♥♥ 2021 NEW RECOMMEND ♥♥
Free VCE & PDF File for Cisco 200-355 Real Exam (Full Version!)
★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions
Q51. An engineer is using a predictive survey tool to estimate placement of APs in a carpeted office space. Most interior walls should be assigned which attenuation value?
A. 2 dB
B. 3 dB
C. 4 dB
D. 5 dB
Q52. Strong security is required, but a centralized RADIUS authenticator has not been implemented.
Which two steps must you take to provide maximum security when using a pre-shared key? (Choose two.)
A. Change the TKIP on a weekly basis.
B. Use a key that includes mixed-case letters, numbers, and symbols with a length greater than 10 characters.
C. Use only with WPA and WPA2, following proper strong key guidelines.
D. Use the longest possible WEP key in your security policy.
Q53. What suite of algorithms results in slower connection rates when using 802.11N technology?
Q54. A customer has requested a single point of policy enforcement for LAN and WLAN. Which deployment model should be used?
Q55. You are testing a new autonomous Cisco Aironet 1260 AP that has booted for the first time on the existing corporate network, which includes voice, data, and location services.
How do you reach the GUI of the AP?
A. HTTP to 10.0.0.1.
B. HTTP to 192.168.1.1.
C. HTTP to the DHCP address.
D. HTTPS to 10.0.0.1.
E. HTTPS to the 192.168.1.1.
F. HTTPS to the DHCP address.
Q56. What are the interface statuses of a lightweight AP working in rogue-detection mode?
A. radios turned off, Ethernet interface up
B. radios and Ethernet interfaces up
C. radios turned on, Ethernet interface shut down
D. radios turned on, Ethernet interface status controlled by Cisco WLC
Q57. A wireless bridge is being installed near an airport. An organization informs the city council about complying with max power levels that could be used and settings on any 5GHz channels used that might interfere with the airport radar. What organization is this?
A. Institute of Electrical and Electronics Engineers
B. Internet Engineering Task Force
C. Federal Communications Commission
D. Wireless Fidelity Alliance
Q58. Which statement describes a security weakness of a WPA2 with a PSK?
A. The compromised key can be used for another connection.
B. The key can be eavesdropped from the wireless medium.
C. The key can be recreated from a few eavesdropped frames.
D. The key is not case-sensitive and is vulnerable to compromise by brute-force methods.
Q59. Refer to the exhibit. Based on the diagram, what two design requirements must be met? (Choose two.)
A. WGB is Autonomous
B. WGB is Universal
C. WGB can be Autonomous or Universal
D. Upstream AP is Aironet
E. Upstream AP is not Aironet
F. Upstream AP can be any make/model
Q60. Which type of basic radiation pattern does a Yagi antenna have?
C. straight line