This page was exported from 100% Valid Exam Dumps on Lead2pass [ ] Export date:Sun Mar 29 18:19:37 2020 / +0000 GMT ___________________________________________________ Title: [Lead2pass New] Exam 200-355 PDF Free Instant Download From Lead2pass (341-360) --------------------------------------------------- 2017 October Cisco Official New Released 200-355 Dumps in! 100% Free Download! 100% Pass Guaranteed! Pass 200-355 exam with the latest Lead2pass 200-355 dumps: Lead2pass 200-355 exam questions and answers in PDF are prepared by our experts. Moreover, they are based on the recommended syllabus that covering all the 200-355 exam objectives. Following questions and answers are all new published by Cisco Official Exam Center: QUESTION 341Which three WLC debug commands are appropriate to troubleshoot a wireless client that is associated to an AP? (Choose three.) A.    debug capwapB.    debug mac addrC.    debug dot11D.    debug dhcpE.    debug apF.    debug dtlsAnswer: BCDExplanation:See reference link for associated WLC debug commands."WLC Debug and Show Commands" QUESTION 342Which command path correctly describes how to access and troubleshoot clients with Cisco WCS version 7.0? A.    Tools > Clients > select displayed client's MAC addressB.    Tools > Clients > enter client's MAC addressC.    Monitor > Clients > click displayed client's MAC addressD.    Monitor > Clients > enter client's MAC address Answer: CExplanation: QUESTION 343Which single tool helps to troubleshoot client-related issues in a WLAN? A.    The show and debug commands on the controller.B.    The show commands on the AP.C.    Client templates on the Cisco WCS.D.    Client troubleshooting on the Cisco WCS. Answer: DExplanation: QUESTION 344Which option best describes the limitation of a client that is attempting to manage a WLC while using the client wireless adapter connection to the wireless infrastructure? A.    Controllers must be managed using only secure protocols (that is, SSH and HTTPS), not nonsecure protocols (that is, HTTP and Telnet).B.    Read-write access is not available; only read-only access is supported.C.    Uploads and downloads from the controller are not allowed.D.    Wireless clients can manage other controllers, but not the same controller and the AP to which the client is associated. Answer: CExplanation:The Cisco WLAN Solution Management over Wireless feature allows Cisco WLAN Solution operators to monitor and configure local WLCs using a wireless client. This feature is supported for all management tasks, except uploads to and downloads from (transfers to and from) the WLC. QUESTION 345Refer to the exhibit. With the current Cisco WLC version 7.0 syslog level settings set the way they are, which log levels are captured by the Syslog server?   A.    syslog level errors onlyB.    all syslog levelsC.    only the syslog severity level number of error and greaterD.    only the syslog severity level number of error and less Answer: DExplanation:Here the syslog level is set to errors, so it will send all logs with a severity level of errors, as well as all other messages with a greater severity level. QUESTION 346Which two statements about beacon frames used by access points are true? (Choose two.) A.    They contain SSIDs if this feature is enabled.B.    They provide vendor proprietary information.C.    They are another name for an associated request.D.    They are sent in response to a probe frame.E.    They include ATIM window information for power save operations. Answer: ABExplanation:Probably the most common 802.11 management frame is the beacon frame. Beacon frame from a Cisco WLANHere we can easily make out some of the capabilities of the WLAN, for example the SSID is probably going to be the first thing you notice TestSSID in this case, this is what provides the name of the WLAN. As you know SSID broadcasting can be disabled (Also called Closed System) at which point the SSID field will be blank.Now, at the end of the beacon frame you will notice all this Unknown information, as you have probably guessed (or read) this information is vendor specific, which is common for every vendor to have put their own proprietary information within the Beacon frames. QUESTION 347Which two actions are best for deploying VoWLAN on a wireless network? (Choose two.) A.    Minimize the use of Class 3 Bluetooth devices.B.    Minimize the use of analog cameras.C.    Minimize the use of IP cameras.D.    Maximize client access by enabling all data rates used by clients.E.    Maximize client access by enabling only a few high data rates used by clients. Answer: BEExplanation:Analog cameras can operate in the same frequency of the wireless network, causing interference. The goal in setting the data rates for the VoWLAN network is to match the data rates of VoWLAN handsets as closely as possible, enabling a few high data rates used by the clients. QUESTION 348What is the equivalent of 26 dBm in milliwatts? A.    4 mWB.    40 mWC.    100 mWD.    400 mWE.    1000 mW Answer: DExplanation:dBm = log10 (mW)*10mW =10^(dBm/10)Samples:40 dBm=10.00 watts36 dBm=4.00 watts30 dBm=1.00 watts27 dBm=500 milliwatts26 dBm=400 milliwatts QUESTION 349What is the EIRP value for a transmitter that has a transmitter capable of 15 dBm, an antenna that has a gain of 12 dBi, and a cable that connects the transmitter to the antenna that has 1 db loss? A.    26 dBmB.    100 mWC.    .86 dBmD.    165 dBmE.    1000 mW Answer: AExplanation:To determine EIRP follow this equation:<Transmit Power> -Cable Loss + Antenna Gain = EIRPSo in this case 15 - 1 + 12 = 26 QUESTION 350What are three primary components that describe TKIP? (Choose three.) A.    broadcast key rotationB.    dynamic WEPC.    message integrity checkD.    per-packet key hashingE.    symmetric key cipherF.    WPA2 enterprise mode Answer: ACDExplanation:TKIP uses the same underlying mechanism as WEP, and consequently is vulnerable to a number of similar attacks. The message integrity check, per-packet key hashing, broadcast key rotation, and a sequence counter discourage many attacks. The key mixing function also eliminates the WEP key recovery attacks. QUESTION 351When an AP, in its default configuration mode, connects to a Cisco WLC, which methods are available for remote management access to an AP? A.    SSL and SSH are available only after configuration by a Cisco WLC version 7.0.B.    SSH onlyC.    HTTPS, and SSHD.    SSH and TelnetE.    SSH and Telnet are available only after configuration by a Cisco WLC version 7.0. Answer: DExplanation:In Wireless LAN Controller release 5.0 and later, the controller supports the use of Telnet or Secure Shell (SSH) protocols to troubleshoot lightweight access points. You can use these protocols in order to make debugging easier, especially when the access point is unable to connect to the controller. You can configure Telnet and SSH support only through the controller CLI. QUESTION 352Which three options are limitations when configuring basic security on an autonomous AP when using the express security page setup? (Choose three.) A.    You need multiple SSIDs.B.    Delete all the SSIDs.C.    Edit the SSIDs.D.    Use multiple authentication servers.E.    Use the same SSID on both radios.F.    Use a single SSID on a single radio. Answer: CDEExplanation:The security settings in the Easy Setup Radio Configuration section are designed for simple configuration of basic security. The options available are a subset of the wireless device security capabilities. Keep these limitations in mind when using the Express Security page: QUESTION 353Which two items are used to help convert a lightweight AP into an autonomous AP? (Choose two.) A.    HTTP express setup on the APB.    Cisco WCS templateC.    Cisco WLC CLID.    Windows Cisco Conversion ToolE.    image with naming convention of platform_name-k9w7-tar.defaultF.    image with naming convention of platform_name-rcvk9w8-tar Answer: CEExplanation:See video tutorial in this process at the reference link below: QUESTION 354Which three AP modes of operation allow for the wIPS sub mode? (Choose three.) A.    local modeB.    bridge modeC.    monitor modeD.    H-REAP modeE.    rogue detector modeF.    SE-Connect modeG.    sniffer mode Answer: ACDExplanation:Only Cisco Aironet 1130, 1140, 1240, 1250, 3502E and 3502I Series Access Points support wIPS monitor mode.The wIPS sub mode is supported only when access point mode is Monitor, Local or HREAP. But for 1130 and 1240 access points, wIPS is supported only in Monitor Mode. QUESTION 355A lightweight AP has been deployed in local mode in a network that consists of 10 wireless LANcontrollers in a single mobility group. The AP has been configured to use primary, secondary, and tertiary Cisco WLCs. Due to a major power failure, all those Cisco WLCs are unavailable. Which step does the AP take next? A.    The AP reboots and repeatedly attempts to join the configured primary, secondary, and tertiary Cisco WLCs in that order. The process continues until one of the configured Cisco WLCs is available.B.    The AP attempts to join a Cisco WLC configured as a master controller.C.    The AP attempts to join the Cisco WLC that has the greatest capacity available.D.    The AP state transitions to AP Fallback Mode and continues to provide limited WLAN services (that is, no new client authentications) until a Cisco WLC is available. Answer: BExplanation:If a WLC is configured as a Master Controller, the LAP selects that WLC and sends it an LWAPP join request. QUESTION 356An AP using version 7.0 MR1 broadcasts a Layer 3 CAPWAP discovery message on the local IP subnet. Which step does the AP take next? A.    Determine if the controller responses include the primary controller.B.    Determine if the controller responses include the master controller.C.    Send a discovery request using DHCP option 43.D.    Send a discovery request using DNS.E.    Send a discovery request using locally stored information on the AP.F.    Send a discovery request using OTAP. Answer: EExplanation:If the LAP was registered to a WLC in a previous deployment, the LAP maintains the list of WLCIP addresses locally in NVRAM. The stored WLC IP addresses include all of the WLCs that are in previously joined WLC "mobility groups". This is the discovery process: QUESTION 357Which three Cisco Unified Wireless Network capabilities use information that is provided by Radio Resource Management neighbor messages? (Choose three.) A.    aggressive load balancingB.    dynamic channel assignmentC.    hybrid remote edge access pointD.    intercontroller mobility (that is, mobility groups)E.    over-the-air provisioningF.    rogue AP classification Answer: BEFExplanation:First we should learn how the RRM works:1) Controllers (whose APs need to have RF configuration computed as a single group) are provisioned with the same RF Group Name. An RF Group Name is an ASCII string each AP will use to determine if the other APs they hear are a part of the same system. (RF groups are groups of controllers that share the same RF group name and whose APs can hear the neighbor messages of each other)2) APs periodically send out Neighbor Messages, sharing information about themselves, their controllers, and their RF Group Name. These neighbor messages can then be authenticated by other APs sharing the same RF Group Name.3) APs that can hear these Neighbor Messages and authenticate them based on the shared RF Group Name, pass this information (consisting primarily of controller IP address and information on the AP transmitting the neighbor message) up to the controllers to which they are connected.4) The controllers, now understanding which other controllers are to be a part of the RF Group, then form a logical group to share this RF information and subsequently elect a group leader.5) Equipped with information detailing the RF environment for every AP in the RF Group, a series of RRM algorithms are used to optimize AP configurations. Information from Radio Resource Management (RRM) monitors the radio resources, performs dynamic channel assignments, provides detection and avoidance of interference, and provides the dynamic transmit power control (TPC).The RRM neighbor message contains the following information:* Radio Identifier: If the AP had multiple radios, this field identifies the radio used to transmit the message.* Group ID: The 16-bit value and controller MAC address. This information is used to detect rogue access points. The access points will then check the beacon/probe-response frames in neighboring access point messages to see if they contain an authentication information element (IE) that matches that of the RF group. If the check is successful, the frames are authenticated. Otherwise, the authorized access point reports the neighboring access point as a rogue, records its BSSID in a rogue table, and sends the table to the controller.* WLC IP Address: RF group leader's management IP address. This address is discovered through Over-the-Air Provisioning (OTAP)* AP Channel: The native channel that the AP uses to service clients.* Neighbor Message Channel: The channel the message is sent on.* Power: The power level at which the message is transmitted.* Antenna Pattern: The antenna pattern currently in useNote:Dynamic channel assignment is used to dynamically allocate access point channel assignments to avoid conflict and to increase capacity and performance. For example, two overlapping channels in the 802.11g band, such as 1 and 2, cannot both simultaneously use 54 Mbps. By effectively reassigning channels, the controller keeps adjacent channels separated, thereby avoiding this problem.Over-the-Air Provisioning (OTAP) is a method for APs to discover the management IP of a controller over the air.A rogue AP is an AP that is unknown to the controller. QUESTION 358A controller is connected to a Cisco Catalyst switch. The switch port configuration looks like this: interface GigabitEthernet 1/0/10switchportswitchport trunk encapsulation dot1qswitchport trunk allowed vlan 1,20,30,50switchport trunk native vlan 20switchport mode trunk Which controller CLI command assigns its management interface to the native VLAN interface of the Cisco Catalyst switch? A.    config interface vlan management 0B.    config interface vlan management 1C.    config interface vlan management 20D.    config interface vlan management 30E.    config interface vlan management 50 Answer: AExplanation:Since the controller management interface is connected to the native vlan interface of the Cisco Catalyst switch, the correct command is: config interface vlan management vlan-id 0 QUESTION 359Which three options relate to event-driven RRM? (Choose three.) A.    any 802.11n AP modelsB.    specific AP modelsC.    minimum of AP and WLCD.    minimum of AP, WLC, and WCSE.    minimum of AP, WLC, WCS, and MSEF.    configurable in WLC at 802.11b/g/n > RRM > TPCG.    configurable in WLC at 802.11b/g/n > RRM > DCA Answer: BCGExplanation: QUESTION 360In the AP Layer 3 controller discovery process, after the LWAPP Discovery Request is broadcast on a local subnet, what is the next step that the AP takes? A.    Determine whether the controller responses are the primary controller.B.    Send an LWAPP discovery request to controllers learned via OTAP if operational.C.    Send an LWAPP response to the master controller if known.D.    Wait 5 seconds and resend a Discovery Request to the local subnet. Answer: B Comparing with others', you will find our 200-355 exam questions are more helpful and precise since all the 200-355 exam content is regularly updated and has been checked for accuracy by our team of Cisco expert professionals. 200-355 new questions on Google Drive: 2017 Cisco 200-355 exam dumps (All 500 Q&As) from Lead2pass: [100% Exam Pass Guaranteed] --------------------------------------------------- Images: --------------------------------------------------- --------------------------------------------------- Post date: 2017-10-16 04:01:57 Post date GMT: 2017-10-16 04:01:57 Post modified date: 2017-10-16 04:01:57 Post modified date GMT: 2017-10-16 04:01:57 ____________________________________________________________________________________________ Export of Post and Page as text file has been powered by [ Universal Post Manager ] plugin from