642-681 - Advanced Wireless LAN for System Engineers Exam

Go back to Cisco

Example Questions

Which authentication mechanism was introduced in Cisco Compatible Extensions version 2? When designing a wireless VoIP network, what is the recommended lowest data rate for an IEEE 802.11b/g network? What is the maximum number of access points that a high-end Cisco WCS server can support? A customer brings you a previously completed site survey for the initial wireless implementation from 12 months ago. The customer currently has six access points deployed in the warehouse. The survey shows that the installed coverage provides for a 15-percent overlap between cells at 5.5 Mbps, and a 5-percent overlap at 11 Mbps. This solution has proved to provide adequate coverage and roaming capabilities for the data applications. Why would this site survey not be adequate for a VoIP application? A customer in the United States requires connectivity between two campus locations that are located 6 miles (9.65 km) apart. The customer also needs a minimum data rate of 54 Mbps in an area that is known to have 2.4-GHz interference. Which two devices will provide a bridge link and avoid the interference? (Choose two.) Which DSCP value is mapped to the IEEE 802.11e user priority for voice in a Cisco WLAN? Which statement describes how RSSI information is processed in a WLAN with a location appliance using controller-based products? Controller-based products use X.509 certificates for which of the following? Implementing Wireless Domain Services on an autonomous access point provides which two benefits? (Choose two.) In the wireless design phase, which service component provides a comprehensive, implementation-ready design for the customer's wireless solution? Select the two activities that form part of the wireless implementation plan development service component in the wireless design phase. (Choose two.) Which two of the following are considered part of the Cisco Self-Defending Network? (Choose two.) When attempting to connect to the WLAN using HTTP authentication, a client is automatically redirected to a login page. The login page is on which device that uses the controller-based products? When a wireless controller loses connectivity to a remote Cisco Aironet 1030 Lightweight Access Point in REAP mode, what will be the next step for that remote access point? Which one of the following integrated services routers supports the integrated 2.4-GHz b/g access points? The local authentication service on a standalone access point supports which two authentication types? (Choose two.) Which feature was introduced in Cisco Compatible Extensions version 2? What is the maximum number of wireless devices that a Cisco 2700 Series Wireless Location Appliance can track, operating with Cisco WCS version 4.0? Which EAP authentication method is used by the Cisco WLAN controller to perform web authentication? Which two individual user parameters can be restricted by administrators of controller-based wireless networking using Identity Based Networking Services? (Choose two.) Assessing the ability of the customer's site facilities for readiness to support the proposed WLAN system is an activity conducted as part of which service component? Which of the following best describes the purpose of using lifecycle services for deploying an advanced wireless solution? Which two threats are detected by means of the Cisco Network Admission Control? (Choose two.) Which three items are associated with the wireless standalone product set? (Choose three.) What is the Cisco-recommended signal-to-noise ratio for a data rate of 54 Mbps on a 5-GHz data network? In a mesh network, what is the recommended hop-count limit of a mesh access point from its associated root access point? Why is a separate voice VLAN recommended when you use the Cisco Unified Wireless IP Phone 7920? The Cisco 3200 Series Mobile Access Router has integrated wireless support for which two FCC- approved frequency ranges? (Choose two.) Which two threat categories are reported in a security summary display by the WCS? (Choose two.) How many SSIDs are supported on a standalone access point with dual radios? The Cisco WCS logs which two security events? (Choose two.) Typical mesh access-point placements in a suburban environment should be separated by how many feet(1m = 3.28ft)? When surveying to support VoWLAN, what should the minimum cell overlap be to support Cisco IP phones? When deploying wireless networks, a trade-off must often be made between the cost of the initial network deployment and the percentage of areas with marginal service or coverage holes. Which of the following represents a reasonable coverage hole percentage for a network launch? How many prior configuration versions can be archived on the CiscoWorks WLSE? When IPS sensors identify a properly authenticated wireless client who is attempting to introduce a network virus into your environment, they alert the controller to perform which of the following actions? When determining the feasibility of a bridging solution that is capable of supporting 54 Mbps using the Cisco Aironet 1410 Wireless Bridge with integrated antenna in a point-to-point scenario, which criterion must be met? Cisco Identity Based Network Services used with Cisco Secure ACS provides which two of the following benefits? (Choose two.) What is the minimum recommended dBm when designing a VoIP network with 11-Mbps cells, and no more than one access point per overlapping channel set? Developing a comprehensive detailed design that meets business and technical requirements involves which of the following activities? The Cisco Wireless LAN Controller can support a maximum of how many VLANs? What is the Cisco-recommended limit of standalone access points to be managed by a CiscoWorks WLSE 1130-19 with RF management enabled? Identify customer support model for WLAN solution is an activity of which service component in the plan phase? The activity of identifying the customer's support model for WLAN is part of which service component in the plan phase? Guest tunneling is a feature used for the guest WLAN. How many tunnels can a virtual anchor WLAN controller support? The CiscoWorks Wireless LAN Solution Engine uses which protocol for radio management? A wireless security assessment has been performed for a network that is composed of Windows 2000 and Windows XP wireless clients. The customer wishes to use IEEE 802.1X authentication using certificate services. Which EAP-type combinations are appropriate? In controller-based architecture, a control message sent between the access point and the controller is encrypted using which protocol? How is a bridge group name used in a wireless mesh deployment? Analyzing the customer's WLAN design including interference and signal strength, and recommending design changes to accommodate a voice over WLAN system, are activities associated with which service component in the plan phase?