★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 350-050 Exam Dumps (PDF & VCE):
Available on: https://www.certleader.com/350-050-dumps.html


You can locate everything helpful to take the particular Cisco 350-050 exam at Exambible internet site. The Cisco Cisco exam questions are generally original and logical with detailed answers. Our IT professionals who have wealthy experience inside compiling the practice questions create great contribution to produce the particular Cisco 350-050 exam braindumps. Many Cisco Cisco examine materials are generally available inside the market. Nevertheless find out the original and high-quality Cisco 350-050 training examination is difficult. Our own Cisco 350-050 exam products can help you a lot and save your moment and income. Your potential and skill will be shapen and confidence boosted. Begin right away and brighten your current career lifestyle in the area of IT.

2021 Feb co 350-050:

Q101. The helpdesk is reporting that many users are reporting slow wireless connections in one of the office buildings. You look at the CleanAir statistics and do not see any interferers, but you see very high 2.4-GHz channel utilization from the Wi-Fi devices. WCS is reporting the following mix of 

802.11 chipsets in the building: 10 percent 802.11b, 75 percent 802.11g and 15 percent 802.11a. You do a survey and see that you have a very dense deployment of APs and a lot of co-channel interference. 

Which two steps would help lower your channel utilization in this area? (Choose two.) 

A. Raise the power on the 2.4-GHz radios. 

B. Lower the power on the 2.4-GHz radios. 

C. Lower the DTIM. 

D. Raise the DTIM. 

E. Disable 1-, 2-, 5.5-, 6-, and 9-Mb data rates. 

F. Enable 1-, 2-, 5.5-, 6-, and 9-Mb data rates. 

Answer: BE


Q102. A 7-Mb multicast traffic stream is being sent to wireless clients and it is using up most of the available wireless spectrum in the 2.4-GHz unlicensed band. As a result, many of the data applications have become sluggish and the video is choppy. What is the best option to send the multicast over the wireless network more efficiently and leave some bandwidth for the data applications (assuming the network is capable of supporting this option)? 

A. Raise the DTIM to 10 

B. Enable WMM QoS 

C. Turn on multicast-multicast mode 

D. Turn off the lower data rates 

Answer: D


Q103. After interviewing a customer to understand wireless client requirements, you determine that 802.11b must be enabled to support legacy clients within a mixed-mode environment. Which recommendation will have the greatest impact on mitigating the effects of 802.11b clients on the rest of the network? 

A. Restrict OFDM modulation from being used. 

B. Make 11 Mb/s the lowest mandatory rate. 

C. Enable a separate SSID for 802.11b clients. 

D. Enable a short preamble. 

Answer: B


Q104. Refer to the exhibit. 

Which DHCP option is shown? 

A. 32 

B. 43 

C. 60 

D. 150 

E. 241 

Answer: C


Q105. Refer to the exhibit. 

The client troubleshooting feature on Cisco WCS is very useful. You can collect the log message that is logged against a specific client on Cisco WCS. What statement about the log function in client troubleshooting is true? 

A. The log messages are collected automatically when the administrator starts to troubleshoot the client. The administrator needs to stop the log collection manually. 

B. The log messages are collected when the administrator clicks "Start". Log collection stops only after the administrator clicks "Stop". 

C. The log messages are collected automatically as soon as the administrator starts to troubleshoot the client. The log collection stops automatically after a period of 10 minutes. 

D. The log messages are collected when the administrator clicks "Start". The log collection stops automatically after 10 minutes. 

Answer: D


Refresh 350-050 pass4sure:

Q106. One of your customers is thinking of deploying wireless in a building. Which two items should you establish in a pre-site survey? (Choose two.) 

A. the exact channels that should be used 

B. the agreed coverage areas for the design 

C. the access security arrangements for getting into the building 

D. the type of deployment (data-only service, voice service, or location services) 

E. sources of RF interference 

Answer: BD


Q107. Refer to the exhibit. 

A network administrator is troubleshooting a client connection problem. In the process of collecting information, a client debug is run on the controller for the device MAC address. What is the most likely cause of the problem? 

A. WPA/802.1X Layer 2 security is enabled. Cisco Centralized Key Management is enabled. The logs show an EAP/802.1X identity request failure, which points to a WLC issue. Client will be deauthenticated. 

B. WPA2/802.1X Layer 2 security is enabled. The logs show a RADIUS identity request failure, which points to a WLC issue. Client will immediately send an EAPOL-start packet to try again. 

C. WPA2/802.1X Layer 2 security is enabled. The logs show an EAP/802.1x identity request failure, which points to a supplicant issue. Client will be deauthenticated. 

D. WPA PSK Layer 2 security is enabled. The logs show an EAP/802.1X identity request failure, which points to a supplicant issue. Client will immediately send an EAPOL-start packet to try again. 

E. WPA2 PSK Layer 2 security is enabled. The logs show an EAP/802.1X identity request failure, which points to a WLC issue. Client will be deauthenticated. 

Answer: C


Q108. Which statement describes the operation of an access point in Rogue Location Discovery Protocol mode? 

A. The AP uses the existing wireless infrastructure in order to scan for rogue APs. Once discovered, these rogues are added to a local list that includes the rogues' BSSIDs, MAC addresses, and any discovered security provisions (WPA, WEP, etc.). 

B. The AP detects a rogue client, and then the network administrator is able to contain both the rogue AP and the rogue clients. This can be achieved because 802.11 deauthentication packets are sent to clients that are associated to rogue APs, so threats such as holes are mitigated. 

C. The AP moves to the rogue channel and attempts to connect to the rogue as a client. The AP then tries to obtain an IP address and forwards a UDP packet to the controller through the rogue. If the controller receives this packet, the network administrator is notified that a rogue AP has been discovered on the wired network. 

D. The AP determines whether or not a rogue access point is on a trusted network. It does not provide RF service of any kind, but rather receives periodic rogue access point reports from the controller, and sniffs all ARP packets. If it finds a match between an ARP request and a MAC address it receives from the controller, it generates a rogue access point alert to the controller. 

Answer: C


Q109. Which authentication method is not supported when using the local RADIUS server feature of an autonomous AP? 

A. EAP-FAST 

B. EAP-TLS 

C. LEAP 

D. MAC 

Answer: B


Q110. A network administrator is troubleshooting a problem of a CAPWAP access point that intermittently disconnects from the WLC. The administrator is trying to determine when the problem is happening. UDP port 514 is allowed. What is the best option for successfully gathering comprehensive information about the problem? 

A. Configure a script to log into the WLC to gather logs and save them on a PC, where they can be reviewed daily. 

B. The CAPWAP AP has no syslog capability but the WLC does have syslog capability. Configure the WLC for syslog and level 1. 

C. Configure the CAPWAP AP and the WLC for syslog and level 6. 

D. Configure the CAPWAP AP for buffered logging and level 7. Configure the WLC for syslog and level 7. 

E. Configure the CAPWAP AP and the WLC for syslog and level 1. 

Answer: C