200-355 Exam Questions - Online Test


200-355 Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

certleader.com

Ucertify ccna wireless 200 355 official cert guide Questions are updated and all ccna wireless 200 355 official cert guide pdf answers are verified by experts. Once you have completely prepared with our ccna wireless 200 355 dumps exam prep kits you will be ready for the real ccna wireless 200 355 pdf download exam without a problem. We have Updated Cisco ccna wireless 200 355 dumps dumps study guide. PASSED ccna wireless 200 355 official cert guide pdf free download First attempt! Here What I Did.

Q151. During a wireless site survey, the signal strength drops significantly when outside of the room containing the access point. The building is made of wood and drywall. This is an example of which wireless anomaly? 

A. absorption 

B. refraction 

C. fading 

D. multipath 

E. reflection 

Answer:


Q152. Mac OS X machines are having issues accessing the wireless network. While working with TAC, the administrator is asked to find the Mac laptop's wireless adapter model and driver. Where should the administrator look to find this information? 

A. About This Mac > System Report 

B. Control Panel > System 

C. System Preferences > Network > Wi-Fi Adapter > Advanced 

D. Control Panel > Networking > Adapters > Properties 

Answer:


Q153. Which Cisco AnyConnect module allows you to set the parameters that are needed to connect to the wireless network? 

A. NAM 

B. DART 

C. posture 

D. telemetry 

Answer:


Q154. An engineer is using WCS' client troubleshooting tool to investigate issues with a client 

device. What is the longest log capture they will be able to take? 

A. 2 minutes 

B. 5 minutes 

C. 10 minutes 

D. 30 minutes 

Answer:


Q155. When Cisco AnyConnect modules are installed on a PC, which module must be installed first? 

A. telemetry 

B. web security 

C. VPN 

D. NAM 

E. DART 

F. posture 

G. CSSC 

Answer:


Q156. When the enterprise-based authentication method is used for WPA2, a bidirectional handshake exchange occurs between the client and the authenticator. 

Which five options are results of that exchange being used on a controller-based network? (Choose five.) 

A. a bidirectional exchange of a nonce used for key generation 

B. binding of a Pairwise Master Key at the client and the controller 

C. creation of the Pairwise Transient Key 

D. distribution of the Group Transient Key 

E. distribution of the Pairwise Master key for caching at the access point 

F. proof that each side is alive 

Answer: A,B,C,D,F 


Q157. What is a function of the service port on a WLC? 

A. controls mobility manager communications on all physical ports 

B. controls out-of-band management for system recovery and maintenance 

C. controls communication with Cisco Aps 

D. controls communications for all physical ports 

Answer:


Q158. Which three items are allowed on an Ethernet trunk port? (Choose three.) 

A. autonomous AP 

B. FlexConnect AP 

C. local AP 

D. monitor AP 

E. rogue detector AP 

F. sniffer AP 

G. SE-Connect AP 

H. Cisco WLC 

Answer: A,B,E 


Q159. Refer to the exhibit. 

Which GUI item do you click to configure authentication and authorization in Cisco WCS? 

A. Security 

B. Monitor 

C. Configure 

D. Services 

E. Administration 

F. Tools 

Answer:


Q160. What is the IEEE name for a group of access points that are connected by using the Ethernet? 

A. ESS 

B. BSS 

C. IBSS 

D. ISS 

Answer: