Q1. Which four options are the characteristics of the original 802.11 protocol? (Choose four.)
A. Defined DSSS and FHSS as possible methods for modulation
B. Designed to operate in the 5 GHz ISM frequency spectrum
C. The most common deployment is three non-overlapping channels that are 20 MHz wide
D. The protocol sets the maximum throughput at 1 Mb/s or 2 Mb/s
E. Defined FHSS and OFDM as possible methods for modulation
F. The most common deployment is three non-overlapping channels that are 22 MHz wide
G. Designed to operate in the 2.4 GHz ISM frequency spectrum
H. The protocol sets the maximum throughput at 1 Mb/s
Answer: A,D,F,G
Q2. RAG DROP
Answer:
Q3. What 802.1x role is responsible for moving a port to the authorized state?
A. Supplicant
B. Authenticator
C. Authentication Server
D. RADIUS Server
Answer: B
Q4. You are configuring SNMPv1/v2c on a WLC. What should you do for improved security?
A. Remove the default SNMPv1 community.
B. Remove the default SNMPv1 and SNMPv2 communities.
C. Remove the default SNMPv2 community.
D. Remove the default SNMPv3 users.
Answer: B
Q5. Which information on the Monitoring page of a Cisco WLC verifies that the wireless network is operational?
A. In the Access Point Summary section, the All APs number in the Up column is the same as in the Total column.
B. In the Client Summary section, the Current Clients number is positive.
C. In the Controller Summary section, the 802.11b/g Network State is shown as Enabled.
D. In the Controller Summary section, the CPU Usage number is positive.
Answer: A
Q6. Which two statements about beacon frames used by access points are true? (Choose two.)
A. They contain SSIDs if this feature is enabled.
B. They provide vendor proprietary information.
C. They are another name for an associated request.
D. They are sent in response to a probe frame.
E. They include ATIM window information for power save operations.
Answer: A,B
Q7. What does RF determine?
A. cycle pattern size
B. how often a wave occurs
C. signal size
D. quantity of energy injected in a signal
Answer: B
Q8. An AP using version 7.0 MR1 broadcasts a Layer 3 CAPWAP discovery message on the local IP subnet. Which step does the AP take next?
A. Determine if the controller responses include the primary controller.
B. Determine if the controller responses include the master controller.
C. Send a discovery request using DHCP option 43.
D. Send a discovery request using DNS.
E. Send a discovery request using locally stored information on the AP.
F. Send a discovery request using OTAP.
Answer: E
Q9. What is the difference between the IEEE, the WiFi Alliance, and the FCC, ETSI, and TELEC?
A. The IEEE and FCC are responsible for the standards that apply to wireless networks. The WiFi Alliance, ETSI, and TELEC are the governmental agencies that regulate compliance with local standards.
B. The IEEE is responsible for Layer 1 and Layer 2 protocols. The WiFi Alliance is responsible for interoperability testing. The FCC, ETSI, and TELEC are responsible for radio frequency and transmission power-level regulations and standards in the U.S., Europe, and Japan.
C. The IEEE is responsible for Layer 1 and Layer 2 protocols. The FCC, ETSI, and TELEC are responsible for interoperability testing and compliance. The WiFi Alliance is responsible for radio frequency and transmission power-level regulations and standards on a global basis.
D. The IEEE and FCC are responsible for the Layer 3 protocol support and frequency and power-level regulations in the United States. ETSI and TELEC are responsible for frequency and power-level regulations in Europe and Japan. The WiFi Alliance is responsible to interoperability testing.
Answer: B
Q10. Which two principles must be considered when deploying a wireless network through a wooded area? (Choose two.)
A. absorption
B. reflection
C. diffraction
D. scattering
E. refraction
Answer: A,D