♥♥ 2017 NEW RECOMMEND ♥♥
Free VCE & PDF File for Cisco 200-355 Real Exam (Full Version!)
★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions
Q91. Which method of encryption does the 802.11i standard use?
E. both AES/ECB and AES/CCMP
Q92. When deploying a Cisco Cloud Wireless Infrastructure, what two destination ports must be open? (Choose two.)
Q93. A controller is connected to a Cisco Catalyst switch. The switch port configuration looks like this:
interface GigabitEthernet 1/0/10
switchport trunk encapsulation dot1q
switchport trunk allowed vlan 1,20,30,50
switchport trunk native vlan 20
switchport mode trunk
Which controller CLI command assigns its management interface to the native VLAN interface of the Cisco Catalyst switch?
A. config interface vlan management 0
B. config interface vlan management 1
C. config interface vlan management 20
D. config interface vlan management 30
E. config interface vlan management 50
Q94. A customer has completed the installation of an 802.11ac greenfield deployment at their corporate headquarters. They would like to leverage 802.11ac enhanced speeds on the trusted employee WLAN. In order to configure the employee WLAN, what Layer 2 security policies are valid?
A. WPA2 (TKIP)
Q95. An engineer is using a predictive survey tool to estimate placement of APs in a carpeted office space. Most interior walls should be assigned which attenuation value?
A. 2 dB
B. 3 dB
C. 4 dB
D. 5 dB
Q96. What protocol overcomes the weaknesses of LEAP?
Q97. Refer to the exhibit.
Which tab is used to set up web authentication for guest users?
A. Security > Layer 3
B. Security > Layer 2
C. Security > AAA Servers
Q98. Strong security is required, but a centralized RADIUS authenticator has not been implemented.
Which two steps must you take to provide maximum security when using a pre-shared key? (Choose two.)
A. Change the TKIP on a weekly basis.
B. Use a key that includes mixed-case letters, numbers, and symbols with a length greater than 10 characters.
C. Use only with WPA and WPA2, following proper strong key guidelines.
D. Use the longest possible WEP key in your security policy.
Q99. Which two formats are supported for uploading background graphics to create a network map in Cisco WCS? (Choose two.)
Q100. What does RF determine?
A. cycle pattern size
B. how often a wave occurs
C. signal size
D. quantity of energy injected in a signal