WIRELESS: CH26 - 29
When using a Cisco WLC, client sessions with the WLAN are set to how many seconds by default? Question 14 options: A) 600 B) 900 C) 1800 D) 3600
1800
A Cisco embedded WLC deployment can typically support up to how many APs? Question 27 options: A) 100 B) 200 C) 3000 D) 6000
200
A cloud WLC deployment can support how many clients? Question 6 options: A) 2,000 B) 4,000 C) 32,000 D) 64,000
32,000
Fill in the blanks: Cisco controllers support a maximum of ________ WLANs, but only ________ of them can be actively configured on an AP. Question 40 options: A) 16, 5 B) 512, 16 C) 100, 50 D) 100, 5
512, 16
What is the max data rate for the 802.11n standard? Question 30 options: A) 2 Mbps B) 54 Mbps C) 600 Mbps D) 6.93 Gbps
600 Mbps
A unified WLC deployment can support how many clients? Question 18 options: A) 2,000 B) 4,000 C) 32,000 D) 64,000
64,000
Which of the following terms describes a WLC's ability to automatically choose and configure the RF channel used by each AP, based on other active access points in the area? Question 26 options: A) Self-healing wireless coverage B) Flexible client roaming C) Dynamic channel assignment D) RF monitoring
Dynamic channel assignment
When connecting a VLAN to a WLAN, which interface is used? Question 34 options: A) Management interface B) Virtual interface C) Service port interface D) Dynamic interface
Dynamic interface
Which of the following is a wireless authentication method, developed by Cisco, in which authentication credentials are protected by passing a protected access credential (PAC) between the AS and the supplicant? Question 43 options: A) EAP-FAST B) PEAP C) EAP-TLS D) GCMP
EAP-FAST
Which authentication method is considered the most secure wireless authentication method currently available? Question 24 options: A) EAP-FAST B) PEAP C) LEAP D) EAP-TLS
EAP-TLS
Which of the following is a security tool that can help prevent against data tampering by sending a secret stamp inside of an encrypted data frame? A) MIC B) KIP C) OAuth D) EAP
MIC
Which WPA version adds additional features such as Simultaneous Authentication of Equals (SAE), Forward secrecy, and Protected management frames (PMF)? Question 19 options: A) WPA B) WPA2 C) WPA3 D) These features are not in any version of WPA.
WPA3
Which WPA version has encryption and MIC with AES and GCMP? Question 25 options: A) WPA B) WPA2 C) WPA3 D) WPA4
WPA3
Which of the following describes an IBSS? Question 37 options: A) A network in which multiple access points are spread throughout multiple geological locations B) A network in which two or more wireless devices connect to each other directly, with no other means of network connectivity C) A network which contains a single access point D) A network in which only certain devices have authorization to connect to the wireless network
A network in which two or more wireless devices connect to each other directly, with no other means of network connectivity
When referring to wireless networks, membership in a BSS is known as which of the following? Question 35 options: A) Partnership B) Association C) Neighbor D) Pair
Association
Which of the following types of access points are equipped with both wired and wireless hardware so that the wireless client associations can be terminated onto a wired connection locally at the AP? Question 11 options: A) Cloud AP B) Autonomous AP C) Contained AP D) Split-MAC AP
Autonomous AP
A basic service set (BSS) is bounded by the area in which the access point's signal is usable. What is this area known as? A) Basic service area (BSA) B) Wireless service area (WSA) C) Basic service reach (BSR) D) Wireless service reach (WSR)
Basic service area (BSA)
Which tunneling protocol makes it possible for a lightweight AP and WLC to carry 802.11-related messages and client data between them? Question 33 options: A) L2TP B) PPTP C) IPsec D) CAPWAP
CAPWAP
Which one of the following is the data encryption and integrity method used by WPA2? Question 21 options: A) CCMP B) GCMP C) TKIP D) WIPS
CCMP
An engineer works for an organization with a large number of Cisco APs. She would like to be able to manage and maintain all of the APs in one central location. What product could the engineer use to accomplish this? Question 7 options: A) Cisco Autonomous Platform B) Cisco Prime Infrastructure C) Cisco AP Manager D) Cisco Network Monitor
Cisco Prime Infrastructure
The Cisco Meraki is an example of which type of access point? Question 41 options: A) Isolated B) Autonomous C) Split D) Cloud-based
Cloud-based
An engineer needs to add an additional access point to extend the range of their wireless network. However, it's not possible to run a wired network cable to the new access point. What could this engineer do so that the new wireless access point doesn't require a wired connection to the access point? Question 29 options: A) There is no way to make this scenario work without the engineer being able to provide a wired connection to the access point. B) Configure the access point to use IBSS. C) Configure the access point to operate in repeater mode. D) Use a workgroup bridge to connect the two access points.
Configure the access point to operate in repeater mode.
Which WLC port is an asynchronous connection to a terminal emulator that can be used for out-of-band management, system recover, and initial boot functions? Question 28 options: A) Service port B) Redundancy port C) Console port D) Distribution port
Console port
The IEEE 802.11 standard refers to the upstream wired Ethernet as the ________ for the wireless BSS. Question 39 options: A) Upstream system B) Distribution connection C) Ethernet retrieval D) Distribution system
Distribution system
The WLC port that is used for all normal AP and management traffic, and usually connects to a switch port in 802.1Q trunk mode is known as what? Question 42 options: A) Service port B) Redundancy port C) Console port D) Distribution system port
Distribution system port
What is the term used to describe when access points are placed at multiple geographical locations and interconnected by a switched infrastructure? Question 38 options: A) Basic service set B) Extended service set C) Geographical service set D) Enhanced service set
Extended service set
What is the name of the protocol that defines a set of common functions that actual authentication methods can use to authenticate users? Question 15 options: A) Expanded Authentication Protocol B) Wireless Security Protocol C) Extensible Authentication Protocol D) Multi-security Protocol
Extensible Authentication Protocol
Which of the following is not a method for accessing a Cisco WLC? Question 31 options: A) HTTPS B) HTTP C) FTP D) SSH
FTP
If you wanted to classify all frames in your WLAN as "video" for QoS, which of the following should you select from the QoS drop-down menu? Question 20 options: A) Platinum B) Gold C) Silver D) Bronze
Gold
Which standard must wireless devices adhere to? Question 5 options: A) IEEE 802.11 B) IEEE 802.1 C) IEEE 802.3 D) IEEE 802.14
IEEE 802.11
Wired Ethernet is based on which IEEE standard? Question 9 options: A) IEEE 802.11 B) IEEE 802.1 C) IEEE 802.3 D) IEEE 802.14
IEEE 802.3
One disadvantage of EAP-TLS is which of the following? Question 16 options: A) It's not as secure as other authentication methods. B) It can be complex to implement. C) It isn't compatible with many network types. D) It can only be used in small networks.
It can be complex to implement.
When the functions of an autonomous AP are divided and the AP performs only real-time 802.11 operation, the AP is known as which of the following? Question 45 options: A) Independent AP B) Cloud-based AP C) Lightweight AP D) Unified AP
Lightweight AP
Which interface is used for normal management traffic, such as RADIUS user authentication, WLC-to-WLC communication, web-based and SSH sessions, as well as used to terminate CAPWAP tunnels between the controller and its AP? Question 8 options: A) Management interface B) Virtual interface C) Service port interface D) Dynamic interface
Management interface
Which method of wireless authentication leverages a digital certificate on the AS as a robust method to authenticate the RADIUS server? Question 36 options: A) EAP-FAST B) EAP C) PEAP D) LEAP
PEAP
On what configuration page of the Cisco WLC would you be able to configure a Wi-Fi Multimedia (WMM) policy? Question 4 options: A) Advanced B) General C) Security D) QoS
QoS
The Wired Equivalent Privacy (WEP) uses which encryption algorithm to encrypt data? Question 12 options: A) Blowfish B) HMAC C) AES D) RC4
RC4
The WLC port that is used to connect to a peer controller for high availability (HA) operation is known as what? Question 10 options: A) Service port B) Redundancy port C) Console port D) Distribution system port
Redundancy port
A user has a laptop so that she can freely move around the office building and work in difference locations. As the user walks through the building, her device immediately connects to the closest access point. What is this known as? Question 23 options: A) Wireless passing B) Swapping C) Hopping D) Roaming
Roaming
Which WLC port is used for out-of-band management, system recovery, and initial boot functions and always connects to a switch port in access mode? Question 44 options: A) Service port B) Redundancy port C) Console port D) Distribution system port
Service port
By default, on a Cisco WLC, the Quality of Service (QoS) is set to which of the following? Question 17 options: A) Platinum B) Gold C) Silver D) Bronze
Silver
In autonomous AP architecture, what should be used on each switch to prevent loops from forming and corrupting your network? A) Spanning Tree Protocol B) Autonomous Configuration Protocol C) VLAN Extension Protocol D) WLC deployment
Spanning Tree Protocol
In a scenario using 802.1x and EAP-based authentication, the term supplicant refers to which of the following? A) The network device that provides access to the network B) The client device requesting access C) The device that takes user or client credentials and permits/denies access D) The wired uplink connection
The client device requesting access
The original 802.11 standard offered which of the following authentication methods? (Select all that apply.) Question 32 options: WPA2 LEAP WEP Open Authentication
WEP Open Authentication
Which of the following usually performs the management functions of many lightweight APs? Question 13 options: A) Cisco Prime Infrastructure B) Wireless LAN controller C) Lightweight Management Protocol D) Management functions are performed by the lightweight AP itself.
Wireless LAN controller