200-355 Real Exam Dumps Questions and answers 21-30
Get Full Version of the Exam
http://www.EnsurePass.com/200-355.html
Question No.21
Mac OS X machines are having issues accessing the wireless network. While working with TAC, the administrator is asked to find the Mac laptop#39;s wireless adapter model and driver. Where should the administrator look to find this information?
A. |
About This Mac gt; System Report |
B. |
Control Panel gt; System |
C. |
System Preferences gt; Network gt; Wi-Fi Adapter gt; Advanced |
D. |
Control Panel gt; Networking gt; Adapters gt; Properties |
Correct Answer: A
Question No.22
If an antenna has a dBd of 8.6, what is the dBi value?
A. |
6.2 |
B. |
6.46 |
C. |
8.6 |
D. |
10.74 |
E. |
12.88 |
Correct Answer: D
Question No.23
Which two statements about the requirements to configure inter-controller roaming are true? (Choose two.)
A. |
The same mobility domain names are configured across controllers. |
B. |
The same RF group names are configured across controllers. |
C. |
The same controller hardware version is configured across controllers. |
D. |
The same AP manager interface is configured across controllers. |
E. |
The same virtual interface is configured across controllers. |
F. |
The same controller software version is configured across controllers. |
Correct Answer: AE
Question No.24
Which type of basic radiation pattern does a Yagi antenna have?
A. |
circular |
B. |
semicircular |
C. |
straight line |
D. |
cone |
Correct Answer: D
Question No.25
Microsoft Active Directory integrated machines are not authenticating to the internal WLAN. The WLAN settings are WPA2-AES-802.1x and are authenticating to a Cisco Identity Services Engine server. You investigate and note that non-domain authenticated machines are properly authenticating to the WLAN using their Active Directory credentials. Why would this problem occur?
A. |
The WLAN is configured improperly in group policy. |
B. |
The ACS server is not joined to the domain, causing authentications to fail. |
C. |
The domain machines are configured to disable the wireless adapter. |
D. |
The non-domain machines are using local accounts that are not authenticated through the domain. |
Correct Answer: A
Question No.26
A customer has requested a single point of policy enforcement for LAN and WLAN. Which deployment model should be used?
A. |
converged |
B. |
autonomous |
C. |
FlexConnect |
D. |
centralized |
Correct Answer: A
Question No.27
Which two principles must be considered when deploying a wireless network through a wooded area? (Choose two.)
A. |
absorption |
B. |
reflection |
C. |
diffraction |
D. |
scattering |
E. |
refraction |
Correct Answer: AD
Question No.28
Which two statements about WiMAX technology are true? (Choose two.)
A. |
WiMAX is defined by 802.11i. |
B. |
Typically, fixed WiMAX networks have a higher-gain directional antenna installed near the client. |
C. |
WiMAX is capable of working as a long-range system over several miles. |
D. |
WiMAX works only for licensed frequencies. |
Correct Answer: BC
Question No.29
Which type of frames are ACK and CF-ACK?
A. |
control |
B. |
management |
C. |
RTS/CTS |
D. |
association |
Correct Answer: A
Question No.30
When an AP, in its default configuration mode, connects to a Cisco WLC, which methods are available for remote management access to an AP?
A. |
SSL and SSH are available only after configuration by a Cisco WLC version 7.0. |
B. |
SSH only |
C. |
HTTPS, and SSH |
D. |
SSH and Telnet |
E. |
SSH and Telnet are available only after configuration by a Cisco WLC version 7.0. |
Correct Answer: D
Get Full Version of 200-355 Dumps