2021 Apr 200-355 practice exam
Q31. You are configuring SNMPv1/v2c on a WLC. What should you do for improved security?
A. Remove the default SNMPv1 community.
B. Remove the default SNMPv1 and SNMPv2 communities.
C. Remove the default SNMPv2 community.
D. Remove the default SNMPv3 users.
Answer: B
Q32. When using a Cisco WLC version 7.0 with a default configuration, how is a remote management HTTPS access connection secured?
A. The Cisco WLC uses a pre-shared key to authenticate the user, which limits the number of potential users that can access the controller.
B. The Cisco WLC generates its own local web administration SSL certificate and automatically applies it to the GUI.
C. The Cisco WLC uses a CA certificate for SSL access.
D. The Cisco WLC uses HTTPS to secure the HTTP session via a preconfigured password that generates a certificate for each session.
Answer: B
Q33. Which statement best describes the ability of a wireless client to access and transmit a data frame to an AP?
A. The client listens to the media until polled by the AP using PCF to send its data.
B. The client listens to the media until a data frame is finished, at which time it transmits, unless a collision of data frames has occurred.
C. The client uses random countdown timers to start the transmission of a data frame.
D. The client listens to the media and countdown timers to start the transmission of a data frame.
Answer: D
Q34. On the Cisco Wireless LAN Controller GUI, what sub-menu option under the Command menu will transfer code and configuration files to the controller?
A. Download File
B. Upload File
C. Download Configuration
D. Upload Configuration
Answer: A
Q35. Refer to the exhibit. A customer is determining whether a Windows 7 laptop is operating on the correct IEEE 802.11 standard. Which standard is being used by the laptop in the exhibit?
A. 802.11b
B. 802.11g
C. 802.11n
D. 802.11p
Answer: C
Q36. Refer to the exhibit.
Cisco WCS version 7.0 has a configuration mismatch with what is actually running in the controller. Which menu leads to the Audit Status Report?
A. Security
B. Monitor
C. Configure
D. Services
E. Administration
F. Tools
Answer: C
Q37. What suite of algorithms results in slower connection rates when using 802.11N technology?
A. WPA2
B. CCMP
C. TKIP
D. AES
Answer: C
Q38. When the pre-shared key authentication method is used for WPA or WPA2, for which two functions is the pre-shared key used? (Choose two.)
A. to act as the Group Transient Key during the bidirectional handshake
B. to act as the Pairwise Master Key during the bidirectional handshake
C. to derive the nonce at each side of the exchange
D. to derive the Pairwise Transient Key
Answer: B,D
Q39. Following the deployment of a wireless network for data and voice services, an engineer is to validate the coverage. Which type of survey is required to ensure coverage?
A. passive
B. active
C. fingerprinting
D. calibrating
Answer: A
Q40. The network administrator has used VLANs to separate VoIP frames from data frames in the wired network. What must the administrator use to separate those frames in the wireless network?
A. multiple SSIDs
B. multiple authentications
C. multiple WEP or WPA keys
D. multiple channels
E. multiple 802.11 radios (a, b, g, n)
Answer: A