642-681 - Advanced Wireless LAN for System Engineers Exam
Go back to Cisco
Which authentication mechanism was introduced in Cisco Compatible Extensions version 2?
When designing a wireless VoIP network, what is the recommended lowest data rate for an IEEE 802.11b/g network?
What is the maximum number of access points that a high-end Cisco WCS server can support?
A customer brings you a previously completed site survey for the initial wireless implementation from 12 months ago. The customer currently has six access points deployed in the warehouse. The survey shows that the installed coverage provides for a 15-percent overlap between cells at 5.5 Mbps, and a 5-percent overlap at 11 Mbps. This solution has proved to provide adequate coverage and roaming capabilities for the data applications. Why would this site survey not be adequate for a VoIP application?
A customer in the United States requires connectivity between two campus locations that are located 6 miles (9.65 km) apart. The customer also needs a minimum data rate of 54 Mbps in an area that is known to have 2.4-GHz interference. Which two devices will provide a bridge link and avoid the interference? (Choose two.)
CiscoAironet 1400 Series Wireless Bridge
CiscoAironet 1242AG Series Access Point
Which DSCP value is mapped to the IEEE 802.11e user priority for voice in a Cisco WLAN?
Which statement describes how RSSI information is processed in a WLAN with a location appliance using controller-based products?
The location appliance collects the RSSI information.
Controller-based products use X.509 certificates for which of the following?
Implementing Wireless Domain Services on an autonomous access point provides which two benefits? (Choose two.)
fast secure roaming
In the wireless design phase, which service component provides a comprehensive, implementation-ready design for the customer's wireless solution?
Detailed Design Development
Select the two activities that form part of the wireless implementation plan development service component in the wireless design phase. (Choose two.)
Create Site Specific Network Implementation Plan
Collect and Verify Site Specific Implementation Requirements
Which two of the following are considered part of the Cisco Self-Defending Network? (Choose two.)
When attempting to connect to the WLAN using HTTP authentication, a client is automatically redirected to a login page. The login page is on which device that uses the controller-based products?
wireless LAN controller
When a wireless controller loses connectivity to a remote Cisco Aironet 1030 Lightweight Access Point in REAP mode, what will be the next step for that remote access point?
continue to provide local WLAN1 connectivity for shared key authentication only
Which one of the following integrated services routers supports the integrated 2.4-GHz b/g access points?
The local authentication service on a standalone access point supports which two authentication types? (Choose two.)
EAP-Cisco Wireless (Cisco LEAP)
Which feature was introduced in Cisco Compatible Extensions version 2?
What is the maximum number of wireless devices that a Cisco 2700 Series Wireless Location Appliance can track, operating with Cisco WCS version 4.0?
Which EAP authentication method is used by the Cisco WLAN controller to perform web authentication?
No EAP authentication is used
Which two individual user parameters can be restricted by administrators of controller-based wireless networking using Identity Based Networking Services? (Choose two.)
Assessing the ability of the customer's site facilities for readiness to support the proposed WLAN system is an activity conducted as part of which service component?
WLAN Site Readiness Assessment (RF survey)
Which of the following best describes the purpose of using lifecycle services for deploying an advanced wireless solution?
Provide a consistent, repeatable, and proven method to ensure the network solution that is deployed delivers upon the customer's goals for reliability and availability.
Which two threats are detected by means of the Cisco Network Admission Control? (Choose two.)
out-of-date antivirus definitions
Which three items are associated with the wireless standalone product set? (Choose three.)
Wireless LAN Context Control Protocol
Wireless Domain Services
CiscoWorks Wireless LAN Solution Engine
What is the Cisco-recommended signal-to-noise ratio for a data rate of 54 Mbps on a 5-GHz data network?
In a mesh network, what is the recommended hop-count limit of a mesh access point from its associated root access point?
Why is a separate voice VLAN recommended when you use the Cisco Unified Wireless IP Phone 7920?
Appropriate ACLs can be applied to the voice VLAN.
The Cisco 3200 Series Mobile Access Router has integrated wireless support for which two FCC- approved frequency ranges? (Choose two.)
4.940 to 4.990 GHz
2.400 to 2.4835 GHz
Which two threat categories are reported in a security summary display by the WCS? (Choose two.)
rogue access points
deauth flood attacks
How many SSIDs are supported on a standalone access point with dual radios?
The Cisco WCS logs which two security events? (Choose two.)
rogue access points
Typical mesh access-point placements in a suburban environment should be separated by how many feet(1m = 3.28ft)?
300 to 500 feet
When surveying to support VoWLAN, what should the minimum cell overlap be to support Cisco IP phones?
16 to 20 percent
When deploying wireless networks, a trade-off must often be made between the cost of the initial network deployment and the percentage of areas with marginal service or coverage holes. Which of the following represents a reasonable coverage hole percentage for a network launch?
0 - 10 percent
How many prior configuration versions can be archived on the CiscoWorks WLSE?
When IPS sensors identify a properly authenticated wireless client who is attempting to introduce a network virus into your environment, they alert the controller to perform which of the following actions?
shun the client
When determining the feasibility of a bridging solution that is capable of supporting 54 Mbps using the Cisco Aironet 1410 Wireless Bridge with integrated antenna in a point-to-point scenario, which criterion must be met?
a distance of no greater than 12 miles (19 km)
Cisco Identity Based Network Services used with Cisco Secure ACS provides which two of the following benefits? (Choose two.)
strong mutual authentication using public key infrastructure, tokens, and smart cards
flexible policy assignments such as per-user quotas and virtual LAN assignments
What is the minimum recommended dBm when designing a VoIP network with 11-Mbps cells, and no more than one access point per overlapping channel set?
Developing a comprehensive detailed design that meets business and technical requirements involves which of the following activities?
Document and Design Infrastructure, Architecture, and Interfaces to Third-Party Applications
The Cisco Wireless LAN Controller can support a maximum of how many VLANs?
What is the Cisco-recommended limit of standalone access points to be managed by a CiscoWorks WLSE 1130-19 with RF management enabled?
Identify customer support model for WLAN solution is an activity of which service component in the plan phase?
Operations Readiness Assessment
The activity of identifying the customer's support model for WLAN is part of which service component in the plan phase?
Operations Readiness Assessment
Guest tunneling is a feature used for the guest WLAN. How many tunnels can a virtual anchor WLAN controller support?
The CiscoWorks Wireless LAN Solution Engine uses which protocol for radio management?
A wireless security assessment has been performed for a network that is composed of Windows 2000 and Windows XP wireless clients. The customer wishes to use IEEE 802.1X authentication using certificate services. Which EAP-type combinations are appropriate?
PEAP-MSCHAP and EAP-TLS
In controller-based architecture, a control message sent between the access point and the controller is encrypted using which protocol?
How is a bridge group name used in a wireless mesh deployment?
It logically groups access points to avoid interference from neighboring mesh networks.
Analyzing the customer's WLAN design including interference and signal strength, and recommending design changes to accommodate a voice over WLAN system, are activities associated with which service component in the plan phase?
VoiceOver WLAN Assessment