Q1. Which statement about an infrastructure basic service set is true according to IEEE 802.11 specifications?
A. The set also is called an ad hoc network.
B. The BSSID is generated from the first wireless client that starts up in the IBSS.
C. The set enables the use of ESS.
D. No signals are relayed from one client to another client.
Answer: C
Q2. A customer has a corporate SSID that is configured to authenticate against an ACS server to validate client credentials on the corporate SSID. The customer has a firewall logically positioned on the network between the WLC and the ACS server in the network architecture. Which port must the firewall allow to ensure that authentication can occur?
A. 43
B. 1812
C. 5146
D. 8143
Answer: B
Q3. How many dBm is 40 mW?
A. 10 dBm
B. 16 dBm
C. 20 dBm
D. 22 dBm
E. 40 dBm
Answer: B
Q4. What are four features of WPA? (Choose four.)
A. a larger initialization vector, increased to 48 bits
B. a message integrity check protocol to prevent forgeries
C. authenticated key management using 802.1X
D. support for a key caching mechanism
E. unicast and broadcast key management
F. requires AES-CCMP
Answer: A,B,C,E
Q5. A customer has asked for its wireless equipment to be managed as securely as possible. Which three management protocols will provide encrypted access to the equipment? (Choose three.)
A. Secure Shell
B. HTTPS
C. SNMPv3
D. Telnet
E. SNMPv2c
F. HTTP
Answer: A,B,C
Q6. Which Extensible Authentication Protocol types are supported by the Cisco Unified Wireless Network?
A. EAP-TLS, PEAP-MSCHAPv2, and PEAP-GTC only
B. LEAP and EAP-FAST only
C. EAP-TLS, PEAP-MSCHAPv2, PEAP-GTC, LEAP, and EAP-FAST only
D. any EAP supported by the RADIUS authentication server
Answer: D
Q7. RAG DROP
Answer:
Q8. RAG DROP
Answer:
Q9. What protocol is used to determine the best pathway back to a root access point?
A. CCKM
B. WNMP
C. AWPP
D. LWAP
Answer: C
Q10. What are the three primary functions of the Cisco Unified Wireless LWAPP architecture? (Choose three.)
A. control and management of the CAPWAP
B. tunneling of VPN clients over the WAN
C. tunneling of WLAN client traffic to the WLC
D. collection of 802.1Q trunks
E. collection of 802.11 data for management
F. control and management of VTP
Answer: A,C,E