DON'T WANT TO MISS A THING?

Certification Exam Passing Tips

Latest exam news and discount info

Curated and up-to-date by our experts

Yes, send me the newsletter

Expertly Designed Microsoft MS-200 Exam Sample Questions & Answers, Microsoft 365 Certified | SPOTO

Elevate your exam readiness with SPOTO's expertly designed Microsoft MS-200 exam sample questions and answers. Our latest practice tests provide a comprehensive exam practice experience, featuring online exam questions, sample questions, and accurate exam dumps. Gain access to a wealth of exam materials, including free tests for exam practice, mock exams that simulate the real test environment, and exam questions and answers covering all essential topics. Whether you're focusing on messaging infrastructure deployment, cloud enterprise environments, permissions, client access, mail protection, or mail flow, our MS-200 resources ensure you're fully prepared for the Microsoft 365 Certified certification exams. Unlock your potential and succeed with SPOTO's top-notch exam preparation resources.
Take other online exams

Question #1
What 802.1x role is responsible for moving a port to the authorized state?
A. Supplicant
B. Authenticator
C. Authentication Server
D. RADIUS Server
View answer
Correct Answer: B
Question #2
What does RF determine?
A. cycle pattern size
B. how often a wave occurs
C. signal size
D. quantity of energy injected in a signal
View answer
Correct Answer: B
Question #3
Which statement about configuration of Layer 2 wireless user authentication on a Cisco WLC is true?
A. Local EAP is used only if an external RADIUS is not configured or is unreachable
B. The external RADIUS is used only if local EAP is not configured
C. The administrator chooses whether local EAP or an external RADIUS is used first
D. The external RADIUS is used only if local EAP is explicitly disabled
View answer
Correct Answer: A
Question #4
Which wireless client attempts to authenticate by using 802.1X?
A. supplicant
B. authenticator
C. EAP
D. RADIUS
View answer
Correct Answer: A
Question #5
Which protocol helps the administrator to determine whether a detected rogue AP is in the network of the organization?
A. RLDP
B. RCP
C. RDP
D. RAPP
View answer
Correct Answer: A
Question #6
To implement a more secure means of communication for voice and data, what technology successfully resists interference by utilizing a wider bandwidth than needed for the transmitting signal?
A. Spread Spectrum
B. Microwave
C. Extended U-NII2
D. ISM Bands
View answer
Correct Answer: A
Question #7
You are configuring SNMPv1/v2c on a WLC. What should you do for improved security?
A. Remove the default SNMPv1 community
B. Remove the default SNMPv1 and SNMPv2 communities
C. Remove the default SNMPv2 community
D. Remove the default SNMPv3 users
View answer
Correct Answer: B
Question #8
The network administrator wants an access point to be able to find rogue APs and to support location-based services. Which AP mode meets this requirement while having the radios up and preventing client connections?
A. monitor
B. sniffer
C. rogue-detection
D. H-REAP
View answer
Correct Answer: A
Question #9
An engineer is gathering information for a wireless survey of a hospital. What three pieces of information must be collected for an active survey to assess the outcome best suited for the facility? (Choose three.)
A. presence of microwave ovens
B. number of patients that are at the facility
C. utilization of Location Services or voice applications
D. floor plans of adjacent facilities
E. use of wireless for secure records
F. spectrum analysis to locate all the computer work stations
G. existing Network Switch types and model numbers
H. type of devices present on the new wireless network
View answer
Correct Answer: ACH
Question #10
Wireless clients are experiencing loss of connectivity while roaming between controllers. To fix this, what configuration should be the same on all controllers within the mobility group?
A. management interface IP address
B. IP address of the virtual interface
C. AP Manager interface IP address
D. IP address of the Service Port
View answer
Correct Answer: B
Question #11
A client is deploying lightweight APs. Those with LAN connections to the controller would be considered what mode of deployment, while access points deployed across a higher latency connection are deployed in what mode?
A. HREAP; Bridge
B. Local; Bridge
C. HREAP; Flex Connect
D. Local; Flex Connect
View answer
Correct Answer: D
Question #12
Which encryption algorithm does WPA use?
A. RC4
B. DES
C. AES
D. DH5
View answer
Correct Answer: A
Question #13
Which Cisco AnyConnect module allows you to set the parameters that are needed to connect to the wireless network?
A. NAM
B. DART
C. posture
D. telemetry
View answer
Correct Answer: A
Question #14
Which Cisco program for WLAN client vendors helps to ensure that their devices are interoperable with Cisco WLAN infrastructure?
A. CCX
B. CCMP
C. ASDM
D. WLSE
View answer
Correct Answer: A
Question #15
How many types of control frames are only used in PCF mode?
A. 0
B. 1
C. 2
D. 3
E. 4
F. 5
View answer
Correct Answer: D
Question #16
What is a function of the service port on a WLC?
A. controls mobility manager communications on all physical ports
B. controls out-of-band management for system recovery and maintenance
C. controls communication with Cisco Aps
D. controls communications for all physical ports
View answer
Correct Answer: B
Question #17
Which device divides a signal between two antennas?
A. splitter
B. lightening arrestor
C. attenuator
D. amplifier
View answer
Correct Answer: A
Question #18
What is the IEEE name for a group of access points that are connected by using the Ethernet?
A. ESS
B. BSS
C. IBSS
D. ISS
View answer
Correct Answer: A
Question #19
Which statement describes a security weakness of a WPA2 with a PSK?
A. The compromised key can be used for another connection
B. The key can be eavesdropped from the wireless medium
C. The key can be recreated from a few eavesdropped frames
D. The key is not case-sensitive and is vulnerable to compromise by brute-force methods
View answer
Correct Answer: A
Question #20
You run minimum PEAP-GTC authentication in your wireless environment. Which version of Cisco Compatible Extensions supports PEAP-GTC?
A. Cisco Compatible Extensions v1
B. Cisco Compatible Extensions v2
C. Cisco Compatible Extensions v3
D. Cisco Compatible Extensions v4
E. Cisco Compatible Extensions v5
View answer
Correct Answer: B
Question #21
What are the interface statuses of a lightweight AP working in rogue-detection mode?
A. radios turned off, Ethernet interface up
B. radios and Ethernet interfaces up
C. radios turned on, Ethernet interface shut down
D. radios turned on, Ethernet interface status controlled by Cisco WLC
View answer
Correct Answer: A
Question #22
The network administrator has used VLANs to separate VoIP frames from data frames in the wired network. What must the administrator use to separate those frames in the wireless network?
A. multiple SSIDs
B. multiple authentications
C. multiple WEP or WPA keys
D. multiple channels
E. multiple 802
View answer
Correct Answer: A
Question #23
What is a risk when initiating the containment of a rogue AP?
A. disassociating clients of valid access points that are operated by a neighboring organization
B. disrupting transmission of neighboring AP clients
C. breaking the radio of the containing AP
D. breaking the rogue client radio or its firmware
View answer
Correct Answer: A
Question #24
A wireless bridge is being installed near an airport. An organization informs the city council about complying with max power levels that could be used and settings on any 5GHz channels used that might interfere with the airport radar. What organization is this?
A. Institute of Electrical and Electronics Engineers
B. Internet Engineering Task Force
C. Federal Communications Commission
D. Wireless Fidelity Alliance
View answer
Correct Answer: C
Question #25
When using DHCP option 43, the discovery option supports vendor specific identifiers in order to obtain what IP address?
A. core router's gateway
B. closest distribution switch
C. local WLAN controller
D. local Radius Server
View answer
Correct Answer: C
Question #26
Which type of frames are ACK and CF-ACK?
A. control
B. management
C. RTS/CTS
D. association
View answer
Correct Answer: A
Question #27
An 802.11g network is experiencing intermittent signal degradation and Spectrum Analyzer is being used to try and locate the problem. What two interferers would likely be identified? (Choose two.)
A. multiple cell phones
B. microwave oven
C. FM Radio
D. cordless phone
E. document scanner
View answer
Correct Answer: BD
Question #28
A company wants to implement wireless in all 20 remote office locations and wants centralized management of these remote sites. What application would meet the requirements?
A. Control And Provisioning of Wireless Access Points
B. Cisco point- to multi-point wireless bridging
C. Cisco autonomous access points in FlexConnect mode
D. Split MAC architecture utilizing LWAPP and WLC
View answer
Correct Answer: D
Question #29
Which spread spectrum technique uses 11-bit chips to transmit 1 bit of data over a 22-MHz channel?
A. DSSS
B. FHSS
C. OFDM
D. MIMO
E. CCK
View answer
Correct Answer: A
Question #30
Which information on the Monitoring page of a Cisco WLC verifies that the wireless network is operational?
A. In the Access Point Summary section, the All APs number in the Up column is the same as in the Total column
B. In the Client Summary section, the Current Clients number is positive
C. In the Controller Summary section, the 802
D. In the Controller Summary section, the CPU Usage number is positive
View answer
Correct Answer: A
Question #31
Which EAP protocol requires a certificate only on the server side?
A. EAP-PEAP
B. EAP-FAST
C. EAP-TLS
D. EAP-SSL
View answer
Correct Answer: A
Question #32
An engineer is seeing a pattern closest to that of an Isotropic Radiator. What other antenna will produce a similar pattern?
A. 5 dBi patch
B. 13
C. 2
D. 21 dBi parabolic
View answer
Correct Answer: C
Question #33
When using multiple SSIDs on a lightweight AP, how does the traffic of each SSID reach the 802.3 network?
A. provide routing between them at the core so that the SSIDs can reach the internet
B. configure 802
C. configure ACLs at the switch port that will allow all desired SSIDs to pass traffic
D. configure the SSIDs on the WLC and it will regulate the traffic based on traffic type
View answer
Correct Answer: B
Question #34
What is the function of the Cisco AnyConnect DART tool?
A. creates a compressed bundle of client logs and information
B. visualizes a WLAN environment, showing the possible locations of problems
C. gathers statistics from neighboring clients for comparison to the baseline
D. helps to troubleshoot a WLAN connection by using easy-to-use wizards and statistic viewers
View answer
Correct Answer: A
Question #35
Which module does the Cisco AnyConnect Secure Mobility client integrate into the AnyConnect client package for access to both wired and wireless networks?
A. Network Access Manager
B. Telemetry
C. Web Security
D. DART
View answer
Correct Answer: A
Question #36
Access points must discover a wireless LAN controller before they can become an active part of the network. In which order does an access point try to discover a controller?
A. Layer 3 CAPWAP or LWAPP broadcast discovery DHCP option 43 Locally stored controller IP address discovery DNS controller name resolution
B. Layer 3 CAPWAP or LWAPP broadcast discovery Locally stored controller IP address discovery DNS controller name resolution DHCP option 43
C. Layer 3 CAPWAP or LWAPP broadcast discovery Locally stored controller IP address discovery DHCP option 43 DNS controller name resolution
D. DNS controller name resolution DHCP option 43 Layer 3 CAPWAP or LWAPP broadcast discovery Locally stored controller IP address discovery
View answer
Correct Answer: C
Question #37
A customer mounted three new APs in a small business. After configuring the IP address, users still could not access the web through the new access points. What two configurations are needed to fix this? (Choose two.)
A. Security parameters
B. Gateway address
C. Service Set ID
D. Antenna option
E. EAP Authentication
F. Unique AP Name
View answer
Correct Answer: BC
Question #38
Based on the diagram, what two design requirements must be met? (Choose two.)
A. WGB is Autonomous
B. WGB is Universal
C. WGB can be Autonomous or Universal
D. Upstream AP is Aironet
E. Upstream AP is not Aironet
F. Upstream AP can be any make/model
View answer
Correct Answer: AD
Question #39
An installation uses a 21dBi parabolic dish. It is connected to the 802.11n radio via low loss antenna coax rated at 4dB loss/100 feet. After testing, it has been determined that 2mW of power will be lost in the cable. An EIRP producing 200mW is desired. What should the transmit power be set to?
A. 8mW
B. 3dBm
C. 3
D. 5mW
View answer
Correct Answer: C
Question #40
Which method is used to shield the client from class 3 management attacks?
A. client MFP
B. WEP
C. WPA
D. client protection suite
E. 802
View answer
Correct Answer: A

View Answers after Submission

Please submit your email and WhatsApp to get the answers of questions.

Note: Please make sure your email ID and Whatsapp are valid so that you can get the correct exam results.

Email:
Whatsapp/phone number: