♥♥ 2017 NEW RECOMMEND ♥♥

Free VCE & PDF File for Cisco 200-355 Real Exam (Full Version!)

★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 200-355 Exam Dumps (PDF & VCE):
Available on: http://www.surepassexam.com/200-355-exam-dumps.html

Q91. Which method of encryption does the 802.11i standard use? 

A. AES/CCMP 

B. AES/ECB 

C. AES/OCB 

D. TKIP 

E. both AES/ECB and AES/CCMP 

Answer:


Q92. When deploying a Cisco Cloud Wireless Infrastructure, what two destination ports must be open? (Choose two.) 

A. TCP/5246 

B. UDP/5246 

C. TCP/5247 

D. UDP/5247 

E. TCP/7351 

F. UDP/7351 

G. TCP/7734 

H. UDP/7734 

Answer: F,G 


Q93. A controller is connected to a Cisco Catalyst switch. The switch port configuration looks like this: 

interface GigabitEthernet 1/0/10 

switchport 

switchport trunk encapsulation dot1q 

switchport trunk allowed vlan 1,20,30,50 

switchport trunk native vlan 20 

switchport mode trunk 

Which controller CLI command assigns its management interface to the native VLAN interface of the Cisco Catalyst switch? 

A. config interface vlan management 0 

B. config interface vlan management 1 

C. config interface vlan management 20 

D. config interface vlan management 30 

E. config interface vlan management 50 

Answer:


Q94. A customer has completed the installation of an 802.11ac greenfield deployment at their corporate headquarters. They would like to leverage 802.11ac enhanced speeds on the trusted employee WLAN. In order to configure the employee WLAN, what Layer 2 security policies are valid? 

A. WPA2 (TKIP) 

B. WPA(AES) 

C. OPEN 

D. WEP 

Answer:


Q95. An engineer is using a predictive survey tool to estimate placement of APs in a carpeted office space. Most interior walls should be assigned which attenuation value? 

A. 2 dB 

B. 3 dB 

C. 4 dB 

D. 5 dB 

Answer:


Q96. What protocol overcomes the weaknesses of LEAP? 

A. EAP-TLS 

B. PEAP 

C. EAP-FAST 

D. EAP-TTLS 

Answer:


Q97. Refer to the exhibit. 

Which tab is used to set up web authentication for guest users? 

A. Security > Layer 3 

B. Security > Layer 2 

C. Security > AAA Servers 

D. Advanced 

E. General 

Answer:


Q98. Strong security is required, but a centralized RADIUS authenticator has not been implemented. 

Which two steps must you take to provide maximum security when using a pre-shared key? (Choose two.) 

A. Change the TKIP on a weekly basis. 

B. Use a key that includes mixed-case letters, numbers, and symbols with a length greater than 10 characters. 

C. Use only with WPA and WPA2, following proper strong key guidelines. 

D. Use the longest possible WEP key in your security policy. 

Answer: B,C 


Q99. Which two formats are supported for uploading background graphics to create a network map in Cisco WCS? (Choose two.) 

A. PNG 

B. JPEG 

C. DWG 

D. TIFF 

Answer: A,B 


Q100. What does RF determine? 

A. cycle pattern size 

B. how often a wave occurs 

C. signal size 

D. quantity of energy injected in a signal 

Answer: