200-355 Real Exam Dumps Questions and answers 251-260

Get Full Version of the Exam
http://www.EnsurePass.com/200-355.html

Question No.256

Which two statements about the Cisco WLC and AP code upgrade when 7.0 is running are true? (Choose two.)

A.

The AP can download and run new code only after a Cisco WLC reboot causes the AP discovery and join.

B.

The AP can download new code before the Cisco WLC reboot, but only if the AP is configured the CLI via SSH.

C.

The AP can download new code before Cisco WLC reboot if it is configuring the Cisco WLC directly using the GUI via HTTP or HTTPS.

D.

The Cisco WLC defaults to booting newer code, but it can boot older backup code only from the CLI configuration.

E.

The Cisco WLC can boot either primary or backup code configured from the GUI.

F.

The Cisco WLC can download only a single code at a time for reboot.

Correct Answer: CE

Question No.257

Which statement describes a security weakness of a WPA2 with a PSK?

A.

The compromised key can be used for another connection.

B.

The key can be eavesdropped from the wireless medium.

C.

The key can be recreated from a few eavesdropped frames.

D.

The key is not case-sensitive and is vulnerable to compromise by brute-force methods.

Correct Answer: A

Question No.258

You are on the phone working with a colleague that is console connected to a lightweight AP that has lost its configuration. Which three actions are necessary to allow the AP to connect to a controller? (Choose three.)

A.

Configure the AP IP address.

B.

Configure the controller name.

C.

Configure the controller IP address.

D.

Configure the AP hostname.

E.

Configure the AP IP default-gateway.

F.

Configure the AP username and password.

Correct Answer: ACE

image

Question No.259

To implement a more secure means of communication for voice and data, what technology successfully resists interference by utilizing a wider bandwidth than needed for the transmitting signal?

A.

Spread Spectrum

B.

Microwave

C.

Extended U-NII2

D.

ISM Bands

Correct Answer: A

Question No.260

When using Cisco WCS version 7.0, which two features are available for the client troubleshooting tool when a Cisco Compatible Extensions v5 wireless client gets connected? (Choose two.)

A.

Request CleanAir reports from the client

B.

Send text messages to the client

C.

Aggregated Cisco ACS authentication client information

D.

Request the client to ping the DHCP-supplied IP gateway

E.

Display a summary of client event history

Correct Answer: BD

Question No.261

Which path do you take to manage the results of a report that had been run on network utilization?

A.

Reports gt; Report Launch Pad gt; Device gt; Utilization

B.

Reports gt; Report Launch Pad gt; Scheduled Run Results

C.

Reports gt; Saved Reports gt; Scheduled Run Results

D.

Reports gt; Scheduled Run Results

Correct Answer: D

Question No.262

The existing Cisco Unified Wireless Controller is running version 7.0 code for both the controllers and the Cisco WCS. A controller has been configured with an appropriate rogue rule condition to report discovered APs to the Cisco WCS. Which default alarm level is used to display all rogue APs in the Alarm Summary?

A.

Critical

B.

Flash

C.

Urgent

D.

Major

E.

Minor

Correct Answer: E

Question No.263

Refer to the exhibit. A wireless network that consists of Cisco Aironet 1260 APs and Cisco 2100 Series WLC has been correctly configured with Cisco WCS version 7, which is also used for management. The CleanAir Zone of Impact is not visible for the respective Cisco WCS maps.

Which two issues are causing the problem? (Choose two.)

image

A.

software version

B.

AP

C.

Cisco WLC

D.

Cisco MSE

E.

Cisco WCS

F.

Cisco WCS is not enabled.

Correct Answer: BD

Question No.264

When adding a controller to manage through Cisco WCS, which address type is used and which SNMP function does the Cisco WCS perform?

A.

The controller is managed through its MAC address and the Cisco WCS acts as a SNMP TRAP authenticator.

B.

The IP address of the controller is used and the Cisco WCS acts as a SNMP TRAP receiver.

C.

The controller is managed through its MAC address and the Cisco WCS acts as a SNMP agent.

D.

The controller connects through its MAC address to the Cisco WCS and the Cisco WCS uses the SNMP to manage the controller for all configured SNMP parameters.

Correct Answer: B

Question No.265

You are about to use a hotel#39;s guest wireless services using a wireless laptop. Which three items do you need to establish a wireless connection? (Choose three.)

A.

SSID name

B.

RF channel

C.

RF signal

D.

802.1X/EAP credentials

E.

pre-shared key

F.

web page

G.

WPA/WPA2 settings

image

Correct Answer: ACF

Get Full Version of 200-355 Dumps