[Free] 2019(Nov) EnsurePass Cisco 200-355 Dumps with VCE and PDF 171-180

Get Full Version of the Exam
http://www.EnsurePass.com/200-355.html

Question No.171

Which protocol is used for Cisco WCS to communicate with Cisco WLC?

  1. SNMP

  2. CAPWAP

  3. HTTPS

  4. SSH

Correct Answer: A

Question No.172

Refer to the exhibit. Which two statements about the status of the respective AP on a Cisco WCS version 7.0 map does this icon represent? (Choose two.)

image

  1. The 802.11a/n radio is administratively disabled.

  2. The 802.11a/n radio has a minor fault.

  3. The 802.11a/n radio has a major fault.

  4. The 802.11b/g/n radio is administratively disabled.

  5. The 802.11b/g/n radio has a minor fault.

  6. The 802.11b/g/n radio has a major fault.

Correct Answer: BF

Question No.173

Which option is needed to earn the Cisco Compatible credential for Cisco Compatible Extensions Lite?

  1. Foundation and Management are required.

  2. Location and Management are required.

  3. Foundation and Location are required.

  4. Foundation and Voice are required.

  5. Voice is required.

  6. Foundation is required.

  7. Location is required.

  8. Management is required.

Correct Answer: F

Question No.174

The administrator needs to create a report that shows all controllers, APs, and Cisco 3300 Series MSEs in the WLAN, including hardware and software information. Which report includes this information?

  1. Device gt; Inventory

  2. Mesh gt; Nodes

  3. Network Summary gt; Executive Summary

  4. Network Summary gt; 802.11 Summary

Correct Answer: A

Question No.175

An AP has been configured for personal wireless access to the Internet. Which item should be

configured on the wireless client?

  1. RF channel

  2. BSS

  3. PSK

  4. 802.1X/EAP

  5. broadcast SSID

  6. IBSS

Correct Answer: C

Question No.176

Which three Cisco Unified Wireless Network capabilities use information that is provided by Radio Resource Management neighbor messages? (Choose three.)

  1. aggressive load balancing

  2. dynamic channel assignment

  3. hybrid remote edge access point

  4. inter controller mobility (that is, mobility groups)

  5. over-the-air provisioning

  6. rogue AP classification

Correct Answer: BEF

Question No.177

Which option best describes the limitation of a client that is attempting to manage a WLC while using the client wireless adapter connection to the wireless infrastructure?

  1. Controllers must be managed using only secure protocols (that is, SSH and HTTPS), not nonsecure protocols (that is, HTTP and Telnet).

  2. Read-write access is not available; only read-only access is supported.

  3. Uploads and downloads from the controller are not allowed.

  4. Wireless clients can manage other controllers, but not the same controller and the AP to which the client is associated.

Correct Answer: C

Question No.178

Refer to the exhibit. You made a manual configuration change to a controller and now you need to compare the controller configuration seen on Cisco WCS to the configuration that is present in the controller. Which menu can you use to do compare the configurations?

image

  1. Reports

  2. Monitor

  3. Configure

  4. Services

  5. Administration

  6. Tools

Correct Answer: C

Question No.179

Which two factors must be considered when evaluating an RF interferer for severity? (Choose two.)

  1. distance from the AP

  2. dBm

  3. the type of security crack being used

  4. duty cycle

  5. number of interfering IP stations in the cell

  6. duplicate SSID

Correct Answer: BD

Question No.180

Which statement about the impact of configuring a single SSID to support TKIP and AES encryption simultaneously is true?

  1. The overhead associated with supporting both encryption methods significantly degrades client throughput.

  2. Some wireless client drivers might not handle complex SSID settings and may be unable to

    associate to the WLAN.

  3. This configuration is unsupported and the Cisco Wireless Control System generates alarms continuously until the configuration is corrected.

  4. This configuration is common for migrating from WPA to WPA2. No problem is associated with using this configuration.

Correct Answer: B

Get Full Version of the Exam
200-355 Dumps
200-355 VCE and PDF

Leave a Reply