Ucertify offers free demo for 200 355 pdf exam. "Implementing Cisco Wireless Network Fundamentals", also known as ccna wireless 200 355 exam, is a Cisco Certification. This set of posts, Passing the Cisco ccna wireless 200 355 official cert guide exam, will help you answer those questions. The cisco 200 355 Questions & Answers covers all the knowledge points of the real exam. 100% real Cisco ccna wireless 200 355 pdf exams and revised by experts!

Q131. Wireless clients are experiencing loss of connectivity while roaming between controllers. To fix this, what configuration should be the same on all controllers within the mobility group? 

A. management interface IP address 

B. IP address of the virtual interface 

C. AP Manager interface IP address 

D. IP address of the Service Port 


Q132. Which two statements about AES-CCMP are true? (Choose two.) 

A. It is an encryption algorithm used in the 802.11i security protocol. 

B. It is defined in 802.1X. 

C. It is the encryption algorithm used in TKIP implementations. 

D. It is required in WPA. 

E. It is required in WPA2. 

Answer: A,E 

Q133. A customer has completed the installation of an 802.11ac greenfield deployment at their corporate headquarters. They would like to leverage 802.11ac enhanced speeds on the trusted employee WLAN. In order to configure the employee WLAN, what Layer 2 security policies are valid? 






Q134. An engineer is seeing a pattern closest to that of an Isotropic Radiator. What other antenna will produce a similar pattern? 

A. 5 dBi patch 

B. 13.5 dBi Yagi 

C. 2.2 dBi omni 

D. 21 dBi parabolic 


Q135. A company wants to implement wireless in all 20 remote office locations and wants centralized management of these remote sites. What application would meet the requirements? 

A. Control And Provisioning of Wireless Access Points 

B. Cisco point- to multi-point wireless bridging 

C. Cisco autonomous access points in FlexConnect mode 

D. Split MAC architecture utilizing LWAPP and WLC 


Q136. Refer to the exhibit. Which two wireless functions is the client experiencing? (Choose two.) 

A. Inter-controller Roaming 

B. Intra-controller Roaming 

C. Layer 2 Roaming 

D. Layer 3 Roaming 

E. Inter-subnet roaming 

F. Re-authentication 

Answer: B,C 

Q137. Which change can correct inband access to the WLC? 

A. change the switch FastEthernetO/1 duplex setting 

B. change the switch FastEthernetO/1 speed setting 

C. enable the switch FastEthernetO/1 spanning-tree port-fast trunk 

D. change the switch FastEthernetO/1 trunk encapsulation 

E. change the WLC management interface to use DHCP 

F. change the WLC management interface VLAN 

G. change the WLC configuration of NTP 

H. browse to WLC via 


Q138. You have an organization that has a growing number of standalone APs. You would like to migrate to lightweight APs and manage them through Cisco WCS. 

Which software platform allows you to make this migration? 

A. The enterprise version of Cisco WCS allows this migration and provides the most flexibility in the number of APs supported. 

B. CiscoWorks WLSE is the only management platform that allows this migration, but it is limited to 500 APs. 

C. You can migrate your network to Cisco WCS single server with the CiscoWorks WLSE upgrade software upgrade. 

D. You can migrate the network by using either the single server or enterprise software platforms, both using the CiscoWorks WLSE upgrade software upgrade. 


Q139. Which statement best describes the ability of a wireless client to access and transmit a data frame to an AP? 

A. The client listens to the media until polled by the AP using PCF to send its data. 

B. The client listens to the media until a data frame is finished, at which time it transmits, unless a collision of data frames has occurred. 

C. The client uses random countdown timers to start the transmission of a data frame. 

D. The client listens to the media and countdown timers to start the transmission of a data frame. 


Q140. Refer to the exhibit. 

Which syslog facility option is shown? 

A. an information field, which is added to every message that comes from the WLC 

B. a security feature, which is set on the syslog server 

C. the type of syslog server 

D. the Cisco WLC identifier for this syslog server