Q11. Which Cisco program for WLAN client vendors helps to ensure that their devices are interoperable with Cisco WLAN infrastructure? 

A. CCX 

B. CCMP 

C. ASDM 

D. WLSE 

Answer:


Q12. RAG DROP 

Answer: 


Q13. When a wireless guest network is implemented using auto-anchor mobility in a controller-based wireless network, which controller is responsible for a guest client's IP address and their security configuration? 

A. any controller that supports the same VLAN 

B. foreign controller 

C. anchor controller 

D. master controller 

E. RF group master controller 

Answer:


Q14. Which option lists the key features of Cisco Compatible Extensions v5? 

A. Roaming and real-time diagnostics, MFP, a diagnostic channel that allows troubleshooting of the client, client reporting, optional location service, and expedited bandwidth 

B. AP assisted roam, Cisco Centralized Key Management, radio measurements, and transmit power control 

C. CAC, UPSD, voice metrics, MBSSIDs, location, link tests, and NAC 

D. WME, proxy ARP, EAP-FAST, and WPA2, and single sign-on 

E. LEAP, WPA, 802.1x and VLANs per AP, TKIP, and WiFi 

Answer:


Q15. What encryption standards describe WPA and WPA2? 

A. WPA mandates AES with TKIP optional, WPA2 mandates TKIP 

B. WPA mandates TKIP with AES optional, WPA2 mandates AES 

C. WPA mandates CKIP, WPA2 mandates AES 

D. WPA mandates CKIP with AES optimal, WPA2 mandates AES 

Answer:


Q16. An engineer has been asked to disable all OFDM rates in the wireless environment. What three rates should be disabled to fulfill this requirement? (Choose three.) 

A. 2 

B. 5.5 

C. 6 

D. 9 

E. 11 

F. 12 

G. 18 

Answer: A,B,E 


Q17. An engineer is using a predictive survey tool to estimate placement of APs in a carpeted office space. Most interior walls should be assigned which attenuation value? 

A. 2 dB 

B. 3 dB 

C. 4 dB 

D. 5 dB 

Answer:


Q18. Refer to the exhibit. The site in this AirMagnet Survey heat map is ready for which level of service? 

A. data 

B. voice 

C. location 

D. RFID 

Answer:


Q19. Strong security is required, but a centralized RADIUS authenticator has not been implemented. 

Which two steps must you take to provide maximum security when using a pre-shared key? (Choose two.) 

A. Change the TKIP on a weekly basis. 

B. Use a key that includes mixed-case letters, numbers, and symbols with a length greater than 10 characters. 

C. Use only with WPA and WPA2, following proper strong key guidelines. 

D. Use the longest possible WEP key in your security policy. 

Answer: B,C 


Q20. Which type of basic radiation pattern does a Yagi antenna have? 

A. circular 

B. semicircular 

C. straight line 

D. cone 

Answer: