Act now and download your Cisco 200 355 wifund pdf test today! Do not waste time for the worthless Cisco 200 355 wifund tutorials. Download Updated Cisco Implementing Cisco Wireless Network Fundamentals exam with real questions and answers and begin to learn Cisco 200 355 vce with a classic professional.
Q171. Refer to the exhibit.
Cisco WCS version 7.0 has a configuration mismatch with what is actually running in the controller. Which menu leads to the Audit Status Report?
Q172. Strong security is required, but a centralized RADIUS authenticator has not been implemented.
Which two steps must you take to provide maximum security when using a pre-shared key? (Choose two.)
A. Change the TKIP on a weekly basis.
B. Use a key that includes mixed-case letters, numbers, and symbols with a length greater than 10 characters.
C. Use only with WPA and WPA2, following proper strong key guidelines.
D. Use the longest possible WEP key in your security policy.
Q173. What three configuration options can be executed by navigating to the WCS Administration > AAA menu? (Choose three.)
A. Add a Lobby Ambassador guest
B. Add a LDAP server
C. Add an administrative user
D. Add a MAC address list filter
E. Add a RADIUS server
F. Add a TACAS+ server
Q174. What protocol overcomes the weaknesses of LEAP?
Q175. Access points must discover a wireless LAN controller before they can become an active part of the network. In which order does an access point try to discover a controller?
A. Layer 3 CAPWAP or LWAPP broadcast discovery DHCP option 43 Locally stored controller IP address discovery DNS controller name resolution
B. Layer 3 CAPWAP or LWAPP broadcast discovery Locally stored controller IP address discovery DNS controller name resolution DHCP option 43
C. Layer 3 CAPWAP or LWAPP broadcast discovery Locally stored controller IP address discovery DHCP option 43 DNS controller name resolution
D. DNS controller name resolution DHCP option 43 Layer 3 CAPWAP or LWAPP broadcast discovery Locally stored controller IP address discovery
Q176. In a typical wireless network using WPA, WPA2 or VPN, why is it still possible for a rogue client to launch a DOS attack?
A. WPA and WPA2 are not considered strong encryption algorithms and are easily cracked.
B. 802.11 management frames are easily compromised.
C. Cisco Compatible Extensions v5 are required with WPA, WPA2, or VPN to keep rogues from launching attacks in the wireless network.
D. The message integrity check frames are never encrypted or authenticated, which allows rogues to spoof clients.
Q177. When using DHCP option 43, the discovery option supports vendor specific identifiers in order to obtain what IP address?
A. core router's gateway
B. closest distribution switch
C. local WLAN controller
D. local Radius Server
Q178. You are on the phone working with a colleague that is console connected to a lightweight AP that has lost its configuration. Which three actions are necessary to allow the AP to connect to a controller? (Choose three.)
A. Configure the AP IP address.
B. Configure the controller name.
C. Configure the controller IP address.
D. Configure the AP hostname.
E. Configure the AP IP default-gateway.
F. Configure the AP username and password.
Q179. Which EAP protocol requires a certificate only on the server side?
Q180. What two methods of authentication are available for Local EAP?
A. LDAP and RADIUS
B. Local and RADIUS
C. Local Only
D. LDAP and Local