♥♥ 2021 NEW RECOMMEND ♥♥
Free VCE & PDF File for Cisco 200-355 Real Exam (Full Version!)
★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions
Free Instant Download NEW 200-355 Exam Dumps (PDF & VCE):
Available on:
http://www.surepassexam.com/200-355-exam-dumps.html
Q91. Which method of encryption does the 802.11i standard use?
A. AES/CCMP
B. AES/ECB
C. AES/OCB
D. TKIP
E. both AES/ECB and AES/CCMP
Answer: A
Q92. When deploying a Cisco Cloud Wireless Infrastructure, what two destination ports must be open? (Choose two.)
A. TCP/5246
B. UDP/5246
C. TCP/5247
D. UDP/5247
E. TCP/7351
F. UDP/7351
G. TCP/7734
H. UDP/7734
Answer: F,G
Q93. A controller is connected to a Cisco Catalyst switch. The switch port configuration looks like this:
interface GigabitEthernet 1/0/10
switchport
switchport trunk encapsulation dot1q
switchport trunk allowed vlan 1,20,30,50
switchport trunk native vlan 20
switchport mode trunk
Which controller CLI command assigns its management interface to the native VLAN interface of the Cisco Catalyst switch?
A. config interface vlan management 0
B. config interface vlan management 1
C. config interface vlan management 20
D. config interface vlan management 30
E. config interface vlan management 50
Answer: A
Q94. A customer has completed the installation of an 802.11ac greenfield deployment at their corporate headquarters. They would like to leverage 802.11ac enhanced speeds on the trusted employee WLAN. In order to configure the employee WLAN, what Layer 2 security policies are valid?
A. WPA2 (TKIP)
B. WPA(AES)
C. OPEN
D. WEP
Answer: C
Q95. An engineer is using a predictive survey tool to estimate placement of APs in a carpeted office space. Most interior walls should be assigned which attenuation value?
A. 2 dB
B. 3 dB
C. 4 dB
D. 5 dB
Answer: B
Q96. What protocol overcomes the weaknesses of LEAP?
A. EAP-TLS
B. PEAP
C. EAP-FAST
D. EAP-TTLS
Answer: C
Q97. Refer to the exhibit.
Which tab is used to set up web authentication for guest users?
A. Security > Layer 3
B. Security > Layer 2
C. Security > AAA Servers
D. Advanced
E. General
Answer: A
Q98. Strong security is required, but a centralized RADIUS authenticator has not been implemented.
Which two steps must you take to provide maximum security when using a pre-shared key? (Choose two.)
A. Change the TKIP on a weekly basis.
B. Use a key that includes mixed-case letters, numbers, and symbols with a length greater than 10 characters.
C. Use only with WPA and WPA2, following proper strong key guidelines.
D. Use the longest possible WEP key in your security policy.
Answer: B,C
Q99. Which two formats are supported for uploading background graphics to create a network map in Cisco WCS? (Choose two.)
A. PNG
B. JPEG
C. DWG
D. TIFF
Answer: A,B
Q100. What does RF determine?
A. cycle pattern size
B. how often a wave occurs
C. signal size
D. quantity of energy injected in a signal
Answer: B