Get Full Version of the Exam
http://www.EnsurePass.com/200-355.html
Question No.21
Mac OS X machines are having issues accessing the wireless network. While working with TAC, the administrator is asked to find the Mac laptop#39;s wireless adapter model and driver. Where should the administrator look to find this information?
-
About This Mac gt; System Report
-
Control Panel gt; System
-
System Preferences gt; Network gt; Wi-Fi Adapter gt; Advanced
-
Control Panel gt; Networking gt; Adapters gt; Properties
Correct Answer: A
Question No.22
If an antenna has a dBd of 8.6, what is the dBi value?
A. |
6.2 |
B. |
6.46 |
C. |
8.6 |
D. |
10.74 |
E. |
12.88 |
Correct Answer: D
Question No.23
Which two statements about the requirements to configure inter-controller roaming are true? (Choose two.)
-
The same mobility domain names are configured across controllers.
-
The same RF group names are configured across controllers.
-
The same controller hardware version is configured across controllers.
-
The same AP manager interface is configured across controllers.
-
The same virtual interface is configured across controllers.
-
The same controller software version is configured across controllers.
Correct Answer: AE
Question No.24
Which type of basic radiation pattern does a Yagi antenna have?
-
circular
-
semicircular
-
straight line
-
cone
Correct Answer: D
Question No.25
Microsoft Active Directory integrated machines are not authenticating to the internal WLAN. The WLAN settings are WPA2-AES-802.1x and are authenticating to a Cisco Identity Services Engine server. You investigate and note that non-domain authenticated machines are properly authenticating to the WLAN using their Active Directory credentials. Why would this problem
occur?
-
The WLAN is configured improperly in group policy.
-
The ACS server is not joined to the domain, causing authentications to fail.
-
The domain machines are configured to disable the wireless adapter.
-
The non-domain machines are using local accounts that are not authenticated through the domain.
Correct Answer: A
Question No.26
A customer has requested a single point of policy enforcement for LAN and WLAN. Which deployment model should be used?
-
converged
-
autonomous
-
FlexConnect
-
centralized
Correct Answer: A
Question No.27
Which two principles must be considered when deploying a wireless network through a wooded area? (Choose two.)
-
absorption
-
reflection
-
diffraction
-
scattering
-
refraction
Correct Answer: AD
Question No.28
Which two statements about WiMAX technology are true? (Choose two.)
-
WiMAX is defined by 802.11i.
-
Typically, fixed WiMAX networks have a higher-gain directional antenna installed near the client.
-
WiMAX is capable of working as a long-range system over several miles.
-
WiMAX works only for licensed frequencies.
Correct Answer: BC
Question No.29
Which type of frames are ACK and CF-ACK?
-
control
-
management
-
RTS/CTS
-
association
Correct Answer: A
Question No.30
When an AP, in its default configuration mode, connects to a Cisco WLC, which methods are available for remote management access to an AP?
-
SSL and SSH are available only after configuration by a Cisco WLC version 7.0.
-
SSH only
-
HTTPS, and SSH
-
SSH and Telnet
-
SSH and Telnet are available only after configuration by a Cisco WLC version 7.0.
Correct Answer: D
Get Full Version of the Exam
200-355 Dumps
200-355 VCE and PDF