200-355 Real Exam Dumps Questions and answers 181-190
Get Full Version of the Exam
http://www.EnsurePass.com/200-355.html
Question No.184
You have an Apple IOS iPhone4 that is used on your home Wi-Fi network and a personal laptop that is used on your work#39;s enterprise wireless network. At your office, you are unable to see the enterprise wireless network on your iPhone4. What is the most likely cause of this issue?
A. |
WPA2 CPU intensive encryption is not supported on the client. |
B. |
WPA2 must be enabled on the client. |
C. |
A new profile must be created on the client. |
D. |
Wi-Fi must be enabled on the client. |
E. |
The enterprise is 2.4 GHz only. |
F. |
The enterprise is 5 GHz only. |
G. |
The RF channel must be adjusted on the client. |
Correct Answer: F
Question No.185
Which information on the Monitoring page of a Cisco WLC verifies that the wireless network is operational?
A. |
In the Access Point Summary section, the All APs number in the Up column is the same as in the Total column. |
B. |
In the Client Summary section, the Current Clients number is positive. |
C. |
In the Controller Summary section, the 802.11b/g Network State is shown as Enabled. |
D. |
In the Controller Summary section, the CPU Usage number is positive. |
Correct Answer: A
Question No.186
Which two protocols are available to download or upload files to or from Cisco WLC? (Choose two.)
A. |
FTP |
B. |
TFTP |
C. |
SCP |
D. |
HTTP |
E. |
HTTPS |
Correct Answer: AB
Question No.187
How can you protect the configuration file from eavesdropping, when uploading from a Cisco WLC?
A. |
Use the Configuration File Encryption option. |
B. |
Choose an SCP as the transfer method. |
C. |
Connect to the Cisco WLC by using HTTPS. |
D. |
Connect to the Cisco WLC by using SSH. |
Correct Answer: A
Question No.188
Refer to the exhibit. How do improperly set Telnet/SSH parameters effect the configuration of a controller with Cisco WCS?
A. |
The CLI and GUI management of the controller both fail because Cisco WCS checks these credentials before opening a session. |
B. |
The Telnet/SSH username must have sufficient privileges to execute commands in CLI templates. |
C. |
The GUI management of the controller fails because the Cisco WCS uses the Telnet/SSH parameters to login to the controller. |
D. |
The controller remains configured in the Cisco WCS, but no management is possible through GUI from other client browsers. |
Correct Answer: B
Question No.189
A network engineer is troubleshooting a LAP that is unable to join the controller and receives the
message below:
LWAPP_CLIENT_ERROR_DEBUG. No more AP manager IP addresses remain What does the log indicate?
A. |
Two or more LAPs have the same IP address. |
B. |
An AP manager has the same IP address as another AP manager. |
C. |
A LAP has the same IP address as the AP manager. |
D. |
Two or more controllers have the same IP address. |
Correct Answer: C
Question No.190
Which action secures the SNMPv2C protocol in a Cisco WLC?
A. |
configure new communities and disable default communities |
B. |
use digital certificates to authenticate and encrypt transmissions |
C. |
enable password or transfer encryption |
D. |
set a username and difficult-to-guess password |
Correct Answer: A
Question No.191
Which three options relate to event-driven RRM? (Choose three.)
A. |
any 802.11n AP models |
B. |
specific AP models |
C. |
minimum of AP and WLC |
D. |
minimum of AP, WLC, and WCS |
E. |
minimum of AP, WLC, WCS, and MSE |
F. |
configurable in WLC at 802.11b/g/n gt; RRM gt; TPC |
G. |
configurable in WLC at 802.11b/g/n gt; RRM gt; DCA |
Correct Answer: BCG
Question No.192
Which open standard defines the combination of Extensible Authentication Protocol with Advanced Encryption Standard for providing strong wireless LAN client security?
A. |
IEEE 802.1X |
B. |
IEEE 802.11i |
C. |
WEP |
D. |
WPA |
E. |
WPA2 |
Correct Answer: B
Question No.193
Which statement about customization of a web page that is used on a WLC to authorize guest
users is true?
A. |
The administrator can use either a modified internal login page or the customized web page. |
B. |
The administrator can use only the internal login page, and only the organization logo can be changed. |
C. |
The administrator can use only the internal login page with a customized logo, headline, and message. |
D. |
The administrator can use only the customized web page that is uploaded to a WLC. |
Correct Answer: A
Get Full Version of 200-355 Dumps