This page was exported from New Lead2pass Dumps PDF Version Released For Free Downloading [ https://www.pass4suredumps.org ] Export date:Thu Mar 28 10:33:07 2024 / +0000 GMT ___________________________________________________ Title: [2017 New] Free Sharing Of Updated 200-355 VCE And PDF Dumps From Lead2pass (121-140) --------------------------------------------------- 2017 July Cisco Official New Released 200-355 Dumps in Lead2pass.com! 100% Free Download! 100% Pass Guaranteed! Lead2pass is ready to provide Cisco candidates with 200-355 exam dumps which can be very helpful for getting Cisco certification, which means that candidates can easily get access to the services of Cisco 200-355 exam dumps, which will assure them 100% passing success rate. With Lead2pass 200-355 exam dumps, it will be easy to pass your 200-355 exam at your first time. Following questions and answers are all new published by Cisco Official Exam Center: https://www.lead2pass.com/200-355.html QUESTION 121Which three items are allowed on an Ethernet trunk port? (Choose three.) A.    autonomous APB.    FlexConnect APC.    local APD.    monitor APE.    rogue detector APF.    sniffer APG.    SE-Connect APH.    Cisco WLCAnswer: ABEExplanation:A: The basic reason as to why autonomous AP's need trunk ports and lightweight AP's don't does indeed have to do with the capwap tunnel that is used between the AP and the controller.B: you can attach the access point that is enabled for FlexConnect to a trunk or access port on the switch.E: APs can also be placed in rogue detector mode. In this mode, the rogue detector AP is placed on a trunk port so it can monitor all wired-side connected VLANs, and the AP radios are turned off. QUESTION 122Which option describes computer-to-computer wireless communication? A.    BSS and BSAB.    IBSS and ad hoc networkC.    ad hoc network and BSAD.    IBSS and ESSE.    ESS and BSAF.    BSS and ad hoc network Answer: BExplanation:Ad-hoc mode is an 802.11 networking framework in which devices or stations communicate directly with each other, without the use of an access point (AP). Ad-hoc mode is also referred to as peer-to-peer mode or an Independent Basic Service Set (IBSS). Ad-hoc mode is useful for establishing a network where wireless infrastructure does not exist or where services are not required.http://www.webopedia.com/TERM/A/ad_hoc_mode.html QUESTION 123Which two statements about AES-CCMP are true? (Choose two.) A.    It is an encryption algorithm used in the 802.11i security protocol.B.    It is defined in 802.1X.C.    It is the encryption algorithm used in TKIP implementations.D.    It is required in WPA.E.    It is required in WPA2. Answer: AEExplanation:WPA2 has replaced WPA. WPA2, which requires testing and certification by the Wi-Fi Alliance, implements the mandatory elements of IEEE 802.11i. In particular, it includes mandatory support for CCMP, an AES-based encryption mode with strong security.http://en.wikipedia.org/wiki/Wi-Fi_Protected_Access QUESTION 124Effective Isotropic Radiated Power is calculated by using which three values? (Choose three.) A.    antenna bandwidthB.    antenna gainC.    cable lossD.    receiver sensitivityE.    SSIDF.    transmission power Answer: BCF QUESTION 125Which statement best represents the authorization aspect of AAA? A.    Authorization takes place after a successful authentication and provides the Cisco WLC the information needed to allow client access to network resources.B.    Authorization is the validation of successful DHCP address delivery to the wireless client.C.    Authorization must be successfully completed in order to proceed with the authentication phase.D.    Successful authorization will provide encryption keys that will be used to secure the wireless communications between client and AP. Answer: A QUESTION 126An engineer has just deployed a Cisco Aironet 3702 Access Point with an access layer switch that supports IEEE 802.1af Power over Ethernet. How will the access points react to the wattage that is available in 802.1af? A.    disable the BVI interfaceB.    fail to boot in CAPWAP modeC.    operate in 3x3 MIMO modeD.    enable the 2.4-GHz radios with 40-MHz channel bonding Answer: C QUESTION 127Drag and Drop Question   Answer:   QUESTION 128What increases bandwidth and resists multipath problems by carrying data in subcarriers? A.    Direct Sequence Spread SpectrumB.    Frequency Hopping Spread SpectrumC.    Narrow Band FrequencyD.    Orthogonal Frequency Division Multiplexing Answer: D QUESTION 129Refer to the exhibit. Which menu gives you access to manage background tasks in Cisco WCS?   A.    MonitorB.    ConfigureC.    ServicesD.    AdministrationE.    Tools Answer: D QUESTION 130Which two statements best describe LWAPP? (Choose two.) A.    Cisco proprietaryB.    communication between the AP and clientC.    communication between the AP and the WLCD.    Lightweight Access Point provisioningE.    used to encrypt control and data packets Answer: AC QUESTION 131What is fading? A.    Another signal source is producing energy on the channel in which you are trying to operate.B.    The desired signal reaches the receiving antenna via multiple paths, each of which has a different propagation delay and path loss.C.    A time-varying change in the path loss of a link with the time variance governed by the movement of objects in the environment, including the transmitter and receiver themselves.D.    A function of the frequency and should be provided in the cable specification by the vendor.E.    The minimum signal level for the receiver to be able to acceptably decode the information.F.    The time delay from the reception of the first instance of the signal until the last instance. Answer: C QUESTION 132Drag and Drop Question   Answer:     QUESTION 133Refer to the exhibit. How do improperly set Telnet/SSH parameters effect the configuration of a controller with Cisco WCS?  A.    The CLI and GUI management of the controller both fail because Cisco WCS checks these credentials before opening a session.B.    The Telnet/SSH username must have sufficient privileges to execute commands in CLI templates.C.    The GUI management of the controller fails because the Cisco WCS uses the Telnet/SSH parameters to login to the controller.D.    The controller remains configured in the Cisco WCS, but no management is possible through GUI from other client browsers. Answer: BExplanation:Enter the Telnet credentials information for the controller. If you chose the File option and added multiple controllers, the information will apply to all specified controllers. If you added controllers from a CSV file, the username and password information is obtained from the CSV file.Note: The Telnet/SSH username must have sufficient privileges to execute commands in CLI templates.http://www.cisco.com/c/en/us/td/docs/wireless/wcs/7-0/configuration/guide/WCS70cg/7_0ctrlcfg.html#wp1041451 QUESTION 134What three roles are defined by 802.1X? (Choose three.) A.    AAA ServerB.    AuthenticateeC.    AuthenticatorD.    Authentication ServerE.    Supplicant Answer: CDE QUESTION 135Refer to the exhibit. Which GUI item do you click to configure maps with APs in Cisco WCS?  A.    ConfigureB.    ClientC.    CleanAirD.    ServicesE.    AdministrationF.    Monitor Answer: FExplanation:The Monitor menu provides you with a top level description of the devices on your network. You can monitor your network, maps, various devices, security, alarms, events, or reports.http://www.cisco.com/c/en/us/td/docs/wireless/wcs/5-2/configuration/guide/WCS5_2cg/5_2wst.html#wp1060563 QUESTION 136What is an MBSSID? A.    a virtual AP configured on a physical AP that share a single physical device, which is one half-duplex radioB.    a set of physical APs configured in a BSA to form cells that are controlled by a single controllerC.    the group of clients that are allowed to gain access to one or more SSIDs configured in an APD.    the identified overlap area between two cells, which identifies the clients that are operating in that area at any given time Answer: AExplanation:Some APs can offer only one SSID per radio. Other APs have a slot of MAC addresses available and can support several SSIDs per radio, using Multiple BSSIDs (MBSSID). MBSSIDs basically are virtual APs that still share the same physical device, which has a half-duplex radio. MBSSIDs are a way to differentiate the traffic reaching the AP, not a way to increase the capacity of the AP. QUESTION 137A Cisco Aironet 1260 AP is unable to join a Cisco 2500 Series WLC that is connected through a Layer 2 switch.Which three options help to verify the wireless network operation and locate a possible issue? (Choose three.) A.    Verify status of GUI Wireless > CountryB.    Verifystatus of GUI Wireless > TimersC.    Verify status of GUI WLANs > ID > AdvancedD.    CLI debug of dot11E.    CLI debug of DHCPF.    Verify Cisco WLC licenseG.    Verify Cisco WLC model Answer: AEFExplanation:See reference link below for troubleshooting."Troubleshoot a Lightweight Access Point Not Joining a Wireless LAN Controller"http://www.cisco.com/c/en/us/support/docs/wireless/4400-series-wireless-lan-controllers/99948-lap-notjoin-wlc-tshoot.html#topic1 QUESTION 138An AP has been configured for personal wireless access to the Internet.Which item should be configured on the wireless client? A.    RF channelB.    BSSC.    PSKD.    802.1X/EAPE.    broadcast SSIDF.    IBSS Answer: CExplanation:Using Pre-shared keys (PSK) is the easiest and best method for allowing Internet access to a wireless client using an access point. QUESTION 139You need to set up an ad hoc connection to another client in a conference room to exchange files using Windows 7.Which two items do you need to create this connection? (Choose two.) A.    SSID nameB.    RF channelC.    802.1X/EAP credentialsD.    pre-shared keyE.    TelnetF.    IBSS nameG.    SSH Answer: DFExplanation:A wireless ad-hoc network is when two or more wireless nodes communicate directly on a peer-to-peer basis with no wireless network infrastructure. This is also referred to as an independent basic service set (IBSS). Wireless ad-hoc networks are typically formed on a temporary basis to rapidly enable communication between hosts, such as to exchange files during a spontaneous meeting or between hosts at home. The pre-shared key and the IBSS name need to be configured to allow for this.http://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/Mobility/secwlandg20/sw2dg/ch7_2_SPMb.html QUESTION 140Which option describes why most wireless phones and tablets do not use 802.11a/n and 40 MHz channels? A.    a lack of radio range when using these radiosB.    a lack of device battery capacity to operate concurrent a/b/g/n radiosC.    a lack of cooling in the device necessary to operate these radiosD.    These radios would require the devices to be larger. Answer: B Lead2pass are committed on providing you with the latest and most accurate 200-355 exam dumps. Our 200-355 dump is rich in variety. We offer 200-355 PDF dumps and 200-355 VCE dumps. We ensure you can pass the 200-355 easily. Welcome to Lead2pass.com. 200-355 new questions on Google Drive: https://drive.google.com/open?id=0B3Syig5i8gpDd3NzLWRUUTRLME0 2017 Cisco 200-355 exam dumps (All 459 Q&As) from Lead2pass: https://www.lead2pass.com/200-355.html [100% Exam Pass Guaranteed] --------------------------------------------------- Images: --------------------------------------------------- --------------------------------------------------- Post date: 2017-07-25 08:51:24 Post date GMT: 2017-07-25 08:51:24 Post modified date: 2017-07-25 08:51:24 Post modified date GMT: 2017-07-25 08:51:24 ____________________________________________________________________________________________ Export of Post and Page as text file has been powered by [ Universal Post Manager ] plugin from www.gconverters.com