★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 200-355 Exam Dumps (PDF & VCE):
Available on: https://www.certleader.com/200-355-dumps.html


2021 Apr 200-355 free practice test

Q91. In a typical wireless network using WPA, WPA2 or VPN, why is it still possible for a rogue client to launch a DOS attack? 

A. WPA and WPA2 are not considered strong encryption algorithms and are easily cracked. 

B. 802.11 management frames are easily compromised. 

C. Cisco Compatible Extensions v5 are required with WPA, WPA2, or VPN to keep rogues from launching attacks in the wireless network. 

D. The message integrity check frames are never encrypted or authenticated, which allows rogues to spoof clients. 

Answer:


Q92. What are three characteristics of WCS? (Choose three.) 

A. based on a single server licensing system 

B. used for wireless planning 

C. used for real-time tracking of multiple clients 

D. used for wireless management 

E. used for RF fingerprinting 

F. based on a per server licensing system 

Answer: A,B,D 


Q93. Refer to the exhibit. 

Which syslog facility option is shown? 

A. an information field, which is added to every message that comes from the WLC 

B. a security feature, which is set on the syslog server 

C. the type of syslog server 

D. the Cisco WLC identifier for this syslog server 

Answer:


Q94. A customer is using the access point GUI to upgrade the software on an autonomous access point to convert it to a lightweight access point. Which two transfer protocols are valid for conducting this transfer from the WLC? (Choose two.) 

A. FTP 

B. RCP 

C. SFTP 

D. HTTP 

E. SCP 

F. TFTP 

Answer: D,F 


Q95. Which Cisco program for WLAN client vendors helps to ensure that their devices are interoperable with Cisco WLAN infrastructure? 

A. CCX 

B. CCMP 

C. ASDM 

D. WLSE 

Answer:


Q96. Which open standard defines the combination of Extensible Authentication Protocol with Advanced Encryption Standard for providing strong wireless LAN client security? 

A. IEEE 802.1X 

B. IEEE 802.11i 

C. WEP 

D. WPA 

E. WPA2 

Answer:


Q97. A Cisco Aironet 1260 AP is unable to join a Cisco 2500 Series WLC that is connected through a Layer 2 switch. 

Which three options help to verify the wireless network operation and locate a possible issue? (Choose three.) 

A. Verify status of GUI Wireless > Country 

B. Verify status of GUI Wireless > Timers 

C. Verify status of GUI WLANs > ID > Advanced 

D. CLI debug of dot11 

E. CLI debug of DHCP 

F. Verify Cisco WLC license 

G. Verify Cisco WLC model 

Answer: A,E,F 


Q98. What protocol overcomes the weaknesses of LEAP? 

A. EAP-TLS 

B. PEAP 

C. EAP-FAST 

D. EAP-TTLS 

Answer:


Q99. The existing Cisco Unified Wireless Controller is running version 7.0 code for both the controllers and the Cisco WCS. A controller has been configured with an appropriate rogue rule condition to report discovered APs to the Cisco WCS. 

Which default alarm level is used to display all rogue APs in the Alarm Summary? 

A. Critical 

B. Flash 

C. Urgent 

D. Major 

E. Minor 

Answer:


Q100. What are three functions of RRM? (Choose three.) 

A. dynamic channel assignment 

B. detection and avoidance of interference 

C. dynamic antenna polarization 

D. dynamic transmit power control 

E. dynamic controller selection 

F. detection and avoidance of AP client load 

Answer: A,B,D