DON'T WANT TO MISS A THING?

Certification Exam Passing Tips

Latest exam news and discount info

Curated and up-to-date by our experts

Yes, send me the newsletter

Microsoft MS-200 Exam Success: Mock Tests & Study Resources, Microsoft 365 Certified | SPOTO

Unlock exam success with SPOTO's comprehensive mock tests and study resources for the Microsoft MS-200 certification. Our latest practice tests provide a realistic exam experience, featuring online exam questions, sample questions, and accurate exam dumps. Gain access to a wealth of exam materials, including free tests for exam practice, mock exams that simulate the real testing environment, and exam questions and answers covering all essential topics. Whether you're focusing on messaging infrastructure deployment, cloud enterprise environments, permissions, client access, mail protection, or mail flow, our MS-200 resources ensure you're fully prepared for the Microsoft 365 Certified certification exams. Elevate your preparedness and succeed with SPOTO's top-notch exam preparation resources.
Take other online exams

Question #1
Which command path correctly describes how to access and troubleshoot clients with Cisco WCS version 7.0?
A. Tools > Clients > select displayed client's MAC address
B. Tools > Clients > enter client's MAC address
C. Monitor > Clients > click displayed client's MAC address
D. Monitor > Clients > enter client's MAC address
View answer
Correct Answer: C

View The Updated MS-200 Exam Questions

SPOTO Provides 100% Real MS-200 Exam Questions for You to Pass Your MS-200 Exam!

Question #2
Which Cisco WCS tool allows you to view current reports, open specific types of reports, create and save new reports, and manage scheduled runs?
A. Reports menu
B. Reports launch page
C. Scheduled Run results
D. saved reports
View answer
Correct Answer: B
Question #3
How are application-specific devices differentiated from laptop computers in the way they support Cisco Compatible Extensions?
A. ASDs are required to support only Cisco Compatible Extensions v1 and v2 features
B. ASDs are required to support only Cisco Compatible Extensions v5 management features, while laptops are required to support optional features
C. Several features that are required for laptops are not required for ASDs
D. There is no differentiation
View answer
Correct Answer: C
Question #4
What are three primary components that describe TKIP? (Choose three.)
A. broadcast key rotation
B. dynamic WEP
C. message integrity check
D. per-packet key hashing
E. symmetric key cipher
F. WPA2 enterprise mode
View answer
Correct Answer: ACD
Question #5
A lightweight AP has been deployed in local mode in a network that consists of 10 wireless LAN controllers in a single mobility group. The AP has been configured to use primary, secondary, and tertiary Cisco WLCs. Due to a major power failure, all those Cisco WLCs are unavailable. Which step does the AP take next?
A. The AP reboots and repeatedly attempts to join the configured primary, secondary, and tertiary Cisco WLCs in that order
B. The AP attempts to join a Cisco WLC configured as a master controller
C. The AP attempts to join the Cisco WLC that has the greatest capacity available
D. The AP state transitions to AP Fallback Mode and continues to provide limited WLAN services (that is, no new client authentications) until a Cisco WLC is available
View answer
Correct Answer: B
Question #6
A controller is connected to a Cisco Catalyst switch. The switch port configuration looks like this: interface GigabitEthernet 1/0/10 switchport switchport trunk encapsulation dot1q switchport trunk allowed vlan 1,20,30,50 switchport trunk native vlan 20 switchport mode trunk Which controller CLI command assigns its management interface to the native VLAN interface of the Cisco Catalyst switch?
A. config interface vlan management 0
B. config interface vlan management 1
C. config interface vlan management 20
D. config interface vlan management 30
E. config interface vlan management 50
View answer
Correct Answer: A
Question #7
Which two statements about beacon frames used by access points are true? (Choose two.)
A. They contain SSIDs if this feature is enabled
B. They provide vendor proprietary information
C. They are another name for an associated request
D. They are sent in response to a probe frame
E. They include ATIM window information for power save operations
View answer
Correct Answer: AB
Question #8
What is the EIRP value for a transmitter that has a transmitter capable of 15 dBm, an antenna that has a gain of 12 dBi, and a cable that connects the transmitter to the antenna that has 1 db loss?
A. 26 dBm
B. 100 mW
C.
D. 165 dBm
E. 1000 mW
View answer
Correct Answer: A
Question #9
The introduction of consumer phones and tablets into enterprise WLANs can have an impact on 802.11a/b/g/n deployments. The Apple iPhone 4 and iPad 2 are very common examples. Which statement best describes the abilities of these devices?
A. The Apple iPhone 4 and the iPad 2 use 2
B. The Apple iPhone 4 uses only 2
C. The Apple iPhone 4 uses 2
D. The Apple iPhone 4 uses 2
View answer
Correct Answer: D
Question #10
In the AP Layer 3 controller discovery process, after the LWAPP Discovery Request is broadcast on a local subnet, what is the next step that the AP takes?
A. Determine whether the controller responses are the primary controller
B. Send an LWAPP discovery request to controllers learned via OTAP if operational
C. Send an LWAPP response to the master controller if known
D. Wait 5 seconds and resend a Discovery Request to the local subnet
View answer
Correct Answer: B
Question #11
Which three options are limitations when configuring basic security on an autonomous AP when using the express security page setup? (Choose three.)
A. You need multiple SSIDs
B. Delete all the SSIDs
C. Edit the SSIDs
D. Use multiple authentication servers
E. Use the same SSID on both radios
F. Use a single SSID on a single radio
View answer
Correct Answer: CDE
Question #12
Which three options relate to event-driven RRM? (Choose three.)
A. any 802
B. specific AP models
C. minimum of AP and WLC
D. minimum of AP, WLC, and WCS
E. minimum of AP, WLC, WCS, and MSE
F. configurable in WLC at 802
G. configurable in WLC at 802
View answer
Correct Answer: BCG
Question #13
When an AP, in its default configuration mode, connects to a Cisco WLC, which methods are available for remote management access to an AP?
A. SSL and SSH are available only after configuration by a Cisco WLC version 7
B. SSH only
C. HTTPS, and SSH
D. SSH and Telnet
E. SSH and Telnet are available only after configuration by a Cisco WLC version 7
View answer
Correct Answer: D
Question #14
Which three Cisco Unified Wireless Network capabilities use information that is provided by Radio Resource Management neighbor messages? (Choose three.)
A. aggressive load balancing
B. dynamic channel assignment
C. hybrid remote edge access point
D. intercontroller mobility (that is, mobility groups)
E. over-the-air provisioning
F. rogue AP classification
View answer
Correct Answer: BEF
Question #15
Which option best describes the limitation of a client that is attempting to manage a WLC while using the client wireless adapter connection to the wireless infrastructure?
A. Controllers must be managed using only secure protocols (that is, SSH and HTTPS), not nonsecure protocols (that is, HTTP and Telnet)
B. Read-write access is not available; only read-only access is supported
C. Uploads and downloads from the controller are not allowed
D. Wireless clients can manage other controllers, but not the same controller and the AP to which the client is associated
View answer
Correct Answer: C
Question #16
Which statement about the impact of configuring a single SSID to support TKIP and AES encryption simultaneously is true?
A. The overhead associated with supporting both encryption methods significantly degrades client throughput
B. Some wireless client drivers might not handle complex SSID settings and may be unable to associate to the WLAN
C. This configuration is unsupported and the Cisco Wireless Control System generates alarms continuously until the configuration is corrected
D. This configuration is common for migrating from WPA to WPA2
View answer
Correct Answer: B
Question #17
The corporate network locates all RADIUS servers at the centralized data center for authentication. The remote offices use access points operating in H-REAP mode using v5.0 code with various local and central switch WLANs. When a remote office has lost connectivity to the main corporate network due to a WAN outage, which two statements correctly describe the status of that remote office when H-REAP access points are operating in standalone mode? (Choose two.)
A. All Cisco APs with 16 MB of RAM or more can operate as standalone H-REAP
B. All clients will continue association until the respective authentication timers expire
C. If configured, clients using WPA or WPA2 with PSK and locally switched WLANs will continue to operate
D. If configured, locally switched WLANs will continue operation using the backup RADIUS server feature
E. If configured, locally switched WLANs will continue operation using Local-EAP for EAP-LEAP and EAP-FAST for up to twenty users
F. If configured, locally switched WLANs will continue operation using Local-EAP for EAP-LEAP, EAP-FAST, EAP-TLS, and EAP-PEAP for up to twenty users
View answer
Correct Answer: CE
Question #18
You are in a coffee shop and you have connected to their wireless hot-spot. Your Windows 7 wireless client shows five green bars with a yellow shield. Which statement about the level of signal strength and the WLAN security that is present is true?
A. You have excellent signal strength and a secure network connection
B. Your wireless client needs a username and password before it can connect to the WLAN
C. You have excellent signal strength and the client is waiting for you to enter a username and password
D. Your laptop is not receiving a signal
E. Your laptop is receiving an excellent signal and the network security is open
View answer
Correct Answer: E
Question #19
You are sitting in an airport preparing to use a free WLAN. When you look at the connections in your Windows 7 wireless client, you see a network name and three boxes with a yellow shield. What does this mean?
A. You cannot connect to this WLAN
B. An open ad hoc network is nearby
C. The WLAN in the airport is open
D. A secure ad hoc network is nearby
E. A secure WLAN is in the airport
F. You must provide a username and password to access the WLAN in the airport
View answer
Correct Answer: B
Question #20
With the current Cisco WLC version 7.0 syslog level settings set the way they are, which log levels are captured by the Syslog server?
A. syslog level errors only
B. all syslog levels
C. only the syslog severity level number of error and greater
D. only the syslog severity level number of error and less
View answer
Correct Answer: D
Question #21
Cisco Client Management Frame Protection is running on a mobility group with two controllers. Which two MFP requirements protect the network? (Choose two.)
A. forces clients to authenticate, using a secure EAP method only
B. implements the validation of wireless management frames
C. requires Cisco Compatible Extensions v5
D. requires the use of a nonbroadcast SSID
E. requires Cisco Compatible Extensions v4
View answer
Correct Answer: BC
Question #22
Which path do you take to manage the results of a report that had been run on network utilization?
A. Reports > Report Launch Pad > Device > Utilization
B. Reports > Report Launch Pad > Scheduled Run Results
C. Reports > Saved Reports > Scheduled Run Results
D. Reports > Scheduled Run Results
View answer
Correct Answer: D
Question #23
Which key combination provides a detailed wireless connection status for an Apple MacBook running 10.6?
A. Command + Click the SSID of the network
B. Alt + Click the SSID of the network
C. Command + the Airport icon
D. Option + the Airport icon
E. Ctrl + the Airport Icon
F. Option + Click the SSID of the network
View answer
Correct Answer: D
Question #24
Which two items are used to help convert a lightweight AP into an autonomous AP? (Choose two.)
A. HTTP express setup on the AP
B. Cisco WCS template
C. Cisco WLC CLI
D. Windows Cisco Conversion Tool
E. image with naming convention of platform_name-k9w7-tar
F. image with naming convention of platform_name-rcvk9w8-tar
View answer
Correct Answer: CE
Question #25
What is the equivalent of 26 dBm in milliwatts?
A. 4 mW
B. 40 mW
C. 100 mW
D. 400 mW
E. 1000 mW
View answer
Correct Answer: D
Question #26
Which single tool helps to troubleshoot client-related issues in a WLAN?
A. The show and debug commands on the controller
B. The show commands on the AP
C. Client templates on the Cisco WCS
D. Client troubleshooting on the Cisco WCS
View answer
Correct Answer: D
Question #27
Why are wireless analog video signals that are operating in the 2.4-GHz band particularly harmful to Wi-Fi service?
A. Analog video is a strong signal and increases the SNR
B. Analog video is a constant signal with 100% duty cycle
C. Analog video signals are slow frequency hopping and tend to affect the entire band
D. Analog Video modulation is the same as Wi-Fi and causes interference
View answer
Correct Answer: B
Question #28
Which Cisco AnyConnect module allows troubleshooting for core AnyConnect problems?
A. telemetry
B. web security
C. VPN
D. NAM
E. DART
F. posture
G. CSSC
View answer
Correct Answer: E
Question #29
Which two actions are best for deploying VoWLAN on a wireless network? (Choose two.)
A. Minimize the use of Class 3 Bluetooth devices
B. Minimize the use of analog cameras
C. Minimize the use of IP cameras
D. Maximize client access by enabling all data rates used by clients
E. Maximize client access by enabling only a few high data rates used by clients
View answer
Correct Answer: BE
Question #30
What security benefit is enabled by using Management Frame Protection?
A. Provides encryption of administrator sessions between a wireless client and a wireless LAN controller
B. Protects the network infrastructure from denial-of-service attacks that attempt to flood the network with associations and probes
C. Prevents the formation of client ad hoc networks within the RF coverage domain
D. Detects network reconnaissance probes, like those used by tools like NetStumbler, that attempt to discover the wireless network topology
View answer
Correct Answer: B
Question #31
How many RADIUS servers can be configured globally and per WLAN on a Cisco WLC version 7.0?
A. 7 global; additional 1 per WLAN
B. 7 global; additional 3 per WLAN
C. 17 global; additional 1 per WLAN
D. 17 global; additional 3 per WLAN
E. 7 global; reuse of up to 1 maximum per WLAN
F. 17 global; reuse of up to 1 maximum per WLAN
G. 17 global; reuse of up to 3 maximum per WLAN
View answer
Correct Answer: G
Question #32
When a wireless client is authenticated in a controller-based wireless network, which three pieces of source identification information can be used by the controller for an Access-Request message that is sent to an external RADIUS server? (Choose three.)
A. wireless client IP address
B. controller IP address
C. AP IP address
D. wireless client MAC address
E. controller MAC address
F. AP MAC address
View answer
Correct Answer: BEF
Question #33
An AP has been configured for personal wireless access to the Internet using appropriate security and cloaking. Which two items should be configured on the wireless client? (Choose two.)
A. RF channel
B. BSS
C. PSK
D. 802
E. broadcast SSID
F. manual SSID
G. IBSS
View answer
Correct Answer: CF
Question #34
When using the CLI command eping, configured for auto-anchor mobility wireless guest access, which type of packet is tested?
A. data packets
B. mobility unencrypted packets
C. mobility encrypted packets
D. SNMP control packets
E. NTP control packets
View answer
Correct Answer: A
Question #35
The existing Cisco Unified Wireless Controller is running version 7.0 code for both the controllers and the Cisco WCS. A controller has been configured with an appropriate rogue rule condition to report discovered APs to the Cisco WCS. Which default alarm level is used to display all rogue APs in the Alarm Summary?
A. Critical
B. Flash
C. Urgent
D. Major
E. Minor
View answer
Correct Answer: E
Question #36
When the pre-shared key authentication method is used for WPA or WPA2, for which two functions is the pre-shared key used? (Choose two.)
A. to act as the Group Transient Key during the bidirectional handshake
B. to act as the Pairwise Master Key during the bidirectional handshake
C. to derive the nonce at each side of the exchange
D. to derive the Pairwise Transient Key
View answer
Correct Answer: BD
Question #37
An AP using version 7.0 MR1 broadcasts a Layer 3 CAPWAP discovery message on the local IP subnet. Which step does the AP take next?
A. Determine if the controller responses include the primary controller
B. Determine if the controller responses include the master controller
C. Send a discovery request using DHCP option 43
D. Send a discovery request using DNS
E. Send a discovery request using locally stored information on the AP
F. Send a discovery request using OTAP
View answer
Correct Answer: E
Question #38
Which official port should be used when configuring external RADIUS authentication on a Cisco WLC version 7.0?
A. 49
B. 1645
C. 1646
D. 1812
E. 1813
View answer
Correct Answer: D
Question #39
Which three AP modes of operation allow for the wIPS sub mode? (Choose three.)
A. local mode
B. bridge mode
C. monitor mode
D. H-REAP mode
E. rogue detector mode
F. SE-Connect mode
G. sniffer mode
View answer
Correct Answer: ACD
Question #40
Which open standard defines the combination of Extensible Authentication Protocol with Advanced Encryption Standard for providing strong wireless LAN client security?
A. IEEE 802
B. IEEE 802
C. WEP
D. WPA
E. WPA2
View answer
Correct Answer: B

View The Updated Microsoft Exam Questions

SPOTO Provides 100% Real Microsoft Exam Questions for You to Pass Your Microsoft Exam!

View Answers after Submission

Please submit your email and WhatsApp to get the answers of questions.

Note: Please make sure your email ID and Whatsapp are valid so that you can get the correct exam results.

Email:
Whatsapp/phone number: