642-681

Advanced Wireless LAN for System Engineers Exam


QUESTION NO: 1
Select two activities that form part of the wireless migration plan development service component in the wireless design phase. (Choose two.)
A. Gather and Verify Migration Requirements
B. Confirm Project and Milestone Dates
C. Define Migration Team Roles and Responsibilities
D. Verify Migration Address and Available Stops
E. Create Detailed Staff Training Matrix
F. Collect and Verify Site Specific Implementation Requirements
Answer: A,C
QUESTION NO: 2
When a wireless controller loses connectivity to a remote Cisco Aironet 1030 Lightweight Access Point in REAP mode, what will be the next step for that remote access point?
A. provide local WLAN1 connectivity using local-site AAA authentication server
B. disconnect all associated clients
C. lose its configuration
D. continue to provide local WLAN1 connectivity for shared key authentication only
E. support no more than 10 wireless clients
Answer: D


QUESTION NO: 3
Controller-based products use X.509 certificates for which of the following?
A. AES user data frame encryption
B. IPsec tunneling
C. 3DES user data frame encryption
D. LWAPP tunneling
Answer: D


QUESTION NO: 4
The recommended channel utilization QoS Basic Service Set load for a VoIP network should be less than which value?

A. 50
B. 40
C. 35
D. 45
Answer: D


QUESTION NO: 5
What is the Cisco-recommended limit of standalone access points to be managed by a CiscoWorks WLSE 1130-19 with RF management enabled?
A. 1800
B. 1000
C. 1500
D. 2500
Answer: A


QUESTION NO: 6
Which DSCP value is mapped to the IEEE 802.11e user priority for voice in a Cisco WLAN?
A. 48
B. 46
C. 34
D. 56
Answer: B


QUESTION NO: 7
The local authentication service on a standalone access point supports which two authentication types? (Choose two.)
A. EAP-FAST
B. EAP-Cisco Wireless (Cisco LEAP)

C. PEAP-MSCHAP
D. EAP-TLS
E. PEAP-GTC

Answer: A,B

QUESTION NO: 8
Analyzing the customer's WLAN design including interference and signal strength, and recommending design changes to accommodate a voice over WLAN system, are activities associated with which service component in the plan phase?
A. Service Assurance
B. Security Architecture Assessment
C. VoiceOver WLAN Assessment
D. Operations Readiness Assessment
E. WLAN Wired Network Integration Assessment

Answer: C


QUESTION NO: 9
Assessing current network infrastructure to support the proposed WLAN system is an activity of which service component in the wireless plan phase?
A. WLAN Wired Network Integration Assessment
B. Operations Readiness Assessment
C. Service Assurance
D. VoiceOver WLAN Assessment
E. Security Architecture Assessment
Answer: A


QUESTION NO: 10
A wireless security assessment has been performed for a network that is composed of Windows 2000 and Windows XP wireless clients. The customer wishes to use IEEE 802.1X authentication using certificate services. Which EAP-type combinations are appropriate?
A. PEAP-MSCHAP and EAP-TLS
B. PEAP-MSCHAP and EAP-SIM
C. PEAP-GTC and EAP-MD5
D. EAP-Cisco Wireless (Cisco LEAP) and PEAP-GTC
Answer: A QUESTION NO: 11


Which three of these items are key components of a site survey? (Choose three.)
A. pre-survey assessment
B. coverage verification
C. client configuration
D. documentation
E. access point staging
F. facility walkthrough
Answer: A,D,F
QUESTION NO: 12
Which three settings should be set on the WLAN controller for a VoIP network designed for Cisco Unified Wireless IP Phone 7920? (Choose three.)
A. multicast-disabled
B. AES encryption
C. TKIP encryption
D. goldQoS
E. platinumQoS
F. multicast-enabled
Answer: A,C,E

QUESTION NO: 13
Which EAP authentication method is used by the Cisco WLAN controller to perform web authentication?
A. PEAP-MSCHAP
B. EAP-MD5
C. PEAP-GTC
D. EAP-TLS
E. No EAP authentication is used
Answer: E QUESTION NO: 14




Which four criteria does the Cisco Unified Wireless IP Phone 7921G use to associate with the access point? (Choose four.)
A. highest QBSS
B. lowest RSSI
C. highest RSSI
D. same encryption
E. same SSID
F. lowest QBSS
Answer: C,D,E,F
QUESTION NO: 15
Why is a separate voice VLAN recommended when you use the Cisco Unified Wireless IP Phone 7920?
A. The voice VLAN can provide Layer 3 fast secure roaming.
B. The Cisco Unified Wireless IP Phone 7920 uses IEEE 802.11b.
C. Appropriate ACLs can be applied to the voice VLAN.
D. Quality of service can be applied to the voice VLAN.

Answer: C


QUESTION NO: 16
Which one of the following integrated services routers supports the integrated 2.4-GHz b/g access points?
A. Cisco 1811
B. Cisco 1803
C. Cisco 1841
D. Cisco 1812
Answer: C
QUESTION NO: 17
Which feature was introduced in Cisco Compatible Extensions version 2?

A. WMM
B. EAP-Cisco Wireless (Cisco LEAP)
C. radio management

D. EAP-FAST
Answer: C


QUESTION NO: 18
When attempting to connect to the WLAN using HTTP authentication, a client is automatically redirected to a login page. The login page is on which device that uses the controller-based products?
A. Cisco WCS
B. access point
C. Cisco Location Appliance
D. wireless LAN controller
Answer: D


QUESTION NO: 19
A customer employs a Cisco 4404 Wireless LAN Controller, supporting 100 access points across four distribution ports. They are also using link aggregation on this controller. Which three of the following statements are true about Link Aggregation for this customer? (Choose three.)
A. If any single link goes down, traffic will migrate to the user-configured backup port.
B. Requires multiple access point-manager interfaces.
C. If only one functional physical link survives, only 48 access points will be supported on the link.
D. Only one functional physical port is needed for the controller to pass client traffic.
E. Eliminates the need to configure primary and backup ports for each interface.
F. If only one functional physical link survives, all 100 access points will be supported on the link.
Answer: D,E,F

QUESTION NO: 20
Which authentication mechanism was introduced in Cisco Compatible Extensions version 2?
A. Cisco Key Integrity Protocol and Cisco MIC
B. EAP-Cisco Wireless (Cisco LEAP)

C. PEAP-GTC
D. AES
Answer: C


QUESTION NO: 21
Which WEP key protection method was introduced in Cisco Compatible Extensions version 1?
A. Cisco Key Integrity Protocol and Cisco MIC
B. AES
C. EAP-Cisco Wireless (Cisco LEAP)
D. TKIP and MIC

Answer: A


QUESTION NO: 22
The Cisco Wireless LAN Controller can support a maximum of how many VLANs?
A. 512 VLANs
B. only supports the untagged VLAN 0
C. 8 VLANs, one per SSID
D. 16 VLANs, one per SSID
E. 4095 VLANs
Answer: A


QUESTION NO: 23
Guest tunneling is a feature used for the guest WLAN. How many tunnels can a virtual anchor WLAN controller support?
A. 40
B. 50
C. 60
D. 70
E. 30
Answer: A QUESTION NO: 24



Developing a comprehensive detailed design that meets business and technical requirements involves which of the following activities?
A. Correctly Implement Customer's Wireless Policies in Wireless Solution Configurations
B. Identify Process to Follow if Issues Arise During Implementation
C. Document and Design Infrastructure, Architecture, and Interfaces to Third-Party Applications
D. Ensure All Necessary Hardware and Software Products Are Included in Design
Answer: C


QUESTION NO: 25
The activity of identifying the customer's support model for WLAN is part of which service component in the plan phase?
A. Account Planning
B. Site Readiness Assessment
C. Operations Readiness Assessment
D. Proposal Delivery
Answer: C


QUESTION NO: 26
The source port of LWAPP Layer 3 data traffic is UDP port 1024 or greater. What is the destination port?
A. 12223
B. 12224
C. 12222
D. 12225
Answer: C


QUESTION NO: 27
Select two activities that are included in the wireless detailed design development service component in the design phase. (Choose two.)
A. Perform Detailed Analysis for Intrusion Prevention System

B. Present Low-Level Design to Customer
C. Create Detailed Staff Training Matrix
D. Develop Detailed Design for Intrusion Prevention System
E. Design WLAN Infrastructure
Answer: B,E
QUESTION NO: 28
By taking advantage of the Cisco Wireless Security Suite, the WLAN controllers support which two security standards and specifications? (Choose two.)
A. PEAP-MSCHAP and PAP
B. PPP and VoIP
C. EAP-TTLS and EAP-TLS
D. IEEE 802.1X and IEEE 802.11i
E. WPA and WPA2
Answer: D,E

QUESTION NO: 29
Which of the following statements are true regarding the benefits of the guest tunnel and auto-anchor mobility features of WLAN controllers? (Choose three.)
A. The auto-anchor mobility feature tunnels all client traffic from a specific WLAN (SSID) to a specific WLAN controller to provide a physical IP point of presence.
B. All WLAN controllers can be configured for either side of the tunnel as the foreign or anchor controllers.
C. Prime application is "guest WLAN," in which it is desirable to limit guest access to the corporate network by first passing through the corporate firewall, maintaining consistent security policies.
D. They allow the implementation of geographic access policies, which can restrain client traffic to a specificsubnetwork, regardless of its physical location.
E. Client traffic travels an asymmetric path.
F. Only one controller may be specified as the mobility anchor for a given WLAN.
Answer: A,C,D
QUESTION NO: 30
How many prior configuration versions can be archived on the CiscoWorks WLSE?

A. two
B. eight
C. four
D. six

Answer: C


QUESTION NO: 31
Which wireless service component within the prepare phase identifies activities such as set solution goals, select business drivers, and establish success criteria?
A. High-Level Design Development
B. Proof of Concept
C. Business Requirements Development
D. Technology Strategy Development
Answer: C


QUESTION NO: 32
What is the maximum number of access points that a high-end Cisco WCS server can support?
A. 1500
B. 1000
C. 500
D. 3000
Answer: D


QUESTION NO: 33
How many mesh access points can be placed on a map with efficient link rendering in Cisco WCS?
A. 200
B. 150
C. 100
D. 50
Answer: C QUESTION NO: 34



Cisco Secure ACS ensures enforcement of which three assigned policies by the administrator? (Choose three.)
A. the creation and management of mobility groups
B. the assignment of users to an access point
C. the placement of access points on a map
D. the accounting information recorded in terms of security audits or account billing
E. who can log into the network or access the network
F. the privileges each user has in the network
Answer: D,E,F
QUESTION NO: 35
Which two of the following are considered part of the Cisco Self-Defending Network? (Choose two.)
A. IBN
B. IDS
C. IBM
D. IPS
E. IBSS
Answer: B,D


QUESTION NO: 36
Assessing the ability of the customer's site facilities for readiness to support the proposed WLAN system is an activity conducted as part of which service component?
A. WLAN System Calibration
B. System Installation
C. Systems Acceptance Testing
D. WLAN Site Readiness Assessment (RF survey)
E. Full System Migration
Answer: D QUESTION NO: 37



The Cisco 3200 Series Mobile Access Router has integrated wireless support for which two FCC-approved frequency ranges? (Choose two.)
A. 5.725 to 5.825 GHz
B. 5.150 to 5.250 GHz
C. 4.940 to 4.990 GHz
D. 2.400 to 2.4835 GHz
E. 900 to 928 MHz
Answer: C,D
QUESTION NO: 38
Identify customer support model for WLAN solution is an activity of which service component in the plan phase?
A. System Requirements Validation
B. Planning Project Kickoff (Deployment Project Management)
C. WLAN Location-Based Services Assessment
D. Operations Readiness Assessment

Answer: D


QUESTION NO: 39
When IPS sensors identify a properly authenticated wireless client who is attempting to introduce a network virus into your environment, they alert the controller to perform which of the following actions?
A. contain the client
B. trigger an alert
C. shun the client
D. transfer the client into a quarantine VLAN
Answer: C


QUESTION NO: 40
A customer in the United States requires connectivity between two campus locations that are located 6 miles (9.65 km) apart. The customer also needs a minimum data rate of 54 Mbps in an area that is known to have 2.4-GHz interference. Which two devices will provide a bridge link and avoid the interference? (Choose two.)

A. CiscoAironet 1400 Series Wireless Bridge
B. CiscoAironet 1100 Series Access Point
C. CiscoAironet 1300 Series Outdoor Access Point/Bridge
D. CiscoAironet 1210 Series Access Point
E. CiscoAironet 1242AG Series Access Point
Answer: A,E
QUESTION NO: 41
The Newton manufacturing company has three facilities that are located in Columbia, South Carolina. The corporate office is located in an 11-story building downtown. The R&D facility is located on the north side of the city approximately 4 miles (6.4 km) from the corporate office in a five-story building. The manufacturing facility is located approximately 6 miles (9.6 km) to the northwest of the corporate office. Line of sight exists from the downtown office to all facilities. Users at the manufacturing plant require network connectivity for file sharing and e-mail, while the users at the R&D facility require high-speed Internet access with the ability to send large CAD drawings to the corporate office and large machine control files to the manufacturing facility. Presently, the manufacturing facility is connected to the corporate office by a 64-kbps leased line, and the R&D facility is connected to both the corporate office and the manufacturing facility by a dedicated T1 line. The company plans to add a second line of development at the R&D facility within the next 60 days. The current T1 lines are at a constant 70-percent utilization rate. The current projected lead time for installation of additional lines is 90 days if the current cable plant will support it. A wireless bridging solution would provide which three benefits to the customer? (Choose three.)
A. immunity to weather
B. increased security
C. guaranteed bandwidth
D. lower total cost of ownership
E. increased bandwidth
F. rapid deployment
Answer: D,E,F

QUESTION NO: 42
Which two threat categories are reported in a security summary display by the WCS? (Choose two.)

A. malware
B. spam
C. rogue access points
D. deauth flood attacks
E. out-of-date antivirus definitions
Answer: C,D

QUESTION NO: 43
What is the maximum round-trip delay that an H-REAP will tolerate from a centralized controller?
A. 100 milliseconds
B. 1000 milliseconds
C. 500 milliseconds
D. 1500 milliseconds

Answer: A


QUESTION NO: 44
Which three items are associated with the controller-based feature set products? (Choose three.)
A. CiscoAironet 1000 Series Lightweight Access Point
B. Cisco Wireless Control System
C. access point based authentication services
D. CiscoAironet 1400 Series Wireless Bridge
E. Wireless Services Module
F. CiscoWorks Wireless LAN Solution Engine
Answer: A,B,E
QUESTION NO: 45
Typical mesh access-point placements in a suburban environment should be separated by how many feet(1m = 3.28ft)?
A. 800 to 1000 feet
B. the average reachable distance that a backhaul link is capable of establishing
C. 300 to 500 feet
D. 100 to 150 feet


Answer: C


QUESTION NO: 46
Which three items are associated with the wireless standalone product set? (Choose three.)
A. Wireless LAN Context Control Protocol
B. Wireless Domain Services
C. CiscoWorks Wireless LAN Solution Engine
D. Lightweight Access Point Protocol
E. Cisco Wireless Control System
Answer: A,B,C
QUESTION NO: 47
In the wireless design phase, which service component provides a comprehensive, implementation-ready design for the customer's wireless solution?
A. Detailed Design Development
B. Systems Acceptance Test Plan Development
C. Business Plan
D. Staging Plan

Answer: A


QUESTION NO: 48
Which two statements correctly describe the Cisco Catalyst WiSM? (Choose two.)
A. It has a maximum of four modules per chassis.
B. It supports up to 100 access points per module.
C. It supports up to 300 access points per module.
D. It supports up to 200 access points per module.
E. It has a maximum of six modules per chassis.
F. It has a maximum of five modules per chassis.
Answer: C,F
QUESTION NO: 49

Which feature was introduced in Cisco Compatible Extensions version 3?
A. radio management
B. CKIP and Cisco MIC
C. EAP-FAST
D. EAP-Cisco Wireless (Cisco LEAP)

Answer: C


QUESTION NO: 50
How is a bridge group name used in a wireless mesh deployment?
A. It logically groups access points to avoid interference from neighboring mesh networks.
B. It is used as a password in communication preceding LWAPP.
C. It is used to retrieve the secret shared key.
D. It is used to join the outdoor mesh network with the controller mobility group.
Answer: A


QUESTION NO: 51
When deploying wireless networks, a trade-off must often be made between the cost of the initial network deployment and the percentage of areas with marginal service or coverage holes. Which of the following represents a reasonable coverage hole percentage for a network launch?
A. 0 - 2 percent
B. 5 - 15 percent
C. 10 - 15 percent
D. 0 - 10 percent
Answer: D

QUESTION NO: 52
OFDM provides which improvement over DSSS in the 2.4-GHz range?
A. full-duplex communication
B. more bandwidth per channel
C. greater resistance to multipath interference
D. morenonoverlapping channels

Answer: C


QUESTION NO: 53
A customer has a small remote site with 10 standalone access points. In which two of the following scenarios would it be appropriate to implement CiscoWorks WLSE Express? (Choose two.)
A. MAC authentication is required and no external AAA server is available.
B. EAP-Cisco Wireless (Cisco LEAP) security is required and no external AAA server is available.
C. EAP-FAST security is required and an AAA server is available.
D. EAP-Cisco Wireless (Cisco LEAP) security is required and an external AAA server is available.
E. EAP-FAST security is required and no external AAA server is available.
F. MAC authentication is required and an external AAA server is available.
Answer: B,E
QUESTION NO: 54
Which two devices support link role flexibility? (Choose two.)
A. CiscoAironet 1400 Series Wireless Bridge
B. CiscoAironet 1230AG Series Access Point
C. CiscoAironet 1100 Series Access Point
D. CiscoAironet 1242AG Series Access Point
E. CiscoAironet 1300 Series Outdoor Access Point/Bridge
Answer: B,D

QUESTION NO: 55
What is the maximum number of WLAN controllers that can be supported on one instance of Cisco WCS running on a high-end server?
A. 250 controllers with up to 50 access points each
B. 1500 controllers
C. 50 controllers
D. 100 controllers
E. 500 controllers with up to 25 access points each
F. 250 controllers
Answer: F QUESTION NO: 56



Which service component in the wireless plan phase applies only when customers use the centralized WLAN solution with the Cisco Wireless Location Appliance?
A. WLAN Wired Network Integration Assessment
B. System Requirements Validation
C. Planning Project Kickoff
D. WLAN Location-Based Services Assessment
E. WLAN Site Readiness Assessment (RF survey)
Answer: D


QUESTION NO: 57
Which two individual user parameters can be restricted by administrators of controller-based wireless networking using Identity Based Networking Services? (Choose two.)
A. password length enforcement
B. WLAN assignment
C. IP restrictions
D. time restrictions
E. RF utilization
Answer: C,E
QUESTION NO: 58
The Cisco Secure ACS software includes support for which three authentication protocols used by WLANs? (Choose three.)
A. EAP-FAST
B. EAP-Cisco Wireless (Cisco LEAP)

C. AES
D. EAP-TTLS
E. WPA
F. PEAP (GTC and MSCHAPv2)
Answer: A,B,F QUESTION NO: 59




The Newton Manufacturing Company has three facilities that are located in Columbia, South Carolina. The corporate office is located in an 11-story building downtown. The R&D facility is located on the north side of the city approximately 4 miles (6.4 km) from the corporate office in a five-story building. The manufacturing facility is located approximately 6 miles (9.6 km) to the northwest of the corporate office. Line of sight exists from the downtown office to all facilities. Users at the manufacturing plant require network connectivity for file-sharing and e-mail, while the users at the R&D facility require high-speed Internet access with the ability to send large CAD drawings to the corporate office and large machine control files to the manufacturing facility. Presently, the manufacturing facility is connected to the corporate office by a 64-kbps leased line, and the R&D facility is connected to both the corporate office and the manufacturing facility by a dedicated T1 line. The company plans to add a second line of development at the R&D facility within the next 60 days. The current T1 lines are at a constant 70 percent utilization rate. The current projected lead time for installation of additional lines is 90 days if the cable plant will support it. Which deployment option would provide the most benefit to the customer?
A. point-to-multipoint solution with the root bridge located at the manufacturing facility
B. point-to-multipoint solution with the root bridge located at the R&D facility
C. point-to-multipoint solution with the root bridge located at the corporate office
D. point-to-point link from corporate to manufacturing, and a point-to-point link from corporate to R&D
Answer: B


QUESTION NO: 60
What is the maximum number of wireless devices that a Cisco 2700 Series Wireless Location Appliance can track, operating with Cisco WCS version 4.0?
A. 1500
B. 500
C. 1000
D. 2500
Answer: D
QUESTION NO: 61
Which two of these are reasons for performing a site survey? (Choose two.)

A. identify the environmental obstacles
B. determine the appropriate client types
C. determine the throughput requirements
D. select the frequency
E. determine the optimum placement of access points
Answer: A,E
QUESTION NO: 62
In controller-based architecture, a control message sent between the access point and the controller is encrypted using which protocol?
A. LWAPP
B. CCKM
C. TKIP

D. AES
Answer: D


QUESTION NO: 63
The Cisco WCS logs which two security events? (Choose two.)
A. wireless protocol analyzer detection
B. securitymisconfigurations on the controller
C. TKIP and MIC failures
D. rogue access points
E. rogue clients
Answer: D,E
QUESTION NO: 64
Which statement describes how RSSI information is processed in a WLAN with a location appliance using controller-based products?
A. The location appliance collects the RSSI information.
B. The Cisco WCS collects and aggregates the RSSI information and forwards it to the location appliance.
C. Access points aggregate RSSI information.

D. WLAN controllers compute RSSI information.

Answer: A


QUESTION NO: 65
The Cisco WLAN controller examines a variety of real-time RF characteristics to efficiently handle channel assignments. These characteristics include which three of the following? (Choose three.)
A. client load
B. switch load
C. utilization
D. noise
E. EMI
F. client RSSI
Answer: A,C,D

QUESTION NO: 66
Which two threats are detected by means of the Cisco Network Admission Control? (Choose two.)
A. denial-of-service attacks
B. malware
C. out-of-date antivirus definitions
D. rogue access points
E. spam
Answer: B,C

QUESTION NO: 67
A customer brings you a previously completed site survey for the initial wireless implementation from 12 months ago. The customer currently has six access points deployed in the warehouse. The survey shows that the installed coverage provides for a 15-percent overlap between cells at
5.5 Mbps, and a 5-percent overlap at 11 Mbps. This solution has proved to provide adequate coverage and roaming capabilities for the data applications. Why would this site survey not be adequate for a VoIP application?
A. inadequate data rate
B. inadequate throughput

C. inadequate overlap
D. inadequateQoS

Answer: C


QUESTION NO: 68
How many SSIDs are supported on a standalone access point with dual radios?
A. 16
B. 12
C. 8
D. 20
Answer: A


QUESTION NO: 69
Which feature should you implement to detect a hacker invoking denial-of-service attacks, flooding the network with associations and probes, inserting rogue access points, and affecting network performance by attacking the quality of service?
A. Management Frame Protection
B. custom signature monitoring
C. Cisco Message Integrity Check
D. NTP synchronization
Answer: A


QUESTION NO: 70
Which of the following best describes the purpose of using lifecycle services for deploying an advanced wireless solution?
A. Provide a consistent, repeatable, and proven method to ensure the network solution that is deployed delivers upon the customer's goals for reliability and availability.
B. Reinforce customer confidence in partners selling products.
C. Maximize the number of services required to support advanced technologies.
D. Create a more effective sales strategy for partners.
E. More clearly define the roles of account managers, systems engineers, and field engineers.

Answer: A


QUESTION NO: 71
In order to prevent many common attacks against WLANs from becoming effective, Management Frame Protection should be implemented in which mode?
A. controller only
B. infrastructure only
C. access point only
D. controller and access point
E. client only
F. client and infrastructure
Answer: F


QUESTION NO: 72
As a result of a security site survey, the following is discovered: An RF signal is available in the parking lot. Six access points are found belonging to employees. Static WEP keys are in use in the receiving department. No security is being used on the access points in human resources. Wireless VoIP clients in use do not support EAP-FAST. There is no strong password policy in place. EAP-Cisco Wireless (Cisco LEAP) is being used for wireless VoIP security. All clients can support WPA. VLANs are in use. Based on these findings, what is recommended to enhance the security of the wireless VoIP network?
A. enforce a strong password policy
B. enable EAP-FAST authentication
C. create a separate management VLAN
D. enable static WEP on access points that are supporting wireless VoIP traffic
Answer: A
QUESTION NO: 73

Which two key features are unique to the controller-based feature set? (Choose two.)
A. fast secure roaming
B. access point registration via digital certificate
C. access point participation in RF management
D. dynamic RF control without a dedicated management platform
E. rogue access point detection
Answer: B,D
QUESTION NO: 74
Before a Cisco Unified Wireless IP Phone 7920 can place a call, it will compare the QBSS in the beacon from the access point with the QBSS threshold on the phone. What action will the Unified Wireless IP Phone 7920 take if the QBSS threshold in the beacon is exceeded?
A. prompt network busy
B. place the call
C. disconnect from access point
D. prompt number busy

Answer: A


QUESTION NO: 75
When determining the feasibility of a bridging solution that is capable of supporting 54 Mbps using the Cisco Aironet 1410 Wireless Bridge with integrated antenna in a point-to-point scenario, which criterion must be met?
A. an indoor unit mounting location within 49 feet (15 m) of the outdoor unit
B. a visual line of sight must exist
C. a distance of no greater than 15 miles (24 km)
D. a distance of no greater than 12 miles (19 km)
E. a proper channel configured on thenonroot bridge
Answer: D


QUESTION NO: 76
Implementing Wireless Domain Services on an autonomous access point provides which two benefits? (Choose two.)

A. VLAN support
B. quality of service
C. local authentication services
D. fast secure roaming
E. radio management
Answer: D,E
QUESTION NO: 77
Which three wireless intrusion-prevention signatures are part of the standard signature set provided by the Wireless LAN Controller? (Choose three.)
A. rogue network detection
B. ad-hoc network detection
C. rogue access point detection
D. fake access point detection
E. deauth flood detection
F. NetStumbler detection
Answer: D,E,F

QUESTION NO: 78
In the wireless design phase, which service component includes developing and documenting the test case(s) used to verify that a deployed infrastructure meets the operational, functional, and interface requirements?
A. Staging Plan
B. Systems Acceptance Test Plan Development
C. Detailed Design Development
D. Implementation Plan
E. Business Plan

Answer: B


QUESTION NO: 79
Cisco Identity Based Network Services used with Cisco Secure ACS provides which two of the following benefits? (Choose two.)

A. strong mutual authentication using public key infrastructure, tokens, and smart cards
B. high accuracy location of identity-based users
C. flexible policy assignments such as per-user quotas and virtual LAN assignments
D. both user-based and device-based identified entities mapped to policies that are centrally created and administered by Cisco WCS
E. user accounting and auditing and the ability to track and display users on a map
Answer: A,C
QUESTION NO: 80
Which three devices are required to implement a Cisco 2700 Series Wireless Location Appliance? (Choose three.)
A. wireless controller
B. Cisco Wireless Control System
C. controller-based access point
D. wireless domain server
E. standalone access point
F. CiscoWorks Wireless LAN Solution Engine
Answer: A,B,C

QUESTION NO: 81
The Cisco WCS makes WLAN configuration, monitoring, and management as simple and effective as wired systems management. Which three functions are associated with core capabilities of the Cisco WCS?
A. network mapping
B. software updates
C. customized reports
D. management of Cisco Clean Access
E. ACL enforcement
F. RADIUS authentication
Answer: A,B,C

QUESTION NO: 82
What is the Cisco-recommended signal-to-noise ratio for a data rate of 54 Mbps on a 5-GHz data network?

A. 40 dB
B. 35 dB
C. 25 dB
D. 30 dB

Answer: D


QUESTION NO: 83
When surveying to support VoWLAN, what should the minimum cell overlap be to support Cisco IP phones?
A. 21 to 25 percent
B. 5 to 10 percent
C. 11 to 15 percent
D. 16 to 20 percent
Answer: D


QUESTION NO: 84
What is the Cisco-recommended signal-to-noise ratio for a data rate of 54 Mbps on a 2.4-GHz data network?
A. 35 dB
B. 30 dB
C. 40 dB
D. 25 dB
Answer: A


QUESTION NO: 85
In a mesh network, what is the recommended hop-count limit of a mesh access point from its associated root access point?
A. 4
B. 6
C. 8
D. 2


Answer: A


QUESTION NO: 86
The CiscoWorks Wireless LAN Solution Engine uses which protocol for radio management?
A. LWAPP
B. WLCCP
C. CCKM
D. SNMP
Answer: B


QUESTION NO: 87
Choose three activities that are part of the WLAN site readiness assessment (RF survey) service component in the plan phase. (Choose three.)
A. Conduct Customer Site Survey(s)
B. Perform Site Gap Analysis
C. Hold Kickoff Meeting
D. Perform Acceptance Test Plan
E. Confirm Project Roles and Responsibilities
F. Develop Site Requirements Specification Report
Answer: A,B,F
QUESTION NO: 88
When designing a wireless VoIP network, what is the recommended lowest data rate for an IEEE 802.11b/g network?
A. 2 Mbps
B. 1 Mbps
C. 11 Mbps
D. 5.5 Mbps
Answer: C
QUESTION NO: 89

At the end of the time frame set by the Lobby Ambassador for the guest user account to be active, which of the following actions must be taken by the administrator regarding the deletion of the account, if it exists on multiple controllers?
A. The administrator must delete the account from the local net user database on all controllers.
B. Take no action, the WLAN controller will generate an SNMP trap and delete the account.
C. Take no action, the WLAN controller will generate an SNMP trap and the Cisco WCS will delete the account.
D. The administrator must delete the template from the Cisco WCS.

Answer: C


QUESTION NO: 90
What is the minimum recommended dBm when designing a VoIP network with 54-Mbps cells, and no more than one access point per overlapping channel set?
A. -67
B. -56
C. -86
D. -35
Answer: B


QUESTION NO: 91
Select the two activities that form part of the wireless implementation plan development service component in the wireless design phase. (Choose two.)
A. Discuss Project Roles and Responsibilities
B. Create Detailed Staff Training Matrix
C. Confirm Project and Milestone Dates
D. Create Site Specific Network Implementation Plan
E. Collect and Verify Site Specific Implementation Requirements
Answer: D,E
QUESTION NO: 92
How many VLANs are supported on the Cisco Aironet 1242AG Series Access Point in controller-based networking?

A. 20
B. 12
C. 8
D. 16


Answer: C


QUESTION NO: 93
What is the minimum recommended dBm when designing a VoIP network with 11-Mbps cells, and no more than one access point per overlapping channel set?
A. -67
B. -35
C. -56
D. -86
Answer: A