It is impossible to pass Cisco 200-355 exam without any help in the short term. Come to Testking soon and find the most advanced, correct and guaranteed Cisco 200-355 practice questions. You will get a surprising result by our Renewal Implementing Cisco Wireless Network Fundamentals practice guides.
2017 Mar 200-355 simulations
Q161. An AP was reset while working on the correct association to a Cisco WCS version 7.0.
Which item was cleared during the reset?
A. static IP address
B. the location ID of the AP
C. WLC primary, secondary, tertiary
D. AP name
F. Nothing was cleared.
Q162. A customer has ordered a Cisco 5760 Wireless Controller. What speed and quantity of ports are needed for full-speed operation?
A. 6 x 1 Gb
B. 6 x 10 Gb
C. 2 x 10 Gb
D. 2 x 1 Gb
E. 8 x 1 Gb
F. 8 x 10 Gb
Q163. Which four options are the characteristics of the original 802.11 protocol? (Choose four.)
A. Defined DSSS and FHSS as possible methods for modulation
B. Designed to operate in the 5 GHz ISM frequency spectrum
C. The most common deployment is three non-overlapping channels that are 20 MHz wide
D. The protocol sets the maximum throughput at 1 Mb/s or 2 Mb/s
E. Defined FHSS and OFDM as possible methods for modulation
F. The most common deployment is three non-overlapping channels that are 22 MHz wide
G. Designed to operate in the 2.4 GHz ISM frequency spectrum
H. The protocol sets the maximum throughput at 1 Mb/s
Q164. A network engineer at a retail store needs a wireless deployment that can be easily maintained and verified for PCI compliance. What solution will meet this need with the least work?
Q165. When Cisco AnyConnect modules are installed on a PC, which module must be installed first?
B. web security
Updated 200-355 free question:
Q166. Which statement correctly describes the procedure for a lightweight AP to successfully establish a connection to a controller?
A. The AP authenticates the received Cisco WLC certificate as valid. The AP then sends its certificate to the controller.
B. The AP sends its certificate to the controller. The AP then authenticates the received Cisco WLC certificate as valid.
C. The AP sends its certificate to the RADIUS server. The AP then authenticates the controller certificate as valid.
D. The AP sends its certificate to the RADIUS server. The AP then authenticates the RADIUS certificate as valid.
E. The AP authenticates the received RADIUS server certificate as valid. The AP then sends its certificate to the RADIUS server.
F. The AP authenticates the received RADIUS server certificate as valid. The AP then sends its certificate to the controller.
Q167. The wireless network is using controller-based APs and version 7.0 MR1. The APs appear to be connected properly to the controllers. A wireless user near one of the APs reports that they are unable to connect to the network with their pre-shared key.
Which option shows the GUI path where you can check the connection status of that client?
A. WLANs > WLAN_ID > Advanced
B. Security > Clients
C. Security > Advanced > Clients
D. Monitor > Clients
E. Wireless > 802.11b/g/n > clients
Q168. The network administrator receives complaints of slow wireless network performance and performs a sniffer trace of the wireless network in preparation for migration to 802.11n. The sample capture shows frames that contains AP beacons with NonERP_Present bit set to 1 and frames with RTS/CTS.
Which two conclusions can be interpreted from these frames? (Choose two.)
A. The network is performing slowly because 802.11n clients are already mixed with 802.11g clients.
B. The network is performing slowly because 802.11b clients still exist in the network.
C. The network is performing slowly because a wireless client is incorrectly configured, which results in RF interference.
D. Possible 802.11b wireless clients are located only in the AP cell radius where the sniffer capture was performed.
E. Possible 802.11b wireless clients could be located anywhere in the wireless network.
Q169. What are two security threats to wireless networks? (Choose two.)
A. ad-hoc networks
B. client misassociation
C. port redirection
D. cross-site scripting
Q170. In a typical wireless network using WPA, WPA2 or VPN, why is it still possible for a rogue client to launch a DOS attack?
A. WPA and WPA2 are not considered strong encryption algorithms and are easily cracked.
B. 802.11 management frames are easily compromised.
C. Cisco Compatible Extensions v5 are required with WPA, WPA2, or VPN to keep rogues from launching attacks in the wireless network.
D. The message integrity check frames are never encrypted or authenticated, which allows rogues to spoof clients.