Q161. You have an Apple IOS iPhone4 that is used on your home Wi-Fi network and a personal laptop that is used on your work's enterprise wireless network. At your office, you are unable to see the enterprise wireless network on your iPhone4.
What is the most likely cause of this issue?
A. WPA2 CPU intensive encryption is not supported on the client.
B. WPA2 must be enabled on the client.
C. A new profile must be created on the client.
D. Wi-Fi must be enabled on the client.
E. The enterprise is 2.4 GHz only.
F. The enterprise is 5 GHz only.
G. The RF channel must be adjusted on the client.
Q162. Which statement describes a security weakness of a WPA2 with a PSK?
A. The compromised key can be used for another connection.
B. The key can be eavesdropped from the wireless medium.
C. The key can be recreated from a few eavesdropped frames.
D. The key is not case-sensitive and is vulnerable to compromise by brute-force methods.
Q163. Which two formats are supported for uploading background graphics to create a network map in Cisco WCS? (Choose two.)
Q164. Which two Cisco Unified Wireless Network capabilities use information that is provided by Radio Resource Management neighbor messages in version 7.0 MR1? (Choose two.)
A. aggressive load balancing
B. dynamic channel assignment
C. hybrid remote edge access point
D. inter-controller mobility (that is, mobility groups)
E. rogue AP classification
Q165. A network engineer is connected via wireless to a Cisco AireOS WLC and wants to download the configuration but is unable to do so. Which change will correct the issue?
A. enable management via wireless
B. connect via wired network
C. enable Telnet
D. enable WebAuth SecureWeb
E. connect on 5-GHz SSID
Q166. Which two algorithms are available in RRM? (Choose two.)
A. coverage-hole detection
B. dynamic channel assignment
C. RSSI normalizer
D. transmitting channel expander
E. rogue detection
Q167. Which two formats are available for Cisco WCS reports? (Choose two.)
Q168. Which four options are the characteristics of the original 802.11 protocol? (Choose four.)
A. Defined DSSS and FHSS as possible methods for modulation
B. Designed to operate in the 5 GHz ISM frequency spectrum
C. The most common deployment is three non-overlapping channels that are 20 MHz wide
D. The protocol sets the maximum throughput at 1 Mb/s or 2 Mb/s
E. Defined FHSS and OFDM as possible methods for modulation
F. The most common deployment is three non-overlapping channels that are 22 MHz wide
G. Designed to operate in the 2.4 GHz ISM frequency spectrum
H. The protocol sets the maximum throughput at 1 Mb/s
Q169. Which two actions are best for deploying VoWLAN on a wireless network? (Choose two.)
A. Minimize the use of Class 3 Bluetooth devices.
B. Minimize the use of analog cameras.
C. Minimize the use of IP cameras.
D. Maximize client access by enabling all data rates used by clients.
E. Maximize client access by enabling only a few high data rates used by clients.
Q170. An AP has been configured for personal wireless access to the Internet using appropriate security and cloaking. Which two items should be configured on the wireless client? (Choose two.)
A. RF channel
E. broadcast SSID
F. manual SSID
To know more about the 200-355, click here.