DON'T WANT TO MISS A THING?

Certification Exam Passing Tips

Latest exam news and discount info

Curated and up-to-date by our experts

Yes, send me the newsletter

Online Microsoft MS-200 Mock Tests & Study Materials, Microsoft 365 Certified | SPOTO

Enhance your exam preparation with SPOTO's online Microsoft MS-200 mock tests and study materials. Our latest practice tests provide a realistic exam experience, featuring online exam questions, sample questions, and accurate exam dumps. Gain access to a wealth of exam materials, including free tests for exam practice, exam questions and answers, and mock exams that simulate the real test environment. Whether you're looking to strengthen your knowledge of messaging infrastructure deployment, cloud enterprise environments, permissions, client access, mail protection, or mail flow, our MS-200 resources cover all the essential topics for the Microsoft 365 Certified certification. Unlock your potential and confidently pursue your certification goals with SPOTO's top-notch online exam preparation resources.
Take other online exams

Question #1
What is the approximate time difference for a client to perform an intracontroller roam compared to an intercontroller roam?
A. 1 ms
B. 10 ms
C. 20 ms
D. 30 ms
View answer
Correct Answer: B
Question #2
In a typical wireless network using WPA, WPA2 or VPN, why is it still possible for a rogue client to launch a DOS attack?
A. WPA and WPA2 are not considered strong encryption algorithms and are easily cracked
B. 802
C. Cisco Compatible Extensions v5 are required with WPA, WPA2, or VPN to keep rogues from launching attacks in the wireless network
D. The message integrity check frames are never encrypted or authenticated, which allows rogues to spoof clients
View answer
Correct Answer: B
Question #3
The wireless engineer has deployed the Cisco 5508 Wireless Controller. The controller is responding on the service port; however, it will not respond on the management interface. Which configuration revision will fix the management interface?
A. On the switch interface, configure switch(config-if)#switchport trunk allowed vlan add 10
B. On the WLC management interface, disable LAG on the management network
C. On the switch interface, configure switch(config-if)#switchport trunk allowed vlan 10
D. On the WLC management interface, change the VLAN ID to 20
E. On the switch interface, configure no spanning-tree portfast trunk
F. On WLC Controller > General, disable LAG and reboot
View answer
Correct Answer: A
Question #4
Which two attributes must be configured to match in order for WLCs to operate in the same mobility group? (Choose two.)
A. mobility domain name
B. virtual IP address
C. service interface address
D. hardware model
E. software version
View answer
Correct Answer: AB
Question #5
Which type of authentication is used initially by a controller-based AP so that a guest client can get an IP address?
A. 802
B. EAP
C. LEAP
D. open authentication
E. TLS
F. SSL
View answer
Correct Answer: D
Question #6
A customer has asked for the proper port configuration to allow for LAG on a Cisco 2504 Wireless Controller to a Cisco IOS switch. Which EtherChannel mode should be used on the switch to allow for the WLC to connect?
A. on
B. auto
C. desirable
D. passive
E. active
View answer
Correct Answer: A
Question #7
Which two statements are true about WiMAX technology? (Choose two.)
A. WiMAX is defined by 802
B. Typically, fixed WiMAX networks have a higher gain direction antenna installed near the client
C. WiMAX is capable of working as a long-range system over several miles
D. WiMAX works only for licensed frequencies
View answer
Correct Answer: BC
Question #8
After you configure the Cisco 5508 Wireless Controller v7.6, a customer requests an SSID that allows for client web authentication with email input. Which authentication method should be used?
A. pass-through
B. authentication
C. splash page web redirect
D. conditional web redirect
E. on MAC filter failure
View answer
Correct Answer: A
Question #9
During a wireless site survey, the signal strength drops significantly when outside of the room containing the access point. The building is made of wood and drywall. This is an example of which wireless anomaly?
A. absorption
B. refraction
C. fading
D. multipath
E. reflection
View answer
Correct Answer: A
Question #10
Which two tasks does RRM routinely perform? (Choose two.)
A. antenna selection
B. AP address assignment
C. channel assignment
D. encryption method assignment
E. transmit power control
View answer
Correct Answer: CE
Question #11
When the enterprise-based authentication method is used for WPA2, a bidirectional handshake exchange occurs between the client and the authenticator. Which five options are results of that exchange being used on a controller-based network? (Choose five.)
A. a bidirectional exchange of a nonce used for key generation
B. binding of a Pairwise Master Key at the client and the controller
C. creation of the Pairwise Transient Key
D. distribution of the Group Transient Key
E. distribution of the Pairwise Master key for caching at the access point
F. proof that each side is alive
View answer
Correct Answer: ABCD
Question #12
A help desk ticket has been entered for the wireless infrastructure. A wireless client is not able to connect at IEEE 802.11n rates. Which option allows for connectivity?
A. Set WMM mode to Optional or Required
B. Set Quality of Service (QoS) to Silver
C. Set Quality of Service (QoS) to Platinum
D. Set 7920 AP CAC to Enabled
View answer
Correct Answer: A
Question #13
In general, what is the difference in transmit power between an AP operating at Tx Power Level 1 and the same AP operating at Tx Power Level 3?
A. 2 dB
B. 3 dB
C. 6 dB
D. 11 dB
E. 17 dB
View answer
Correct Answer: C
Question #14
A help desk engineer is attempting to perform a remote packet capture on the wireless network. Which access point mode is necessary to perform this function?
A. sniffer
B. SE-Connect
C. monitor
D. rogue detector
E. FlexConnect
View answer
Correct Answer: A
Question #15
Which three items do you need to establish a wireless connection to an enterprise wireless network? (Choose three.)
A. SSID name
B. RF channel
C. RF signal
D. 802
E. pre-shared key
F. web page
G. WPA/WPA2 settings
View answer
Correct Answer: ACD
Question #16
Which menu gives you access to manage background tasks in Cisco WCS?
A. None, because the General tab provides access to the management of background tasks
B. Monitor
C. Configure
D. Services
E. Administration
F. Tools
View answer
Correct Answer: E
Question #17
An engineer wants to deploy a 2504 controller as the anchor controller for a guest WLAN that resides on a 5508 controller in a different mobility group. What configuration change must be applied to support this deployment strategy?
A. UDP 16666 and IP Protocol 97 must be enabled on the 2504 controller
B. UDP 5246 and TCP Protocol 97 must be enabled on the router
C. The 2504 controller must be added to the same mobility group as the 5508
D. DHCP Option 43 must be added to the neighboring switchport
View answer
Correct Answer: C
Question #18
An engineer has been asked to upgrade the FUS on the Wireless LAN controller. How can they monitor the status of the upgrade?
A. WLC GUI
B. WLC CLI
C. WLC Console
D. WLC Management in Prime Infrastructure
View answer
Correct Answer: C
Question #19
Which interface is considered a dynamic interface?
A. the virtual interface
B. the AP manager interface
C. the LAG interface
D. the management interface
E. the service port interface
F. a WLAN client data interface
View answer
Correct Answer: F
Question #20
You are testing a new autonomous Cisco Aironet 1260 AP that has booted for the first time on the existing corporate network, which includes voice, data, and location services. How do you reach the GUI of the AP?
A. HTTP to 10
B. HTTP to 192
C. HTTP to the DHCP address
D. HTTPS to 10
E. HTTPS to the 192
F. HTTPS to the DHCP address
View answer
Correct Answer: C
Question #21
What are four features of WPA? (Choose four.)
A. a larger initialization vector, increased to 48 bits
B. a message integrity check protocol to prevent forgeries
C. authenticated key management using 802
D. support for a key caching mechanism
E. unicast and broadcast key management
F. requires AES-CCMP
View answer
Correct Answer: ABCE
Question #22
Which two options does this icon represent about the status of the respective AP on a Cisco WCS version 7.0 map? (Choose two.)
A. The 802
B. The 802
C. The 802
D. The 802
E. The 802
F. The 802
View answer
Correct Answer: CD
Question #23
What is the difference between the IEEE, the WiFi Alliance, and the FCC, ETSI, and TELEC?
A. The IEEE and FCC are responsible for the standards that apply to wireless networks
B. The IEEE is responsible for Layer 1 and Layer 2 protocols
C. The IEEE is responsible for Layer 1 and Layer 2 protocols
D. The IEEE and FCC are responsible for the Layer 3 protocol support and frequency and power- level regulations in the United States
View answer
Correct Answer: B
Question #24
What is the maximum number of lightweight APs that can be supported from a single Cisco WCS Navigator management console with Cisco WCS and Cisco WLC running version 7.0 code?
A. 10,000
B. 20,000
C. 25,000
D. 30,000
E. 60,000
View answer
Correct Answer: D
Question #25
Which method of encryption does the 802.11i standard use?
A. AES/CCMP
B. AES/ECB
C. AES/OCB
D. TKIP
E. both AES/ECB and AES/CCMP
View answer
Correct Answer: A
Question #26
A WLAN deployment uses a combination of Cisco Aironet 1260 APs and multiple Cisco 5500 Wireless LAN Controllers to provide wireless LAN access to end- users. The network administrator has decided to use DHCP Option 43 to enable the APs to discover the wireless LAN controllers. When configuring the DHCP scope, which format should be used for the Cisco WLC addresses?
A. a comma-separated ASCII string of Cisco WLC AP-manager addresses
B. a comma-separated ASCII string of Cisco WLC management addresses
C. a comma-separated ASCII string of Cisco WLC virtual IP addresses
D. a hexadecimal string of Cisco WLC AP-manager addresses
E. a hexadecimal string of Cisco WLC management addresses
F. a hexadecimal string of Cisco WLC virtual IP addresses
View answer
Correct Answer: E
Question #27
Which Cisco AnyConnect module allows troubleshooting for core Cisco AnyConnect problems?
A. telemetry
B. web security
C. VPN
D. NAM
E. DART
F. posture
G. CSSC
View answer
Correct Answer: E
Question #28
Which key is established using the four-way handshake during the WPA authentication process?
A. Pairwise Master Key
B. Pairwise Multiple Key
C. Pairwise Session Key
D. Pairwise Transient Key
E. Pairwise Transverse Key
View answer
Correct Answer: D
Question #29
When adding a controller to manage through Cisco WCS, which address type is used and which SNMP function does the Cisco WCS perform?
A. The controller is managed through its MAC address and the Cisco WCS acts as a SNMP TRAP authenticator
B. The IP address of the controller is used and the Cisco WCS acts as a SNMP TRAP receiver
C. The controller is managed through its MAC address and the Cisco WCS acts as a SNMP agent
D. The controller connects through its MAC address to the Cisco WCS and the Cisco WCS uses the SNMP to manage the controller for all configured SNMP parameters
View answer
Correct Answer: B
Question #30
Which three severity levels are in the Cisco WCS alarm dashboard? (Choose three.)
A. Critical
B. Flash
C. Major
D. Minor
E. Trivial
F. Urgent
View answer
Correct Answer: ACD
Question #31
A customer has asked for its wireless equipment to be managed as securely as possible. Which three management protocols will provide encrypted access to the equipment? (Choose three.)
A. Secure Shell
B. HTTPS
C. SNMPv3
D. Telnet
E. SNMPv2c
F. HTTP
View answer
Correct Answer: ABC
Question #32
You have brought your MacBook Pro running OS 10.6 to work and intend use the enterprise wireless network. This network is using EAP-FAST and 2.4 GHz for data and 5 GHz for VoWLAN. Which statement about the laptop configuration and wireless connection is true?
A. Install a USBwireless adapter and configure
B. Install AppleEAP-Fast plug-in and configure
C. Install Cisco AnyConnect v2
D. Configure Apple network preferences for EAP-FAST
E. The laptop does not support EAP-FAST and will be unable to connect
F. The laptop only supports 5 GHz and will be unable to connect
View answer
Correct Answer: D
Question #33
What is the impact of configuring a single SSID to support TKIP and AES encryption simultaneously?
A. The overhead associated with supporting both encryption methods degrades client throughput significantly
B. Some wireless client drivers might not handle complex SSID settings and may be unable to associate to the WLAN
C. This configuration is unsupported and the Cisco Wireless Control System generates alarms continuously until the configuration is corrected
D. This configuration is common for migrating from WPA to WPA2
View answer
Correct Answer: B
Question #34
A wireless engineer has been asked to plan a deployment covering the aisles of a warehouse with optimal coverage while bleeding RF across aisles. Which antenna type provides the necessary coverage?
A. patch
B. omnidirectional
C. Yagi
D. parabolic dish
View answer
Correct Answer: A
Question #35
A help desk ticket states that a wireless access point has not joined its controller and is flashing rapidly. How can the help desk administer the access point with the default settings?
A. console
B. SSH
C. Telnet
D. HTTP
E. HTTPS
View answer
Correct Answer: A
Question #36
Which Cisco AnyConnect module provides wireless connectivity?
A. telemetry
B. web security
C. VPN
D. NAM
E. DART
F. posture
G. CSSC
View answer
Correct Answer: D
Question #37
When a guest client is authenticated, which type of connection is created between the controller- based AP and the client?
A. as SSL connection
B. a TLS encrypted tunnel
C. an unsecured connection
D. a 802
E. an IPsec tunnel
View answer
Correct Answer: C
Question #38
Which operating mode is valid for controllers in a converged access architecture?
A. switch peer groups
B. mobility controller
C. auto-anchor
D. foreign anchor
View answer
Correct Answer: B
Question #39
Which option is needed to earn the Cisco Compatible credential for Cisco Compatible Extensions Lite?
A. Foundation and Management are required
B. Location and Management are required
C. Foundation and Location are required
D. Foundation and Voice are required
E. Voice is required
F. Foundation is required
G. Location is required
H. Management is required
View answer
Correct Answer: F
Question #40
Strong security is required, but a centralized RADIUS authenticator has not been implemented. Which two steps must you take to provide maximum security when using a pre-shared key? (Choose two.)
A. Change the TKIP on a weekly basis
B. Use a key that includes mixed-case letters, numbers, and symbols with a length greater than 10 characters
C. Use only with WPA and WPA2, following proper strong key guidelines
D. Use the longest possible WEP key in your security policy
View answer
Correct Answer: BC

View Answers after Submission

Please submit your email and WhatsApp to get the answers of questions.

Note: Please make sure your email ID and Whatsapp are valid so that you can get the correct exam results.

Email:
Whatsapp/phone number: