EAP authentication is used.

Answer: E


QUESTION NO: 57
Which device, which uses advanced feature set products, encrypts and decrypts client data?
A. switch
B. Cisco WCS
C. controller
D. access point
Answer: D


QUESTION NO: 58
The Cisco wireless LAN controller supports multiple secure authentication types. Which authentication type provides Layer 3 security?
A. IPSec
B. WPA2
C. AirFortress
D. Cranite
Answer: A
QUESTION NO: 59 DRAG DROP

LAB

Answer:



QUESTION NO: 60
Which property of the advanced feature set products protects against the loss of network information, such as passwords and IP addressing schemes, in case of access point theft?
A. The controller does not retain its configuration when it is removed from the network.
B. All management traffic is encrypted between the access point and the controller.
C. The access point does not retain its configuration when it is removed from the network.
D. The access point and the controller use X.509 certificates to verify identity.
Answer: C QUESTION NO: 61


How many prior configuration versions can be archived on the WLSE?
A. eight
B. six
C. four
D. two
Answer: C


QUESTION NO: 62
Which authentication mechanism was introduced in Cisco Compatible Extensions program version 2?
A. PEAP-GTC
B. AES
C. EAP-Cisco Wireless (LEAP)
D. CKIP and CMIC

Answer: A


QUESTION NO: 63
Which product manages the Cisco 2700 Series wireless location appliance?
A. integrated services router
B. CiscoWorks for Mobile Wireless
C. wireless LAN controller
D. Wireless Control System
Answer: D


QUESTION NO: 64
When a wireless controller loses connectivity to a remote Cisco Aironet 1030 Lightweight Access Point, what will be the next step for that remote access point?

A. continue to provide local connectivity
B. lose its configuration
C. support no more than 10 wireless clients
D. disconnect all associated clients
Answer: A


QUESTION NO: 65
Which WEP key protection method was introduced in Cisco Compatible Extensions program version 1?
A. AES
B. EAP-Cisco Wireless (LEAP)
C. CKIP and CMIC
D. radio management

Answer: C


QUESTION NO: 66
The Cisco WCS logs which two security events? (Choose two.)
A. securitymisconfigurations on the controller
B. rogue access points
C. TKIP/MIC failures
D. wireless protocol analyzer detection
E. rogue clients
Answer: B,E
QUESTION NO: 67
The Cisco 2700 Series wireless location appliance can store up to how many days of historical information?
A. 15
B. 90
C. 60
D. 30



Answer: D


QUESTION NO: 68
The WLAN IDS that is provided by Cisco protects the network if a client has not received the proper antivirus updates. Which action is taken by the WLAN IDS until the client has received the updates?
A. quarantine the client
B. remotelydisable the client network card
C. disassociate the client
D. issue a remote shutdown command to the client
Answer: A


QUESTION NO: 69
What is a component of the Cisco trust and identity management system?
A. CiscoWorks WLSE
B. Cisco Secure ACS
C. Cisco WCS
D. Cisco WLAN controller
Answer: B


QUESTION NO: 70
A customer in the United States requires connectivity between two campus locations that are located 6 miles (9.65 km) apart. The customer also needs a minimum data rate of 54 Mbps in an area that is known to have 2.4-GHz interference. Choose two appropriate devices that will provide a bridge link and avoid the interference. (Choose two.)
A. CiscoAironet 1242AG Access Point
B. CiscoAironet 1100 Series access point
C. CiscoAironet 1400 Series wireless bridge
D. CiscoAironet 1210 Series access point
E. CiscoAironet 1300 Series outdoor access point/bridge
Answer: A,C Explanation:

New Questions = 64


QUESTION NO: 71
In controller-based architecture, a control message sent between the access point and the controller is secured using which protocol?
A. AES
B. TKIP
C. LWAPP
D. CCKM
Answer: A


QUESTION NO: 72
In the U.S no licensing is required for which four RF bands?
A. 902-928 MHz
B. 2.400-2.483 GHz
C. 5.150-5.350 GHz
D. 5.725-5.825 GHz
Answer: A,B,C,D
QUESTION NO: 73
The Cisco WLAN controller examines a variety of real-time RF characteristics to efficiently handle channel assignments. These characteristics include which three of the following? (Choose three.)
A. utilization
B. noise
C. switch load
D. client load
Answer: A,B,D
QUESTION NO: 74

Before a Cisco Unified Wireless IP Phone 7920 can place a call, it will compare the QBSS in the beacon from the access point with the QBSS threshold on the phone. What action will the Unified Wireless IP Phone 7920 take if the QBSS threshold in the beacon is exceeded?
A. place the call
B. prompt network busy
C. prompt number busy
D. disconnect from access point

Answer: B


QUESTION NO: 75
What is the relationship between data rate and cell size (coverage area)?
A. The highest data rate has the largest cell size.
B. The lowest data rate has the smallest cell size.
C. The highest data rate has the smallest cell size.
D. Only the transmit power and antenna gain control the cell size not the data rate.
Answer: C


QUESTION NO: 76
The typical antenna for a root bridge in a multipoint deployment is a(n)
A. Yagi antenna
B. Sector antenna
C. Parabolic dish antenna
D. Omni-directional antenna
Answer: D

QUESTION NO: 77
How many signatures does the Cisco IPS 4200 Series Sensor platform support?
A. up to 1400 signatures
B. 1500 to 1600 signatures
C. 1600 to 1700 signatures
D. more than 1700 signatures

Answer: D


QUESTION NO: 78
Which two benefits does server-based authentication offer over standard WEP? (Choose two.)
A. it uses TACACS for authentication.
B. it uses dynamic session-based keys.
C. Authentication is based upon user name and password.
D. it keeps the WEP keys the same for all users for ease of use.
Answer: B,C
QUESTION NO: 79
What are three benefits of using EAP/802.1X authentication for WLAN networks? (Choose three.)
A. detects802.11 radio interference
B. dynamically generates key material for encrypting data packets
C. provides mutual authentication between the user and the network
D. allows the IT administrator to implement user or user-group based policies (such as dynamic VLAN assignment)
Answer: B,C,D

QUESTION NO: 80
Please match the Answer definition to the appropriate phase.
(1)Specification:Cisco provides specification to WLAN silicon providers. (2)Compatibility:Approved products are marked. (3)lnteroperability Test: Devices are tested by approved third-party vendor against the specification
(l)Phase 1 (ll)Phase 2 (lll)Phase 3
A. (l)-(1)i(IIH3)i(IIIH2)
B. (I)-(1);(IIH2);(IIIH3)
C. (lH3);(ll)-(1);(lll)-(2)


D. (I)-(3);(II)-(2);(IIIH1)


Answer: A


QUESTION NO: 81
A wireless security assessment has been performed for a network that is composed of Windows 2000 and Windows XP wireless clients. The customer wishes to use IEEE 802.1X authentication using certificate services. Which EAP-type combinations are appropriate?
A. PEAP-GTC and EAP-MD5
B. PEAP-MSCHAP and EAP-TLS
C. PEAP-MSCHAP and EAP-SIM
D. EAP-Cisco Wireless (Cisco LEAP) and PEAP-GTC
Answer: B


QUESTION NO: 82
In order to prevent many common attacks against WU\Ns from becoming effective, Management Frame Protection should be implemented in which mode?
A. infrastructure only
B. client only
C. client and infrastructure
D. controller only
Answer: C


QUESTION NO: 83
Which three devices are required to implement a Cisco 2700 Series Wireless Location Appliance? (Choose three.)
A. wireless controller
B. wireless domain server
C. Cisco Wireless Control System
D. controller-based access point
Answer: A,C,D QUESTION NO: 84


The Cisco Wireless LAN Controller can support a maximum of how many VLANs?
A. 16VLANs,oneperSSID
B. 8 VLANS, one per SSID
C. 512 VLANs
D. 4095 VLANS
Answer: C


QUESTION NO: 85
Which three wireless intrusion-prevention signatures are part of the standard signature set provided by the Wireless LAN Controller? (Choose three.)
A. fake access point detection
B. rogue network detection
C. NetStumbler detection
D. deauth flood detection
Answer: A,C,D
QUESTION NO: 86
Which of the following statements are true regarding the benefits of the guest tunnel and auto-anchor mobility features of WLAN controllers? (Choose three.)
A. They allow the implementation of geographic access policies, which can restrain client traffic to a specificsubnetwork, regardless of its physical location.
B. Prime application is "guest WLAN," in which it is desirable to limit guest access to the corporate network by first passing through the corporate firewall, maintaining consistent security policies.
C. The auto-anchor mobility feature tunnels all client traffic from a specific WLAN (SSID) to a specific WLAN controller to provide a physical IP point of presence.
D. only one controller may be specified as the mobility anchor for a given WLAN.
Answer: A,B,C

QUESTION NO: 87
At the end of the time frame set by the Lobby Ambassador for the guest user account to be active, which of the following actions must be taken by the administrator regarding the deletion of the

account, if it exists on multiple controllers?
A. The administrator must delete the account from the local net user database on all controllers.
B. The administrator must delete the template from the Cisco WCS.
C. Take no action, the WLAN controller will generate an SNMP trap and delete the account.
D. Take no action, the WLAN controller will generate an SNMP trap and the Cisco WCS will delete the account.

Answer: D


QUESTION NO: 88
Location Manager is a component of which device's user interface?
A. WLSE
B. Cisco ACS Server
C. Cisco Access Point
D. Cisco Client Adapters

Answer: A


QUESTION NO: 89
An 802.11a radio utilizes what technique to transmit its signal?
A. IR
B. DSSS
C. FHSS
D. OFDM
Answer: D


QUESTION NO: 90
Guest tunneling is a feature used for the guest WLAN. How many tunnels can a virtual anchor WLAN controller support?
A. 30
B. 40
C. 50
D. 60


Answer: B


QUESTION NO: 91
The Newton manufacturing company has three facilities that are located in Columbia, South Carolina. The corporate office is located in an 11-story building downtown. The R&D facility is located on the north side of the city approximately 4 miles (6.4 km) from the corporate office in a five-story building. The manufacturing facility is located approximately 6 miles (9.6 km) to the northwest of the corporate office. Line of sight exists from the downtown office to all facilities. Users at the manufacturing plant require network connectivity for file sharing and e-mail, while the users at the RSD facility require high-speed Internet access with the ability to send large CAD drawings to the corporate office and large machine control files to the manufacturing facility. Presently, the manufacturing facility is connected to the corporate office by a 64-kbps leased line, and the RSD facility is connected to both the corporate office and the manufacturing facility by a dedicated T1 line. The company plans to add a second line of development at the RSD facility within the next 60 days. The current T1 lines are at a constant 70-percent utilization rate. The current projected lead time for installation of additional lines is 90 days if the current cable plant will support it.
A wireless bridging solution would provide which three benefits to the customer? Choose three.)
A. rapid deployment
B. immunity to weather
C. increased bandwidth
D. lower total cost of ownership
Answer: A,C,D
QUESTION NO: 92
The source port of LWAPP Layer 3 data traffic is UDP port 1024 or greater. What is the ciestination port?
A. 12222
B. 12223
C. 12224
D. 12225
Answer: A QUESTION NO: 93




Which three items are associated with the wireless standalone product set? (Choose three.)
A. Wireless LAN Context Control Protocol
B. Lightweight Access Point Protocol
C. Wireless Domain Services
D. CiscoWorks Wireless LAN Solution Engine
Answer: A,C,D
QUESTION NO: 94
What is the minimum recommended dBm when designing a VoIP network with 11-Mbps cells, and no more than one access point per overlapping channel set?
A. -35
B. -56
C. -67
D. -86


Answer: C


QUESTION NO: 95
What functions does the WLSE perform?
A. rogue AP shutdown and automatic client card configuration
B. security, configuration, and firmware management of Cisco APs
C. facilitation of automatic configuration of APs and client and firmware management
D. facilitation of automatic configuration of APs, security management, and management of non-Cisco APs
Answer: B

QUESTION NO: 96
What is the maximum round-trip delay that an H-REAP will tolerate from a centralized controller?
A. 100 milliseconds
B. 500 milliseconds
C. 1000 milliseconds

D. 1500 milliseconds
Answer: A


QUESTION NO: 97
When attempting to connect to the WLAN using HTTP authentication, a client is automatically redirected to a login page. The login page is on which device that uses the controller-based products?
A. Cisco Location Appliance
B. Cisco WCS
C. access point
D. wireless LAN controller
Answer: D


QUESTION NO: 98
Cisco Identity Based Network Services used with Cisco Secure ACS provides which two of the following benefits? (Choose two.)
A. high accuracy location of identity-based users
B. flexible policy assignments such as per-user quotas and virtual LAN assignments
C. strong mutual authentication using public key infrastructure, tokens, and smart cards
D. user accounting and auditing and the ability to track and display users on a map
Answer: B,C

QUESTION NO: 99
Which two statements are true? (Choose two.)
A. Bridge in root mode will connect to bridge in root.
B. Bridge in root mode will connect to bridge in non-root.
C. Bridge in non-root mode will connect to Access Point in root.
D. Access point in non-root mode will associate to a bridge in root mode.
Answer: B,D QUESTION NO: 100


What is the angle of coverage that an antenna radiates?
A. gain
B. diversity
C. bandwidth
D. beamwidth
Answer: D


QUESTION NO: 101
Which statement describes how RSSI information is processed in a WLAN with a location appliance using controller-based products?
A. Access points aggregate RSSI information.
B. WLAN controllers compute RSSI information.
C. The location appliance collects the RSSI information.
D. The Cisco WCS collects and aggregates the RSSI information and forwards it to the location appliance.
Answer: C


QUESTION NO: 102
Which two cables are used to connect a network device to the RJ 45 port of the Power Injector for the 1400 Series Wireless Bridge? (Choose two.)
A. cross over
B. coaxial cable
C. straight through
D. Cisco serial console port cable
Answer: A,C

QUESTION NO: 103
What is the calculation formula for EIRP?
A. Antenna gain - Transmitter Power + Cable Loss
B. Transmitter Power + Antenna Gain - Cable Loss

C. Cable Loss + Antenna Gain - Receiver Sensitivity
D. Cable Loss + Receiver Sensitivity + Antenna Gain
Answer: B


QUESTION NO: 104
Which one of the following integrated services routers supports the integrated 2.4-GHz b/g access points?
A. Cisco 1812
B. Cisco 1811
C. Cisco 1841
D. Cisco 1803
Answer: C


QUESTION NO: 105
Which three values are required to be configured in ACS when adding an AP to the ACS database? (Choose three.)
A. broadcastWEP key
B. RADIUS shared secret
C. AP hostname or IP address
D. unique name for AP (AAA client) in ACS database
Answer: B,C,D
QUESTION NO: 106
A community wants to give officers access to the station house's server when they are on the road to view police records, which could help avert potential deadly and threatening individuals. The design has several bridges distributed throughout the city to provide coverage in every area of the city .What antenna would be most appropriate on the police cruiser?
A. anomni-directional antenna
B. a directional antenna (Yagi)
C. a directional antenna (patch)
D. anisotropically designed antenna


Answer: A


QUESTION NO: 107
Which two cables are used to connect a network device to the RJ 45 port of the Power Injector for the 1400 Series Wireless Bridge? (Choose two.)
A. cross over
B. coaxial cable
C. straight through
D. Cisco serial console port cable
Answer: A,C
QUESTION NO: 108
In adhoc mode, the Cisco Aironet wireless PCMCIA client can talk to which two devices? (Choose two.)
A. CiscoAironet Access Points
B. CiscoAironet PCI wireless adapter
C. CiscoAironet PCMCIA wireless adapter
D. CiscoAironet Workgroup Bridge (WGB)
Answer: B,C

QUESTION NO: 109
Which feature should you implement to detect a hacker invoking denial-of-service attacks, flooding the network with associations and probes, inserting rogue access points, and affecting network performance by attacking the quality of service?
A. custom signature monitoring
B. Management Frame Protection
C. Cisco Message Integrity Check
D. NTP synchronization
Answer: B
QUESTION NO: 110

Which statement about non-overlapping channels is true?
A. Non-overlapping channels share the same frequencies to improve roaming.
B. Non-overlapping channels use different frequency bands to improve roaming.
C. Non-overlapping channels share the same frequencies but use different modulations to avoid interference.
D. Non-overlapping channels use the same frequency band but use non-shared frequencies to avoid interference

Answer: D


QUESTION NO: 111
The Newton Manufacturing Company has three facilities that are located in Columbia, South Carolina. The corporate office is located in an 11-story building downtown. The R&D facility is located on the north side of the city approximately 4 miles (6.4 km) from the corporate office in a five-story building. The manufacturing facility is located approximately 6 miles (9.6 km) to the northwest of the corporate office. Line of sight exists from the downtown office to all facilities. Users at the manufacturing plant require network connectivity for file-sharing and e-mail, while the users at the R&D facility require high-speed Internet access with the ability to send large CAD drawings to the corporate office and large machine control files to the manufacturing facility. Presently, the manufacturing facility is connected to the corporate office by a 64-kbps leased line, and the R&D facility is connected to both the corporate office and the manufacturing facility by a dedicated T1 line. The company plans to add a second line of development at the R&D facility within the next 60 days. The current T1 lines are at a constant 70 percent utilization rate. The current projected lead time for installation of additional lines is 90 days if the cable plant will support it.
Which deployment option would provide the most benefit to the customer?
A. point-to-point link from corporate to manufacturing, and a point-to-point link from corporate to R&D
B. point-to-multipoint solution with the root bridge located at the manufacturing facility
C. point-to-multipoint solution with the root bridge located at the corporate office
D. point-to-multipoint solution with the root bridge located at the R&D facility
Answer: D
QUESTION NO: 112
How many SSIDs are supported on a standalone access point with dual radios?

A. 8
B. 12
C. 16
D. 20
Answer: C


QUESTION NO: 113
Under which web interface page can a user configure a single SSID?
A. VU\N
B. SNMP
C. Security Page
D. Express Setup

Answer: D


QUESTION NO: 114
Which two individual user parameters can be restricted by administrators of controller-based wireless networking using Identity Based Networking Services? (Choose two.)
A. IP restrictions
B. RF utilization
C. time restrictions
D. password length enforcement
Answer: A,B

QUESTION NO: 115
What is required to launch a dictionary attack against an EAP authentication algorithm?
A. userid or login
B. encryption key
C. master session key
D. RADIUS shared secret
Answer: A QUESTION NO: 116


Which authentication mechanism was introduced in Cisco Compatible Extensions version 2?
A. AES
B. Cisco Key Integrity Protocol and Cisco MIC

C. PEAP-GTC
D. EAP-Cisco Wireless (Cisco LEAP)

Answer: C


QUESTION NO: 117
What is the minimum overlap in RF coverage that is needed to allow a repeater to associate to a root Access Point?
A. 25%
B. 50%
C. 75%
D. 100%
Answer: B


QUESTION NO: 118
The Cisco WCS makes WLAN configuration, monitoring, and management as simple and effective as wired systems management. Which three functions are associated with core capabilities of the Cisco WCS?
A. RADIUS authentication
B. software updates
C. customized reports
D. network mapping
Answer: B,C,D

QUESTION NO: 119
Why is antenna diversity useful? (Choose two.)
A. it alleviates null zones.
B. it helps to overcome multi-path distortion.

C. it allows the Access Point to cover two different cells.
D. it adds more coverage area by using a directional antenna.
Answer: A,B
QUESTION NO: 120
Cisco Secure ACS ensures enforcement of which three assigned policies by the administrator? (Choose three.)
A. who can log into the network or access the network
B. the placement of access points on a map
C. the privileges each user has in the network
D. the accounting information recorded in terms of security audits or account billing
Answer: A,C,D

QUESTION NO: 121
Which WEP key protection method was introduced in Cisco Compatible Extensions version 1?
A. AES
B. Cisco Key Integrity Protocol and Cisco MIC
C. TKIPandMIC
D. EAP-Cisco Wireless (Cisco LEAP)


Answer: B


QUESTION NO: 122
If the Cisco WLAN controller cannot reach the primary AAA server, it will proceed to the next server on the list by priority index. The Cisco WLAN controller will return to the primary AAA server, when reachable, upon which of these events?
A. The primary server has just become reachable.
B. The secondary server is unreachable.
C. The primary server has been active for a preset dead-server time.
D. The secondary server has been used for a preset dead-server time.
Answer: B QUESTION NO: 123


Controller-based products use X.509 certificates for which of the following?
A. LWAPPtunneling
B. AES user data frame encryption
C. 3DES user data frame encryption
D. iPsectunneling
Answer: A


QUESTION NO: 124
When deploying wireless networks, a trade-off must often be made between the cost of the initial network deployment and the percentage of areas with marginal service or coverage holes. Which of the following represents a reasonable coverage hole percentage for a network launch?
A. 5-15 percent
B. 0-2 percent
C. 0-10 percent
D. 10-15 percent
Answer: C


QUESTION NO: 125
The typical antenna for a root bridge in a multipoint deployment is a(n)
A. Yagi antenna
B. Sector antenna
C. Parabolic dish antenna
D. Omni-directionalantenr'a
Answer: D


QUESTION NO: 126
What is the Cisco-recommended limit of standalone access points to be managed by a CiscoWorks WLSE 1130-19 with RF management enabled?
A. 1000
B. 1500


C. 1800
D. 2500
Answer: C


QUESTION NO: 127
A customer has a current site with an omni-directional antenna. It has 50 ft. of cabling that they are increasing to 100 ft.This change in cabling could ___________.
A. increase the data rate
B. increase the coverage area
C. decrease the coverage area
D. decrease the angle of radiation from the antenna
Answer: C


QUESTION NO: 128
The recommended channel utilization QoS Basic Service Set load for a VoIP network should be less than which value?
A. 35
B. 40
C. 45
D. 50
Answer: C


QUESTION NO: 129
The signal propagation of an Omni antenna on a horizontal plane_________.
A. is the same as a patch antenna
B. is radiated in a 360 degree pattern
C. has less signal strength than the vertical plane
D. makes the Omni antenna a good solution for point to point bridge connections
Answer: B QUESTION NO: 130


Which DSCP value is mapped to the IEEE 802.11 e user priority for voice in a Cisco WLAN?
A. 34
B. 46
C. 48
D. 56
Answer: B


QUESTION NO: 131
What is the Cisco-recommended signal-to-noise ratio for a data rate of 54 Mbps on a 2.4-GHz data network?
A. 30 dB
B. 25 dB
C. 35 dB
D. 40 dB
Answer: C


QUESTION NO: 132
Local Authentication Service on the Cisco Access Point allows a maximum of how many users?
A. 10
B. 25
C. 50
D. 100
Answer: C


QUESTION NO: 133
The WLSE Cisco Aironet Conversion Tool allows the administrator to___________.
A. store base AP configuration
B. convert VxWorks APs to IOS
C. store base client configuration
D. convert APs to either VxWorks or IOS

Answer: B


QUESTION NO: 134
A customer in Europe needs an 11 Mb wireless bridge link that is 1.3 km. You run the range calculation and determine that the BR350 product at 5 mW with 13.5 dB yagis at both sites would work. Fifty feet of standard Cisco cabling is long enough to connect the bridge to the antenna. There is a small grove of trees between sites.What needs to be done to make this link successful?
A. An amplifier needs to be installed atone of the sites.
B. The antenna must be raised high enough to clear the trees.
C. The Yagis need to be used in a horizontally polarized orientation.
D. Due to the trees, a 21dBi dish needs to be used for its narrower beamwidth.
Answer: B