350-050 - CCIE Wireless Written Exam

Go back to Cisco

Example Questions

How to connect the new bridge to the old antenna while installing an outdoor bridge which is replacing another vendor's bridge? On a Cisco WLC, which NTP authentication type or types are supported? ABC Company end users are reporting voice roaming issues. Which two situations are possible causes? (Choose two.) Company ABC is implementing a point-to-point bridging solution to a building approximately 3 kilometers (1.86 miles) away. The equipment used will be two autonomous access points set to frequency 2412 Mhz with external antennas. The bridge link will be authenticated using an external RADIUS server. While looking at the interface statistics, the network administrator observes duplicate frames in the receive counters. What is most likely the root cause of these duplicate frames? Which command will be used to check the status of infrastructure APs from the CLI of an AP configured as a WDS master? It is suggested that you prime or stage your lightweight access points in a convenient location, rather that after they have been installed in locations that may be difficult to reach. Which three items can be configured by using the controller CLI, controller GUI, or Cisco WCS while priming a lightweight AP prior to deployment? (Choose three.) Which statement about the Cisco WCS WLAN configuration template is true? Corporation XYZ has many retail branch sites that are using H-REAP APs. XYZ wishes to send multicast traffic to the branch sites on WLAN A, which is centrally switched. It also wishes to ensure that multicast traffic is not sent to sites that do not request it. Which two steps must be taken in order to make this work? (Choose two.) Which module does the Cisco AnyConnect Secure Mobility client integrate into the AnyConnect client package for access to both wired and wireless networks? Corporation XYZ is enabling multicast on its WLANs in order to enable company meetings to be streamed to employee laptops. The company wishes to block specific unwanted multicast traffic from traversing the wireless network. What is the best way to filter multicast traffic going toward wireless clients? Which standard should be met in order to ensure clients of H-REAP can maintain connectivity to the VLAN at a controller? Which statements are true about noise in an 802.11b/g environment (2.4-GHz)? Which set of steps shows the correct order for adding an SSID with WPA security on a new VLAN via the GUI on an autonomous AP? 256 bits is the length of the 802.11i Pairwise Master Key used to generate the Pairwise Transient Key? Your company is using wireless voice clients that have a unicast push-to-talk-function. DTIM is set to 10. Users report that the audio is choppy. Which action should you take to try to resolve this issue? Your site has already been surveyed at 5 GHz for 802.11n VoWLAN services. Which services can you add safely, without conducting an additional site survey? (Choose two.) Which one of the following commands will you use to load Cisco IOS on an autonomous AP? How can you configure an NTP server address for Cisco Secure ACS 5.2? When designing a WLAN network to support both voice and context-aware services, which set of design principles should you follow? What is included in the reassociation request message if a Cisco CKM client roams to a new access point? Can you tell me which three of the following items are configurable settings on each SSID for the Cisco 802.11 Access Point High Speed WAN Interface Card? (Choose three.) Which statement best describes the ability of a wireless client to access and transmit a data frame to an AP? In order to guarantee acceptable voice quality, the Cisco Unified Wireless IP Phone 7921G must always have signal strength of -67 dBm or better. Which is the minimum recommended signal-to-noise ratio in this scenario? While configuring Wireless Domain Services, which port is used for traffic between infrastructure APs and the WDS AP? Which debug command is best to use when you suspect that a client will not connect to an autonomous AP because of an incorrect WPA PSK? Which two statements about the IPv4 ToS byte are true? (Choose two.) A customer tries to connect to an access point and reports that the access point could only be connected at 54 Mb/s while deploying the Cisco Unified Wireless Network to support 802.11n with encryption. Which is the reason for this problem? Corporation XYZ has 25 buildings (with a total of 12000 employees) and would like to implement a single SSID across their entire site. Which feature would be helpful to prevent wireless internet access from 1 of the 25 buildings? While using EAP type equal to PEAP with server-side TLS authentication, which option is correct? Which communication method will you use between the Cisco Catalyst 6500 Series Supervisor Engine 720 and Wireless Services Module? Which of the following is not a valid IPv6 address type? Which type of indoor Cisco AP should you deploy to make use of spatial multiplexing? Which of the below devices can cause unintentional RF jamming attacks against an 802.11 wireless network? (Choose two.) You are tasked with designing a wireless network to support a specific 5-GHz wireless phone. During the initial design phase you are unable to obtain the client device radio specifications. From a network configuration perspective, which of these cannot be configured before you obtain the radio specifications? Which portion of a WLAN deployment can WLC message logs help to troubleshoot? If an antenna has a dBd of 8.6, what is the dBi value? You were hired as a wireless consultant to plan and design a secure WLAN on a Cisco Unified Wireless Network, allowing access only by the employees of the company. The requirements are as follows: Authenticate employees based on their existing Active Directory user domain credentials. The username/password credentials need to be protected during the authentication handshake by using a PKI. Encrypt data traffic using the strongest encryption method defined by the 802.11i standard. Implement a standard authentication method that is supported by most wireless clients and RADIUS servers What option meets these requirements? DSCP values can be expressed in decimal form or by PHB. Which PHB is the equivalent of DSCP 20? In computer networking, CSMA/CA belongs to a class of protocols called multiple access methods. CSMA/CA stands for: Carrier Sense Multiple Access with Collision Avoidance. What is the objective for the random backoff algorithm selecting a value in CSMA/CA? For the following statements, what are the key RF deployment guidelines for WLAN phones? In the Cisco Unified Wireless architecture, which three devices are in charge of generating the 802.11i Pairwise Master Key? (Choose three.) Which information on the Monitoring page of a Cisco WLC verifies that the wireless network is operational? 802.11i is a forthcoming specification that will clear up a number of security problems in 802.11. For the following items, which 802.11i key can provide data origin authenticity during the four-way handshake and the group key handshake messages? Which properties are of an AP in H-REAP mode? Which one of the following issues is the RTS/CTS mechanism used to address in an 802.11b network? Which two statements are true regarding the location tracking history on the Cisco 3300 Series Mobility Services Engine? (Choose two.) The transmit power level on an 802.11a radio is configured for 25 mW. What is the corresponding value in decibels? IN CUWN, what DHCP option needs to be configured for APs to join specific WLCs, if the WLCs and APs reside in different subnets? When conducting a greenfield RF site survey with multiple APs, which information element should be enabled to ensure your site survey software will display the hostname of each AP? Lightweight Access Point Protocol or LWAPP is the name of a protocol that can control multiple Wi-Fi wireless access points at once. How does the Cisco WCS know what has happened in an LWAPP system when an AP's interface goes down and then comes up again?

Study Guides