Q1. Refer to the exhibit.
How do improperly set Telnet/SSH parameters effect the configuration of a controller with Cisco WCS?
A. The CLI and GUI management of the controller both fail because Cisco WCS checks these credentials before opening a session.
B. The Telnet/SSH username must have sufficient privileges to execute commands in CLI templates.
C. The GUI management of the controller fails because the Cisco WCS uses the Telnet/SSH parameters to login to the controller.
D. The controller remains configured in the Cisco WCS, but no management is possible through GUI from other client browsers.
Answer: B
Q2. In a typical wireless network using WPA, WPA2 or VPN, why is it still possible for a rogue client to launch a DOS attack?
A. WPA and WPA2 are not considered strong encryption algorithms and are easily cracked.
B. 802.11 management frames are easily compromised.
C. Cisco Compatible Extensions v5 are required with WPA, WPA2, or VPN to keep rogues from launching attacks in the wireless network.
D. The message integrity check frames are never encrypted or authenticated, which allows rogues to spoof clients.
Answer: B
Q3. RAG DROP
Answer:
Q4. Which two statements about the Cisco WLC and AP code upgrade when 7.0 is running are true? (Choose two.)
A. The AP can download and run new code only after a Cisco WLC reboot causes the AP discovery and join.
B. The AP can download new code before the Cisco WLC reboot, but only if the AP is configured the CLI via SSH.
C. The AP can download new code before Cisco WLC reboot if it is configuring the Cisco WLC directly using the GUI via HTTP or HTTPS.
D. The Cisco WLC defaults to booting newer code, but it can boot older backup code only from the CLI configuration.
E. The Cisco WLC can boot either primary or backup code configured from the GUI.
F. The Cisco WLC can download only a single code at a time for reboot.
Answer: C,E
Q5. The administrator has noticed that the configuration on a controller is different than in Cisco WCS. How can the administrator fix this issue?
A. The configuration can be copied from the controller to the Cisco WCS or from the WCS to the controller.
B. The configuration can be copied only from the Cisco WCS to the controller.
C. The configuration can be copied only from the controller to the Cisco WCS.
D. The controller must be removed from the Cisco WCS and then added again.
Answer: A
Q6. An engineer needs to find out the maximum EIRP allowed for their office in Asia. What regulatory body should be contacted?
A. CRTC
B. ETSI
C. IEEE
D. NTT
Answer: D
Q7. Refer to the exhibit.
With the current Cisco WLC version 7.0 syslog level settings set the way they are, which log levels are captured by the Syslog server?
A. syslog level errors only
B. all syslog levels
C. only the syslog severity level number of error and greater
D. only the syslog severity level number of error and less
Answer: D
Q8. Which device divides a signal between two antennas?
A. splitter
B. lightening arrestor
C. attenuator
D. amplifier
Answer: A
Q9. Which wireless topology supports roaming?
A. IBSS
B. BSS
C. ESS
D. bridging
Answer: C
Q10. Mac OS X machines are having issues accessing the wireless network. While working with TAC, the administrator is asked to find the Mac laptop's wireless adapter model and driver. Where should the administrator look to find this information?
A. About This Mac > System Report
B. Control Panel > System
C. System Preferences > Network > Wi-Fi Adapter > Advanced
D. Control Panel > Networking > Adapters > Properties
Answer: A