Wireless Questions
Question 1
Which two of these are functions of an access point in a Split MAC Network Architecture? (Choose two)A. EAP Authentication
B. MAC layer encryption or decryption
C. 802.1Q encapsulation
D. Process probe response
Answer: B D
Question 2
Lightweight access points are being deployed in remote locations where others are already operational.The new access points are in a separate IP subnet from the wireless controller. OTAP has not been enabled at any locations.
Which two methods can the AP use to locate a wireless controller? (Choose two)
A. local subnet broadcast
B. NV-RAM IP address
C. DHCP
D. primary, secondary, tertiary
E. DNS
F. master
Answer: C E
Question 3
Which two of the following statements represent a preferred wireless LWAPP implementation? (Choose two)A. verify open ports for:
Layer 2 LWAPP on ethertype OxABAB
Layer 3 LWAPP on TCP 12222 and TCP 12223
B. verify open ports for:
Layer 2 LWAPP on ethertype OxBBBB
Layer 3 LWAPP on UDP 12222 and UDP 12223
C. verify open ports for:
Layer 2 LWAPP on ethertype OxBABA
Layer 3 LWAPP on UDP 12222 and TCP 12223
D. use of Layer 3 LWAPP is preferred over Layer 2 LWAPP
E. use of Layer 2 LWAPP is preferred over Layer 3 LWAPP
Answer: B D
Question 4
A lightweight access point is added to a working network. Which
sequence will it use to associate itself with a wireless LAN controller?A. master, primary, secondary, tertiary, greatest AP capacity
B. greatest AP capacity, primary, secondary, tertiary, master
C. primary, secondary, tertiary, master, greatest AP capacity
D. primary, secondary, tertiary, greatest AP capacity, master
Answer: C
Question 5
Which three of these describe the best practice for Cisco wireless outdoor Mesh network deployment? (Choose three)A. RAP implemented with 20 to 32 MAP nodes
B. RAP implemented with 20 or fewer MAP nodes
C. mesh hop counts of 8 to 4
D. mesh hop counts of 4 or fewer
E. client access via 802.11 b/g and backhaul with 802.11 a
F. client access via 802.11 a and backhaul with 802.11 b/g
Answer: B D E
Question 6
Which two of these represent a best practice implementation of a
Split MAC LWAPP deployment in a Cisco Unified Wireless Network? (Choose
two)A. Each wireless client authentication type maps to a shared SSID which in turn maps to a common shared VLAN.
B. Each wireless client authentication type maps to a unique SSID which in turn maps to a unique VLAN.
C. Each wireless client authentication type maps to a unique SSID which in turn maps to a common shared VLAN.
D. 802.1 Q trunking extends from the wired infrastructure to the access point for translation into SSID(s).
E. 802.1 Q trunking extends from the wired infrastructure to a wireless LAN controller for translation into SSID(s).
F. 802.1 Q trunking extends from the wired infrastructure to a wireless LAN controller.
Then the 802.1 Q packet is encapsulated in LWAPP and sent to the access point for transmission over the SSID(s).
Answer: B E
Question 7
Which two of these are required for wireless client mobility
deployment when using a Cisco Unified Wireless Network? (Choose two)A. assigned master controller
B. matching mobility group name
C. matching RF group name
D. matching RF power
E. matching security
F. matching RF channel
Answer: B E
Question 8
Which two wireless attributes should be considered during a wireless site survey procedure? (Choose two)A. encryption
B. channel
C. authentication
D. power
E. SSID
Answer: B D
Question 9
Which two statements best describe Cisco Wireless LAN Guest Access in a Cisco Unified Wireless Network? (Choose two)A. Dedicated guest VLANs are extended throughout the network to the access points for path isolation.
B. Dedicated guest VLANs are only extended to the wireless controllers in the network to ensure path isolation.
C. Dedicated guest access in the DMZ extends from the origination to the termination controllers without dedicated guest VLANs.
D. Guest tunnels can originate and terminate on any wireless controller platform.
E. Guest tunnels have limitations on which wireless controllers can originate the tunnel.
F. Guest tunnels have limitations on which wireless controllers can terminate the tunnel.
Answer: C F
No comments:
Post a Comment