200-355 Exam Questions - Online Test


200-355 Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

certleader.com

We provide real ccna wireless 200 355 pdf download exam questions and answers braindumps in two formats. Download PDF & Practice Tests. Pass Cisco 200 355 vce Exam quickly & easily. The 200 355 pdf PDF type is available for reading and printing. You can print more and practice many times. With the help of our Cisco 200 355 vce dumps pdf and vce product and material, you can easily pass the 200 355 wifund pdf exam.

Q161. Which two wireless technologies can interfere with 802.11 networks? (Choose two.) 

A. DECT 

B. ZigBee 

C. WiMax 

D. GSM 

Answer: A,B 


Q162. What are three primary components that describe TKIP? (Choose three.) 

A. broadcast key rotation 

B. dynamic WEP 

C. message integrity check 

D. per-packet key hashing 

E. symmetric key cipher 

F. WPA2 enterprise mode 

Answer: A,C,D 


Q163. How many types of control frames are only used in PCF mode? 

A. 0 

B. 1 

C. 2 

D. 3 

E. 4 

F. 5 

Answer:


Q164. An engineer wants to deploy a 2504 controller as the anchor controller for a guest WLAN that resides on a 5508 controller in a different mobility group. What configuration change must be applied to support this deployment strategy? 

A. UDP 16666 and IP Protocol 97 must be enabled on the 2504 controller 

B. UDP 5246 and TCP Protocol 97 must be enabled on the router 

C. The 2504 controller must be added to the same mobility group as the 5508. 

D. DHCP Option 43 must be added to the neighboring switchport 

Answer:


Q165. Which of the following are three functions of Cisco RRM? (Choose three.) 

A. TPC 

B. intercontroller roaming 

C. dynamic channel assignment 

D. intracontroller roaming 

E. coverage hole detection 

Answer: A,C,E 


Q166. RAG DROP 

Answer: 


Q167. When a guest client is authenticated, which type of connection is created between the controller-based AP and the client? 

A. as SSL connection 

B. a TLS encrypted tunnel 

C. an unsecured connection 

D. a 802.1x/EAP tunnel 

E. an IPsec tunnel 

Answer:


Q168. A customer has a corporate SSID that is configured to authenticate against an ACS server to validate client credentials on the corporate SSID. The customer has a firewall logically positioned on the network between the WLC and the ACS server in the network architecture. Which port must the firewall allow to ensure that authentication can occur? 

A. 43 

B. 1812 

C. 5146 

D. 8143 

Answer:


Q169. A wireless engineer is designing the wireless networking for a company with offices in two different locations. Which two regulatory bodies should they check to find the maximum EIRP allowed? (Choose two.) 

A. IEEE 

B. FCC 

C. ITU-R 

D. ETSI 

E. Wi-Fi Alliance 

Answer: B,D 


Q170. Which description best describes upfade in a multipath environment? 

A. In this situation, multiple signal paths are not sent at exactly the same time. The receiver receives a positive crest on the primary signal and a negative crest on the secondary signal. 

B. In this situation, the multiple signal paths are distorted and difficult to understand. 

C. In this situation, the multiple signal paths are weaker than they should be because the signals are out of phase with each other. 

D. In this situation, the signal is stronger than it should be because multiple signal paths are received twice at exactly the same time, which results in the multiple signals being in-phase. 

Answer: