Q1. Which statement best describes the ability of a wireless client to access and transmit a data frame to an AP?
A. The client listens to the media until polled by the AP using PCF to send its data.
B. The client listens to the media until a data frame is finished, at which time it transmits, unless a collision of data frames has occurred.
C. The client uses random countdown timers to start the transmission of a data frame.
D. The client listens to the media and countdown timers to start the transmission of a data frame.
Answer: D
Q2. An AP has been configured for personal wireless access to the Internet using appropriate security and cloaking. Which two items should be configured on the wireless client? (Choose two.)
A. RF channel
B. BSS
C. PSK
D. 802.1X/EAP
E. broadcast SSID
F. manual SSID
G. IBSS
Answer: C,F
Q3. The network administrator receives complaints of slow wireless network performance and performs a sniffer trace of the wireless network in preparation for migration to 802.11n. The sample capture shows frames that contains AP beacons with NonERP_Present bit set to 1 and frames with RTS/CTS.
Which two conclusions can be interpreted from these frames? (Choose two.)
A. The network is performing slowly because 802.11n clients are already mixed with 802.11g clients.
B. The network is performing slowly because 802.11b clients still exist in the network.
C. The network is performing slowly because a wireless client is incorrectly configured, which results in RF interference.
D. Possible 802.11b wireless clients are located only in the AP cell radius where the sniffer capture was performed.
E. Possible 802.11b wireless clients could be located anywhere in the wireless network.
Answer: B,E
Q4. When an AP, in its default configuration mode, connects to a Cisco WLC, which methods are available for remote management access to an AP?
A. SSL and SSH are available only after configuration by a Cisco WLC version 7.0.
B. SSH only
C. HTTPS, and SSH
D. SSH and Telnet
E. SSH and Telnet are available only after configuration by a Cisco WLC version 7.0.
Answer: D
Q5. What must be done for Cisco WLC and Cisco WCS to communicate?
A. The IP address and subnet mask of the Cisco WLC must be configured in the Cisco WCS.
B. The IP address and subnet mask of the Cisco WCS must be configured in the Cisco WLC.
C. The identity certificate of the Cisco WLC must be added to the Cisco WCS.
D. The Cisco WLC and Cisco WCS must exchange identity certificates.
Answer: A
Q6. An engineer wants to set up guest wireless that requires users to log in via a splash page prior to accessing the network. Which authentication method should be configured?
A. LDAP
B. RADIUS
C. local authentication
D. WebAuth
E. PSK
Answer: D
Q7. A help desk engineer is attempting to perform a remote packet capture on the wireless network. Which access point mode is necessary to perform this function?
A. sniffer
B. SE-Connect
C. monitor
D. rogue detector
E. FlexConnect
Answer: A
Q8. You are designing a wireless network in a medical facility. Which three areas are bad locations in which to install a wireless access point? (Choose three.)
A. in front of the elevators doors
B. in the hallways
C. next to the electrical room
D. inside offices
E. near medical imaging devices
F. in the lobby
Answer: A,C,E
Q9. What is a risk when initiating the containment of a rogue AP?
A. disassociating clients of valid access points that are operated by a neighboring organization
B. disrupting transmission of neighboring AP clients
C. breaking the radio of the containing AP
D. breaking the rogue client radio or its firmware
Answer: A
Q10. You are in a coffee shop and you have connected to their wireless hot-spot. Your Windows 7 wireless client shows five green bars with a yellow shield.
Which statement about the level of signal strength and the WLAN security that is present is true?
A. You have excellent signal strength and a secure network connection.
B. Your wireless client needs a username and password before it can connect to the WLAN.
C. You have excellent signal strength and the client is waiting for you to enter a username and password.
D. Your laptop is not receiving a signal.
E. Your laptop is receiving an excellent signal and the network security is open.
Answer: E