-
Which two statements about the open and shared key wireless-authentication methods are true? ()
A . Shared key authentication is considered more secure than open authentication.
B . Shared key authentication is considered less secure than open authentication.
C . If the WEP keys do not match using the open authentication method, the client will not authenticate, associate, and transfer data.
D . If the WEP keys do not match using the open authentication method, the client will still be able to authenticate and associate, but will not transfer data.
E . If the WEP keys do not match using the open authentication method, the client will still be able to authenticate, associate, and transfer data.
-
Which two statements about the Wireless Location Appliance are true? ()
A . A Wireless Location Appliance acts as a server to one or more Cisco WCSs. It collects, stores, and passes on data from its associated Cisco WLAN controllers.
B . Before using the Web interface, the initial configuration of the Wireless Location appliance must be done using the command-line interface (CLI).
C . The Cisco 2000, 2700, 4100, and 4400 are examples of Wireless Location Appliances.
D . The Wireless Location Appliance visually displays the location information of WLAN devices and forwards this information to third-party applications using the Simple Network Management Protocol (SNMP).
E . The Wireless Location Appliance visually tracks up to 15,000 WLAN devices and can store this information for 90 days.
-
Which two statements best describe enhanced wireless security encryption?()
A . TKIP protects RC4 encryption keys
B . CKIP and TKIP protect AES encryption keys
C . TKIP encryption is more processor intensive than AES encryption is
D . WPA requires TKIP encryption, whereas WPA2 supports AES encryption
E . WPA requires AES encryption, whereas WPA2 supports TKIP encryptio
-
Which two wireless encryption methods are based on the RC4 encryption algorithm?()
A . WEP
B . CCKM
C . AES
D . TKIP
E . CCMP
-
Which two statements best describe the wireless security standard that is defined by WPA (Choose two.)()。
A . It specifies use of a static encryption key that must be changed frequently to enhance security
B . It requires use of an open authentication method
C . It specifies the use of dynamic encryption keys that change each time a client establishes a connection
D . It requires that all access points and wireless devices use the same encryption key
E . It includes authentication by PSK
-
Which two statements about the open and shared key wireless-authentication methods are true?()
A . shared key authentication is considered more secure than open authentication
B . shared key authentication is considered less secure than open authentication
C . if the WEP keys do not match using the open authentication method, the client will not authenticate, associate, and transfer data
D . if the WEP keys do not match using the open authentication method, the client will still be able to authenticate and associate, but will not transfer data
E . if the WEP keys do not match using the open authentication method, the client will still be able to authenticate, associate, and transfer data
-
Which two devices can interfere with the operation of a wireless network because they operate on similar frequencies (Choose two.)()。
A . copier
B . microwave oven
C . toaster
D . cordless phone
E . IP phone
F . AM radio
-
The Cisco Unified Wireless Network minimizes the TCO and maximizes wireless network uptimeby optimizing which two deployment, management, and security features?()
A . unified wireless and wired infrastructure for a single point of control for all WLAN traffic
B . simplified management of central or remotely located access points
C . extension features to wired network services, such as denial of service prevention and ACLs
D . threat defense with a robust wired IDS
-
Which two devices can interfere with the operation of a wireless network because they operate on similar frequencies? (Choose two.)()
A . copier
B . microwave oven
C . toaster
D . cordless phone
E . IP phone
F . AM radio
-
As the Company wireless administrator, you required to be knowledgeable about the wireless LAN components. Which two statements about these components are true? ()
A . In the autonomous access point solution, control is provided by the WLAN controller.
B . In the lightweight access point solution, WLAN management is provided by the WLAN Control System (WCS).
C . In the autonomous access point solution, control is provided by the WDS (Wireless Domain Services).
D . Cisco Aironet autonomous access points cannot be supported by the Cisco Unified Wireless Network.
E . Ii the lightweight access point solution, WLAN management is provided by the WLAN Solution Engine (WLSE).
F . Cisco Aironet lightweight access points cannot be supported by the Cisco Unified Wireless Network.
-
Which two of these statements best describe the benefits of Cisco’s wireless IDS functionality? (Choose two.) ()
A . AirDefense for wireless IDS is required by autonomous APs.
B . 2.40Hz CK management can monitor both 802.11 and non-802.11 CK interference.
C . APs only monitor the RF channels that are servicing the clients.
D . Cisco or CCX compatible client cards can extend the CK IDS service for autonomous APs.
E . Autonomous APs must be dedicated IDS sensors while lightweight APs can combine client traffic and RF monitoring.
-
Which two Cisco Wireless Control System (WCS) statements are true?()
A . the WCS Base version includes all the features of the WCS Location version as well as additional enhancements
B . the WCS Base version provides on-demand location of rogue access points and clients to within 33 feet (10 meters)
C . WCS adds a graphical view of multiple Cisco Wireless LAN controllers and managed access points
D . WCS includes a network management tool which is similar to a site survey tool
E . WCS uses the CDP protocol to communicate with the controller
-
Which two statements best describe the Cisco Unified Wireless Network?()
A . The Cisco Unified Wireless Network provides the framework to segregate wired and wirelessnetworks to deliver the best security for companies that are deploying WLANs.
B . The Cisco Unified wireless Network provides the framework to integrate and extend wired andwireless networks to deliver the lowest-possible total cost or ownership for companies that aredeploying WLANs
C . The Cisco Unified Wireless Network extends "wireless awareness" into important elements ofthe network infrastructure, providing the same level of security for WLANs that organizations havecome to expect from their VPNs.
D . The Cisco unified Wireless Network extends "wireless awareness" into important elements ofthe network infrastructure, providing the same level of security scalability, reliability ease ofdeployment and management for WLANs that organizations have come to expect from their wiredLANs.
-
Which two statements about a wireless repeater topology are true?()
A . A wireless repeater is an access point that is not connected to the wired LAN.
B . The repeater feature is only available in lightweight access point topologies.
C . The SSID of the root access point must be configured on the repeater access point.
D . This topology requires a 10 - 15 percent overlap between a wired access point and the wireless repeater.
E . This topology requires a 15 - 25 percent overlap between a wired access point and the wireless repeater.
F . To avoid interference, the repeater access point must use a different channel from what the root access point uses.
-
Which two statement best describes the Cisco Unified Wireless Network? ()
A . The Cisco Unified Wireless Network provides the framework to segregate wired and wireless networks to deliver the best security for companies that are deploying WLANs
B . The Cisco Unified Wireless Network provides the framework to integrate and extend wired and wireless networks to deliver the lowest-possible total cost of ownership for companies that are deploying WLANs
C . The Cisco Unified Wireless Network extends wireless awareness into important elements of the network infrastructure, providing the same level of security for WLANs that organizations have come to expect from their VPNs
D . The Cisco Unified Wireless Network extends wireless awareness into important elements of the network infrastructure, providing the same level of security, sociability, reliability, ease of deployment, and management for WLANs that organizations have come to expect from their wired LAN
-
Which two statements regarding the Wireless LAN Solution Engine (WLSE) are true?()
A . To support fault and policy reporting,the WLSE requires a Wireless Control System (WCS).
B . When WLSE detects an AP failure,it automatically increases the power and cell coverage of nearbyAPs.
C . WLSE requires the 2700 location appliance to offer location tracking.
D . WLSE can locate rogue APs and automatically shut them down.
E . WLSE configuration is done using the command line interface (CLI) or a WEB based template.
-
Which two statements about the wireless control system (WCS) are true?()
A . the Cisco WCS is designed to support 1500 Cisco WLAN controllers and up to 50 APs
B . the Cisco WCS runs on a dedicated network device such as the Cisco 2700 network appliance
C . the Cisco WCS runs on various windows and Linux platforms
D . the Cisco WCS screen displays four main menu sheet tab consisting of Monitor, Configure, Security, and Alam
E . the Cisco WCS uses the SNMP protocol to communicate with the controller
-
Which two components are unique to controller-based wireless installations? ()
A . Mobility Services Engine
B . WLAN controller
C . Cisco Wireless Control System
D . rugged/exterior access points
E . interior access point
-
Which two of these statements describe important aspects of performing a wireless site survey? (Choose two.) ()
A . An 802.11 g access point with a variety of antennas can be used in all standard site surveys.
B . Site surveys can be performed manually or through assisted site survey.
C . Channel power during testing starts at the default minimum and gradually increases to the maximum.
D . Overlapping access points can create performance problems.
E . Surveys should be done after hours in an office building or during reduced inventory levels in warehouses.
-
Which two statements about the Wireless Location Appliance are true?()
A . a Wireless Location Appliance acts as a server to one or more Cisco WCSs. It collects, stores, and passes on data from its associated Cisco WLAN controllers
B . before using the Web interface, the initial configuration of the Wireless Location Appliance must be done using the command-line interface (CLI)
C . the Cisco 2000, 2700, 4100, and 4400 are examples of Wireless Location Appliance.
D . the Wireless Location Appliance visually displays the location information of WLAN devices and forwards this information to third-party applications using the Simple Network devices and forwards this information to third-party applications using the Simple Network Management Protocol (SNMP)
E . the Wireless Location Appliance visually tracks up to 15,000 WLAN devices and can store this information for 90 days.
-
When conducting a wireless voice site survey, which two sizing considerations exist for thecoverage cell?()
A . rogue access point detection in the coverage area
B . multipath issues in the coverage area
C . number of VoWLAN users in the coverage cell
D . call capacity requirements of the coverage area
-
Which two statements regarding the Wireless LAN Solution Engine (WLSE) are true? ()
A . To support fault and policy reporting, the WLSE requires a Wireless Control System (WCS).
B . When WLSE detects an AP failure, it automatically increases the power and cell coverage of nearby APs.
C . WLSE requires the 2700 location appliance to offer location tracking.
D . WLSE can locate rogue APs and automatically shut them down.
E . WLSE configuration is done using the command line interface (CLI) or a WEB based template.
-
Which two statements regarding the Wireless LAN Solution Engine (WLSE) are true ?()
A . to support fault and policy reporting, the WLSE requires a Wireless Control System (WCS)
B . when WLSE detects an AP failure, it automatically increases the power and cell coverage of nearby APs
C . WLSE requires the 2700 location appliance to offer location tracking
D . WLSE can locate rogue APs and automatically shut them down
E . WLSE configuration is done using the command line interface (CLI) or a WEB based template
-
Which two wireless devices acts as a communication connection between the client and WLAN()
A . bridge
B . access point
C . wireless adaptor
D . Layer 3 switch
E . antenna