350-050 - CCIE Wireless Written Exam
Go back to Cisco
How to connect the new bridge to the old antenna while installing an outdoor bridge which is replacing another vendor's bridge?
FCC and ETSI regulations do not permit the connection of disparate systems without certification.
On a Cisco WLC, which NTP authentication type or types are supported?
ABC Company end users are reporting voice roaming issues. Which two situations are possible causes? (Choose two.)
The RF coverage cells have only 10-percent overlap; 15- to 20-percent cell overlap is typically needed for seamless roaming.
There is interference from a 5 GHz DECT-like phone.
Company ABC is implementing a point-to-point bridging solution to a building approximately 3 kilometers (1.86 miles) away. The equipment used will be two autonomous access points set to frequency 2412 Mhz with external antennas. The bridge link will be authenticated using an external RADIUS server. While looking at the interface statistics, the network administrator observes duplicate frames in the receive counters. What is most likely the root cause of these duplicate frames?
The distance parameter is not configured.
Which command will be used to check the status of infrastructure APs from the CLI of an AP configured as a WDS master?
show wlccp wds ap
It is suggested that you prime or stage your lightweight access points in a convenient location, rather that after they have been installed in locations that may be difficult to reach. Which three items can be configured by using the controller CLI, controller GUI, or Cisco WCS while priming a lightweight AP prior to deployment? (Choose three.)
to configure the lightweight access point with primary, secondary, and tertiary controller names
to configure the Controller Mobility Group name, if the lightweight access point is in a Controller Mobility Group
to configure the access-point-specific 802.11a, 802.11b, and 802.11g network settings
Which statement about the Cisco WCS WLAN configuration template is true?
A WLAN template can be used to configure SSID settings on a WLC.
Corporation XYZ has many retail branch sites that are using H-REAP APs. XYZ wishes to send multicast traffic to the branch sites on WLAN A, which is centrally switched. It also wishes to ensure that multicast traffic is not sent to sites that do not request it. Which two steps must be taken in order to make this work? (Choose two.)
Enable multicasting in unicast mode
Enable IGMP snooping
Which module does the Cisco AnyConnect Secure Mobility client integrate into the AnyConnect client package for access to both wired and wireless networks?
Network Access Manager
Corporation XYZ is enabling multicast on its WLANs in order to enable company meetings to be streamed to employee laptops. The company wishes to block specific unwanted multicast traffic from traversing the wireless network. What is the best way to filter multicast traffic going toward wireless clients?
use an ACL on the first-hop router
Which standard should be met in order to ensure clients of H-REAP can maintain connectivity to the VLAN at a controller?
The round-trip WAN delay should not exceed 100 milliseconds.
Which statements are true about noise in an 802.11b/g environment (2.4-GHz)?
Noise is defined as a 2.4-GHz signal that is not in an 802.11 DSSS format but is in the frequency range of the access point's configured channel.
Microwave Oven, Cordless Phones, Jammers
Any signal that the access point cannot decode is considered noise.
802.11 2.4-GHz frequency-hopping radio
Which set of steps shows the correct order for adding an SSID with WPA security on a new VLAN via the GUI on an autonomous AP?
Create the VLAN, set up encryption, and then create the SSID.
256 bits is the length of the 802.11i Pairwise Master Key used to generate the Pairwise Transient Key?
Your company is using wireless voice clients that have a unicast push-to-talk-function. DTIM is set to 10. Users report that the audio is choppy. Which action should you take to try to resolve this issue?
Disable power saving on the wireless device.
Your site has already been surveyed at 5 GHz for 802.11n VoWLAN services. Which services can you add safely, without conducting an additional site survey? (Choose two.)
enhanced Layer 2 or Layer 3 security of the WLAN
optional MFP client protection for Cisco Client Extensions Version 5 clients
Which one of the following commands will you use to load Cisco IOS on an autonomous AP?
archive download-sw /overwrite tftp://server_ip/image_name
How can you configure an NTP server address for Cisco Secure ACS 5.2?
through the ACS CLI only
When designing a WLAN network to support both voice and context-aware services, which set of design principles should you follow?
A voice and context-aware site survey can be one survey, and both voice and context-aware deployment recommendations can be implemented. APs that are not serving clients will be in monitor mode.
What is included in the reassociation request message if a Cisco CKM client roams to a new access point?
The element in the reassociation request includes a timestamp, the rekey request number, and an authenticated element.
Can you tell me which three of the following items are configurable settings on each SSID for the Cisco 802.11 Access Point High Speed WAN Interface Card? (Choose three.)
maximum number of client associations
Which statement best describes the ability of a wireless client to access and transmit a data frame to an AP?
The client listens to the media and countdown timers to start the transmission of a data frame.
In order to guarantee acceptable voice quality, the Cisco Unified Wireless IP Phone 7921G must always have signal strength of -67 dBm or better. Which is the minimum recommended signal-to-noise ratio in this scenario?
While configuring Wireless Domain Services, which port is used for traffic between infrastructure APs and the WDS AP?
UDP destination and source protocol port 2887 (0x0B47) or Ethernet Type 34605 (0x872D)
Which debug command is best to use when you suspect that a client will not connect to an autonomous AP because of an incorrect WPA PSK?
debug dot11 station connection failure
Which two statements about the IPv4 ToS byte are true? (Choose two.)
The ToS byte is located in the Layer 3 header.
The class selector in the DSCP field is defined for backward compatibility with IP precedence.
A customer tries to connect to an access point and reports that the access point could only be connected at 54 Mb/s while deploying the Cisco Unified Wireless Network to support 802.11n with encryption. Which is the reason for this problem?
The client does not have WPA2 AES enabled.
Corporation XYZ has 25 buildings (with a total of 12000 employees) and would like to implement a single SSID across their entire site. Which feature would be helpful to prevent wireless internet access from 1 of the 25 buildings?
While using EAP type equal to PEAP with server-side TLS authentication, which option is correct?
The EKU field is required in the server certificate on the RADIUS server.
Which communication method will you use between the Cisco Catalyst 6500 Series Supervisor Engine 720 and Wireless Services Module?
Which of the following is not a valid IPv6 address type?
Which type of indoor Cisco AP should you deploy to make use of spatial multiplexing?
Which of the below devices can cause unintentional RF jamming attacks against an 802.11 wireless network? (Choose two.)
You are tasked with designing a wireless network to support a specific 5-GHz wireless phone. During the initial design phase you are unable to obtain the client device radio specifications. From a network configuration perspective, which of these cannot be configured before you obtain the radio specifications?
DCA channel list
Which portion of a WLAN deployment can WLC message logs help to troubleshoot?
infrastructure and client Issues
If an antenna has a dBd of 8.6, what is the dBi value?
You were hired as a wireless consultant to plan and design a secure WLAN on a Cisco Unified Wireless Network, allowing access only by the employees of the company. The requirements are as follows: Authenticate employees based on their existing Active Directory user domain credentials. The username/password credentials need to be protected during the authentication handshake by using a PKI. Encrypt data traffic using the strongest encryption method defined by the 802.11i standard. Implement a standard authentication method that is supported by most wireless clients and RADIUS servers What option meets these requirements?
PEAPv0/EAP-MS-CHAPv2 with WPA2-AES
DSCP values can be expressed in decimal form or by PHB. Which PHB is the equivalent of DSCP 20?
In computer networking, CSMA/CA belongs to a class of protocols called multiple access methods. CSMA/CA stands for: Carrier Sense Multiple Access with Collision Avoidance. What is the objective for the random backoff algorithm selecting a value in CSMA/CA?
to determine the number of slot times the station waits to transmit
For the following statements, what are the key RF deployment guidelines for WLAN phones?
Follow standard WLAN site survey procedures to minimize cell overlap and interference. In addition, ensure that the cell edge has a minimum power level of -67 dBm and an error rate less than 1%. The power level of the APs and the handset should match, and should also provide sufficient call capacity.
In the Cisco Unified Wireless architecture, which three devices are in charge of generating the 802.11i Pairwise Master Key? (Choose three.)
WLAN controller in local EAP mode
Cisco Secure ACS
Cisco Secure Services Client
Which information on the Monitoring page of a Cisco WLC verifies that the wireless network is operational?
In the Access Point Summary section, the All APs number in the Up column is the same as in the Total column.
802.11i is a forthcoming specification that will clear up a number of security problems in 802.11. For the following items, which 802.11i key can provide data origin authenticity during the four-way handshake and the group key handshake messages?
Key Confirmation Key
Which properties are of an AP in H-REAP mode?
Can switch client data traffic locally.
Perform client authentication locally when its connection to the controller is lost.
Support Cisco Centralized Key Management fast roaming.
Allows some SSID/VLAN traffic to be switched locally while other SSID/VLAN traffic has full LWAPP functionality.
Which one of the following issues is the RTS/CTS mechanism used to address in an 802.11b network?
hidden node problem
Which two statements are true regarding the location tracking history on the Cisco 3300 Series Mobility Services Engine? (Choose two.)
By default, the historical data is archived for 30 days.
The history of an element is recorded if it moves across floors.
The transmit power level on an 802.11a radio is configured for 25 mW. What is the corresponding value in decibels?
IN CUWN, what DHCP option needs to be configured for APs to join specific WLCs, if the WLCs and APs reside in different subnets?
When conducting a greenfield RF site survey with multiple APs, which information element should be enabled to ensure your site survey software will display the hostname of each AP?
Lightweight Access Point Protocol or LWAPP is the name of a protocol that can control multiple Wi-Fi wireless access points at once. How does the Cisco WCS know what has happened in an LWAPP system when an AP's interface goes down and then comes up again?
The Cisco WLC sends a trap to the Cisco WCS when it detects that an AP is down.