Act now and download your Cisco 200-355 test today! Do not waste time for the worthless Cisco 200-355 tutorials. Download Far out Cisco Implementing Cisco Wireless Network Fundamentals exam with real questions and answers and begin to learn Cisco 200-355 with a classic professional.
Q21. A company wants to implement wireless in all 20 remote office locations and wants centralized management of these remote sites. What application would meet the requirements?
A. Control And Provisioning of Wireless Access Points
B. Cisco point- to multi-point wireless bridging
C. Cisco autonomous access points in FlexConnect mode
D. Split MAC architecture utilizing LWAPP and WLC
Q22. When the enterprise-based authentication method is used for WPA2, a bidirectional handshake exchange occurs between the client and the authenticator.
Which five options are results of that exchange being used on a controller-based network? (Choose five.)
A. a bidirectional exchange of a nonce used for key generation
B. binding of a Pairwise Master Key at the client and the controller
C. creation of the Pairwise Transient Key
D. distribution of the Group Transient Key
E. distribution of the Pairwise Master key for caching at the access point
F. proof that each side is alive
Q23. Which CLI command is used on a Cisco WLC to troubleshoot mobility, rogue detection, and load-balancing events?
A. debug dot11
B. debug capwap all
C. show dot11 details
D. show capwap details
Q24. How many dBm is 40 mW?
A. 10 dBm
B. 16 dBm
C. 20 dBm
D. 22 dBm
E. 40 dBm
Q25. An engineer is adding a controller to a WCS. What three categories of parameters are needed? (Choose three.)
A. IP parameters
B. SNMP Parameters
C. Mobility Parameters
D. Telnet/SSH Parameters
E. TFTP Parameters
F. RADIUS Parameters
Q26. What are two wireless configuration utilities for Apple Mac computers? (Choose two.)
B. AirPort Extreme
D. AirManager Supreme
E. AirAssistant Ultimate
Q27. A customer has a corporate SSID that is configured to authenticate against an ACS server to validate client credentials on the corporate SSID. The customer has a firewall logically positioned on the network between the WLC and the ACS server in the network architecture. Which port must the firewall allow to ensure that authentication can occur?
Q28. What is the function of the Cisco AnyConnect DART tool?
A. creates a compressed bundle of client logs and information
B. visualizes a WLAN environment, showing the possible locations of problems
C. gathers statistics from neighboring clients for comparison to the baseline
D. helps to troubleshoot a WLAN connection by using easy-to-use wizards and statistic viewers
Q29. The existing Cisco Unified Wireless Controller is running version 7.0 code for both the controllers and the Cisco WCS. A controller has been configured with an appropriate rogue rule condition to report discovered APs to the Cisco WCS.
Which default alarm level is used to display all rogue APs in the Alarm Summary?
Q30. What authentication method requires a certificate on both the client and authentication server?
To know more about the 200-355, click here.