Implementing Cisco Wireless Network Fundamentals 試験
Question No : 1
What is the equivalent of 26 dBm in milliwatts?
dBm = log10 (mW)*10
40 dBm=10.00 watts
36 dBm=4.00 watts
30 dBm=1.00 watts
27 dBm=500 milliwatts
26 dBm=400 milliwatts
Question No : 2
Which two actions are best for deploying VoWLAN on a wireless network? (Choose two.)
Analog cameras can operate in the same frequency of the wireless network, causing interference. The goal in setting the data rates for the VoWLAN network is to match the data rates of VoWLAN handsets as closely as possible, enabling a few high data rates used by the clients.
Question No : 3
Which two statements about beacon frames used by access points are true? (Choose two.)
Probably the most common 802.11 management frame is the beacon frame. Beacon frame from a Cisco WLAN
Here we can easily make out some of the capabilities of the WLAN, for example the SSID is probably going to be the first thing you notice Test SSID in this case, this is what provides the name of the WLAN.
As you know SSID broadcasting can be disabled (Also called Closed System) at which point the SSID field will be blank.
Now, at the end of the beacon frame you will notice all this Unknown information, as you have probably guessed (or read) this information is vendor specific, which is common for every vendor to have put their own proprietary information within the Beacon frames.
Question No : 4
Refer to the exhibit.
With the current Cisco WLC version 7.0 syslog level settings set the way they are, which log levels are captured by the Syslog server?
Here the syslog level is set to errors, so it will send all logs with a severity level of errors, as well as all other messages with a greater severity level.
Question No : 5
Which option best describes the limitation of a client that is attempting to manage a WLC while using the client wireless adapter connection to the wireless infrastructure?
The Cisco WLAN Solution Management over Wireless feature allows Cisco WLAN Solution operators to monitor and configure local WLCs using a wireless client. This feature is supported for all management tasks, except uploads to and downloads from (transfers to and from) the WLC.
Question No : 6
Which single tool helps to troubleshoot client-related issues in a WLAN?
Question No : 7
Which command path correctly describes how to access and troubleshoot clients with Cisco WCS version 7.0?
Question No : 8
Which path do you take to manage the results of a report that had been run on network utilization?
There are five menus on each window: Monitor, Reports, Configure, Location, Administration , and Help. When you move the mouse over any of the menus, a drop-down menu appears.
Question No : 9
Which Cisco WCS tool allows you to view current reports, open specific types of reports, create and save new reports, and manage scheduled runs?
The report launch pad provides access to all NCS reports from a single page. From this page, you can view current reports, open specific types of reports, create and save new reports, and manage scheduled runs.
Question No : 10
The existing Cisco Unified Wireless Controller is running version 7.0 code for both the controllers and the Cisco WCS. A controller has been configured with an appropriate rogue rule condition to report discovered APs to the Cisco WCS.
Which default alarm level is used to display all rogue APs in the Alarm Summary?
Yellow-Minor alarm is used to display all rogue Aps in alarm summary.
Question No : 11
Which three severity levels are in the Cisco WCS alarm dashboard? (Choose three.)
Alarms are color coded as follows: Red --Critical Alarm Orange --Major Alarm Yellow --Minor Alarm The Alarm Summary displays the number of current critical, major, and minor alarms.
Question No : 12
When adding a controller to manage through Cisco WCS, which address type is used and which SNMP function does the Cisco WCS perform?
Question No : 13
Refer to the exhibit.
Which GUI item do you click to configure authentication and authorization in Cisco WCS?
The Administration menu enables you to schedule tasks like making a backup, checking a device status, auditing your network, synchronizing the location server, and so on. You can also choose Logging to enable various logging modules and specify restart requirements. You can also choose AAA for user administration such as changing passwords, establishing groups, setting application security settings, and so on.
Question No : 14
When a guest client is authenticated, which type of connection is created between the controller- based AP and the client?
The wireless network at UNCG allows visitors to establish an unsecured connection. The unsecured network is available as a self-service wireless profile.
Question No : 15
When the enterprise-based authentication method is used for WPA2, a bidirectional handshake exchange occurs between the client and the authenticator.
Which five options are results of that exchange being used on a controller-based network? (Choose five.)
Regardless of whether WPA or WPA2 is used during the initial connection between the station and the AP, the two agree on common security requirements.