لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
Which two Cisco WLC management-access methods are available as the default setting? (Choose two.)
A. SSH
B. HTTPS
C. Telnet
D. HTTP
عرض الإجابة
اجابة صحيحة: AB
السؤال #2
What are three characteristics of the 802.11g standard? (Choose three.)
A. speed of as much as 11 Mb/s
B. speed of as much as 54 Mb/s
C. backward-compatibility with 802
D. backward-compatibility with 802
E. OFDM as an additional modulation technique
F. OFDM and CCK as additional modulation techniques
عرض الإجابة
اجابة صحيحة: BDE
السؤال #3
Which two protocols are available to download or upload files to or from Cisco WLC? (Choose two.)
A. FTP
B. TFTP
C. SCP
D. HTTP
E. HTTPS
عرض الإجابة
اجابة صحيحة: AB
السؤال #4
A network engineer is troubleshooting a LAP that is unable to join the controller and receives the message below: LWAPP_CLIENT_ERROR_DEBUG. No more AP manager IP addresses remain What does the log indicate?
A. Two or more LAPs have the same IP address
B. An AP manager has the same IP address as another AP manager
C. A LAP has the same IP address as the AP manager
D. Two or more controllers have the same IP address
عرض الإجابة
اجابة صحيحة: C
السؤال #5
The Cisco WCS administrator wants to create an accurate RF heat map based on RF prediction data. Which statement about map creation in Cisco WCS is true?
A. The administrator must manually add walls, doors, and windows to the map
B. Cisco WCS automatically detects walls, doors, and windows and adds them to the map, but only when Cisco WCS Navigator is available
C. Cisco WCS automatically detects walls, doors, and windows and adds them to the map, but only when a Cisco 3300 Series MSE is available
D. All walls, doors, and windows must be included in the file that is uploaded as a background map
عرض الإجابة
اجابة صحيحة: A
السؤال #6
Which two destinations can Cisco WCS administrators specify for a scheduled report? (Choose two.)
A. a file on the Cisco WCS
B. a specified email address
C. a specified World Wide Web server
D. a TFTP server
عرض الإجابة
اجابة صحيحة: AB
السؤال #7
The administrator needs to create a report that shows all controllers, APs, and Cisco 3300 Series MSEs in the WLAN, including hardware and software information. Which report includes this information?
A. Device > Inventory
B. Mesh > Nodes
C. Network Summary > Executive Summary
D. Network Summary > 802
عرض الإجابة
اجابة صحيحة: A
السؤال #8
What are two security threats to wireless networks? (Choose two.)
A. ad-hoc networks
B. client misassociation
C. port redirection
D. cross-site scripting
عرض الإجابة
اجابة صحيحة: AB
السؤال #9
Which two algorithms are available in RRM? (Choose two.)
A. coverage-hole detection
B. dynamic channel assignment
C. RSSI normalizer
D. transmitting channel expander
E. rogue detection
عرض الإجابة
اجابة صحيحة: AB
السؤال #10
Which action secures the SNMPv2C protocol in a Cisco WLC?
A. configure new communities and disable default communities
B. use digital certificates to authenticate and encrypt transmissions
C. enable password or transfer encryption
D. set a username and difficult-to-guess password
عرض الإجابة
اجابة صحيحة: A
السؤال #11
You are configuring an IP address on an autonomous access point. Which interface do you use to configure the IP address?
A. BVI1
B. FastEthernet 0
C. Dot11Radio0
D. VLAN 1
عرض الإجابة
اجابة صحيحة: A
السؤال #12
A network engineer in the GUI of WCS version 7 wants to add an access point to a map. Where can this command be found within the drop-down menu?
A. Monitor > Maps
B. Reports > Maps
C. Monitor > Network Summary
D. Configure > Maps
عرض الإجابة
اجابة صحيحة: A
السؤال #13
What is the purpose of the Log Analysis tab on the Client Troubleshooting page in Cisco WCS?
A. After you click start, the tab shows debug information for the client that is trying to re-associate
B. The tab searches the logs for similar problems of other clients and generates a report
C. The tab generates a report from historical logs for the client that is having problems
D. The tab shows logs from the past hour for the client that is having problems
عرض الإجابة
اجابة صحيحة: A
السؤال #14
What are the three primary functions of the Cisco Unified Wireless LWAPP architecture? (Choose three.)
A. control and management of the CAPWAP
B. tunneling of VPN clients over the WAN
C. tunneling of WLAN client traffic to the WLC
D. collection of 802
E. collection of 802
F. control and management of VTP
عرض الإجابة
اجابة صحيحة: ACE
السؤال #15
Which wireless topology supports roaming?
A. IBSS
B. BSS
C. ESS
D. bridging
عرض الإجابة
اجابة صحيحة: C
السؤال #16
Which two types of encryption does Windows support for WPA2 security for wireless connections? (Choose two.)
A. AES
B. DES
C. PGP
D. TKIP
E. WEP
عرض الإجابة
اجابة صحيحة: AD
السؤال #17
What are two wireless configuration utilities for Apple Mac computers? (Choose two.)
A. AirPort
B. AirPort Extreme
C. AirManager
D. AirManager Supreme
E. AirAssistant Ultimate
عرض الإجابة
اجابة صحيحة: AB
السؤال #18
Which CAPWAP AP management-access method is available as the default setting?
A. only the console port
B. the console port and SSH
C. the console port, SSH, and HTTPS
D. SSH only
عرض الإجابة
اجابة صحيحة: A
السؤال #19
What protocol is used to determine the best pathway back to a root access point?
A. CCKM
B. WNMP
C. AWPP
D. LWAP
عرض الإجابة
اجابة صحيحة: C
السؤال #20
In a network with a deployed Cisco WLC, which two entities must be configured with the shared secret key for 802.1X authentication? (Choose two.)
A. WLC
B. RADIUS server
C. AP
D. supplicant
E. wireless client
عرض الإجابة
اجابة صحيحة: AB
السؤال #21
You are designing a wireless network in a medical facility. Which three areas are bad locations in which to install a wireless access point? (Choose three.)
A. in front of the elevators doors
B. in the hallways
C. next to the electrical room
D. inside offices
E. near medical imaging devices
F. in the lobby
عرض الإجابة
اجابة صحيحة: ACE
السؤال #22
Which two wireless technologies can interfere with 802.11 networks? (Choose two.)
A. DECT
B. ZigBee
C. WiMax
D. GSM
عرض الإجابة
اجابة صحيحة: AB
السؤال #23
What are two modules of the CCX Lite program? (Choose two.)
A. foundation
B. voice
C. RF power
D. roaming
عرض الإجابة
اجابة صحيحة: AB
السؤال #24
Which type of basic radiation pattern does a Yagi antenna have?
A. circular
B. semicircular
C. straight line
D. cone
عرض الإجابة
اجابة صحيحة: D
السؤال #25
A network engineer in the GUI of WCS version 7 wants to add an autonomous access point. Where can this command be found in the drop-down menu?
A. Configure > Access Point > Add Autonomous APs
B. Manage > Access Points > Add Autonomous APs
C. Administration > Access Point > Add Autonomous APs
D. Location > Access Point > Add Autonomous APs
عرض الإجابة
اجابة صحيحة: A
السؤال #26
Which Cisco WLC command family can help to troubleshoot communication between an AP and the WLC?
A. (Cisco Controller) >debug capwap
B. (Cisco Controller) >debug ap
C. (Cisco Controller) >debug cac
D. (Cisco Controller) >debug dot11
عرض الإجابة
اجابة صحيحة: A
السؤال #27
How can you protect the configuration file from eavesdropping, when uploading from a Cisco WLC?
A. Use the Configuration File Encryption option
B. Choose an SCP as the transfer method
C. Connect to the Cisco WLC by using HTTPS
D. Connect to the Cisco WLC by using SSH
عرض الإجابة
اجابة صحيحة: A
السؤال #28
During Layer 2 intercontroller roaming, which two items change? (Choose two.)
A. SSID
B. VLAN
C. IP address
D. AP
E. controller
عرض الإجابة
اجابة صحيحة: DE
السؤال #29
Which of the following are three functions of Cisco RRM? (Choose three.)
A. TPC
B. intercontroller roaming
C. dynamic channel assignment
D. intracontroller roaming
E. coverage hole detection
عرض الإجابة
اجابة صحيحة: ACE
السؤال #30
How does an LWAP receive a configuration file?
A. It is configured manually
B. It receives a configuration from the controller
C. It automatically ships with a configuration
D. It receives a configuration from a TFTP server
عرض الإجابة
اجابة صحيحة: B
السؤال #31
A Cisco WCS administrator has marked an alarm as acknowledged. For how many days does Cisco WCS prevent the alarm from reappearing, even if the source of the alarm reoccurs?
A. 1
B. 7
C. 10
D. 30
عرض الإجابة
اجابة صحيحة: B
السؤال #32
Which two pieces of information are needed for the wireless client to connect to the wireless network? (Choose two.)
A. SSID
B. security settings
C. channel number
D. AP name
عرض الإجابة
اجابة صحيحة: AB
السؤال #33
Which statement describes spread spectrum technology in wireless communications?
A. Signal is spread across optical pulses
B. Signal is spread across variations of amplitudes
C. Signal is spread across one frequency
D. Signal is spread across a whole band of frequencies
عرض الإجابة
اجابة صحيحة: D
السؤال #34
What path displays the current maps within the WCS version 7 GUI?
A. Monitor > Maps
B. Reports > Maps
C. Services > Maps
D. Administration > Maps
E. Configure > Maps
F. Tools > Maps
عرض الإجابة
اجابة صحيحة: A
السؤال #35
Which two formats are supported for uploading background graphics to create a network map in Cisco WCS? (Choose two.)
A. PNG
B. JPEG
C. DWG
D. TIFF
عرض الإجابة
اجابة صحيحة: AB
السؤال #36
What tab contains access point configuration in the WCS?
A. Controller > Access Points
B. Configure > Access Points
C. General > Configure > Access Points
D. System > Configure > Access Points
عرض الإجابة
اجابة صحيحة: B
السؤال #37
What technology consists of small, low-power digital radios?
A. LTE
B. WiFi
C. ZigBee
D. Bluetooth
عرض الإجابة
اجابة صحيحة: C
السؤال #38
Which two formats are available for Cisco WCS reports? (Choose two.)
A. PDF
B. CSV
C. HTML
D. TXT
عرض الإجابة
اجابة صحيحة: AB
السؤال #39
You are setting up a laptop to connect to the wireless network of your organization. The protocols that are used for the corporate network are WPA2 Enterprise, PEAP, and AES. Which three parameters do you need to configure in the Windows 7 wireless network properties for this connection? (Choose three.)
A. VLAN
B. encryption type
C. authentication method
D. VRF
E. security type
F. IP address
عرض الإجابة
اجابة صحيحة: BCE
السؤال #40
Which two of the following authentication methods used for WiFi security require the use of certificates? (Choose two.)
A. PEAP
B. EAP-FAST
C. WPA2
D. WPA1
E. EAP-TLS
F. EAP-MD5
عرض الإجابة
اجابة صحيحة: AE

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: