646-048 - Advanced Routing and Switching for Account Managers - ARSAM
Go back to Cisco
Which three statements are true about Cisco distribution switches? (Choose three.)
The Cisco Catalyst 3750 Series Switches are suitable for small site aggregation.
The Cisco Catalyst 4500 Series Switches are suitable for collapsed access and distribution.
The Cisco Catalyst 6500 Series Switches are suitable for collapsed core and distribution.
What is the minimum number of rules that is necessary in a CPU ACL to allow all access from a single VLAN to the management interface, yet prevent management access from all other VLANs while permitting all other traffic?
Which statement about H-REAP and FlexConnect APs on a Cisco WLC is false?
HREAP AP in standalone mode can authenticate new clients for CCKM roaming.
Cisco WiSM controllers have multiple interface types. Which two interfaces must be present and configured at setup time? (Choose two.)
The IT manager acknowledges that some security issues that are shown in a detailed security index report violate company policies. However, the security index does not change after synchronizing the configuration of the Cisco WLC on Cisco WCS. What are two possible reasons for this issue? (Choose two.)
The acknowledged issue is on a controller that does not directly affect the security index score (for instance, it is not the controller with the lowest score).
The acknowledged issue is on a WLAN that does not directly affect the security index score. Only the lowest scoring WLAN of the lowest scoring controller affects the security index score.
Which of the below devices can cause unintentional RF jamming attacks against an 802.11 wireless network? (Choose two.)
Which of the following statements is not true about Cisco EnergyWise?
EnergyWise capabilities can be added to Cisco Catalyst switches by dedicated service modules.
When LAG is enabled, all ports participate in LAG by default. Which statement about LAG is true?
If any single link fails, traffic will automatically migrate to the remaining links.
Which IEEE standard allows for the use of multiple 2-MHz communication channels within the 2.4-GHz spectrum?
Which two statements about virtual interfaces on a WLC are true? (Choose two.)
A virtual interface serves as the redirect address for the web authentication login page.
A virtual interface acts as the DHCP server placeholder for wireless clients that obtain their IP address from a DHCP server.
What is the advantage of EAP-FAST compared to LEAP?
EAP-FAST exchanges user credentials within a TLS tunnel whereas LEAP exchanges credentials information in clear, which allows possible offline "dictionary attacks."
What does not need to be considered when looking into the customer workflow?
How many different switch products are in use at the customer network?
Which two statements best describe an enterprise architecture? (Choose two.)
The organizing logic for business processes and IT infrastructure reflects the integration and standardization requirements of the company operating model.
The operating model is the desired state of business process integration and business process standardization for delivering goods and services to customers.
Which of the following features is not provided by the Cisco ASR 1000 Series routers?
You are designing a wireless infrastructure for an enterprise customer in the busy international banking district of Tokyo. All the client adapters are fairly modern, so you have turned off 802.11b speeds to reduce the size of your cells. Which channels will you choose to make optimum use of the available spectrum?
1, 6, 11
Which statement describes the operation of an access point in Rogue Location Discovery Protocol mode?
The AP moves to the rogue channel and attempts to connect to the rogue as a client. The AP then tries to obtain an IP address and forwards a UDP packet to the controller through the rogue. If the controller receives this packet, the network administrator is notified that a rogue AP has been discovered on the wired network.
Which set of steps shows the correct order for adding an SSID with WPA security on a new VLAN via the GUI on an autonomous AP?
Create the VLAN, set up encryption, and then create the SSID.
Which statement about using the internal DHCP server feature on a Cisco WLC is true?
The DHCP server IP address must be set to the Cisco WLC management interface IP address.
DNS is configured to respond with a list containing multiple controller addresses. Upon DNS discovery, which statement is true?
The AP sends a discovery request to all controllers on the list simultaneously.
Which of the following statements are not correct about Client Management Frame Protection (MFP)? (Choose 2.)
Client MFP can replace Infrastructure MFP in case only CCXv5 clients are used.
The only supported method to obtain the pre-user MFP encryption keys is EAP authentication.
A clause 15 radio uses ___________ and supports data rates of ___________ .
DSSS, 1 Mb/s and 2 Mb/s
After interviewing the customer to understand its wireless client requirements, you determine that 802.11b must be enabled to support legacy clients within a mixed-mode environment. What recommendation will have the greatest mitigation on the effects of 802.11b clients on the rest of the network?
Make 11 Mb/s the lowest mandatory rate.
When using DNS discovery, you must configure DNS to respond to which of the following?
CISCO-CAPWAP-CONTROLLER.localdomain or CISCO-LWAPP-CONTROLLER.localdomain
Which statement does not correctly describe the impact of business video applications to the network?
Video conferences reduce the network load by eliminating the need to exchange files over the network in order to share information.
Which two statements about the Cisco WCS alarms and events are true? (Choose two.)
An event can be a report about radio interference crossing a threshold.
An alarm is a Cisco WCS response to one or more related events.
The QoS implementation for WLANs differs from QoS implementations on other Cisco devices. Which two actions do QoS enabled autonomous bridges perform? (Choose two)
They do not classify packets; they prioritize packets based on DSCP value, client type (such as a wireless phone), or the priority value in the 802.1q or 802.1p tag.
They do not construct internal DSCP values; they only support mapping by assigning IP Differentiated Services Code Point (DSCP), Precedence, or Protocol values to Layer 2 COS values.
Which local DHCP pools that are configured on an autonomous IOS AP will properly work and lease IP addresses to the wireless clients without using the "ip helper-address" command?
only the pool configured for the native VLAN
Which three best describe the Cisco Borderless Network Architecture? (Choose three.)
Infrastructure and network services are the basis for user services.
A Cisco Borderless Network is based on a common network infrastructure.
A Cisco Borderless Network Architecture provides borderless network services.
Which of the following statements are true regarding RLDP? (Choose two)
RLDP works only on APs configured in Open Authentication mode.
RLDP only works if the Rogue AP is connected to a VLAN that is reachable by the WLC.
You are converting your wireless infrastructure from a data-only design to a location services design. Which task do you need to complete?
Locate APs at the edges of your coverage area for trilateration.
Which three are advantages of Cisco Prime LMS? (Choose three.)
It includes Cisco Borderless Networks service work centers.
It includes Cisco Smart Business Architecture (SBA) validated templates.
It provides complete life-cycle management.
You have 2 WLCs with management IP addresses of 192.168.11.5 and 192.168.11.6 respectively. Your APs reside on a different subnet. Which of the below DHCP options needs to be configured?
option 43 hex f108c0a80b05c0a80b06
To avoid classification at all switches within a QoS domain, a switch port may be configured in a trusted state. Which two statements are true regarding the trust state configuration of a switch port? (Choose two.)
When mls qos trust cos is configured on the port, the port default CoS value is used for an untagged packet.
When mls qos trust cos is configured on the port, the switch classifies an ingress packet by using the packet CoS value.
Which three statements accurately describe the evolution of the workplace and the importance of the network? (Choose three.)
Mobility causes location borders to shift.
Cloud services cause application borders to shift.
IT consumerization causes device borders to shift.
You want to prevent a wireless client with a MAC address of 00:40:96:a5:b5:d4 from associating with an autonomous AP. Which commands do you use on the autonomous AP?
dot11 association mac-list 700 access-list 700 deny 0040.96a5.b5d4 0000.0000.0000 access-list 700 permit 0000.0000.0000 ffff.ffff.ffff
Which two are switch security features that enable a secure borderless network? (Choose two.)
Security Group Tagging
Which of the following Cisco Catalyst switch families is typically deployed outside the wiring closet?
Cisco Compact Switches
Which two protocols or processes can be used for a switched network to control distribution of multicast traffic at Layer 2? (Choose two.)
One of your customers is thinking of deploying wireless in a building. Which two items should you establish in a pre-site survey? (Choose two.)
the agreed coverage areas for the design
the type of deployment (data-only service, voice service, or location services)
You wish to configure a Cisco WCS to provide an additional layer of security by outlining which APs your DHCP servers will respond to. Which two pieces or combinations of information can be used to achieve this objective? (Choose two.)
AP MAC address
AP MAC address and AP SSID
How can you configure an NTP server address for Cisco Secure ACS 5.2?
through the ACS CLI only
You are working for a South American services integrator. Your customer has a working unified Cisco WLC solution in Costa Rica (-A domain). You need to integrate an office in Panama (-N domain); correct APs are already deployed for this domain. Which approach do you take?
Add the country code for Panama (PA) through the Cisco WLC web GUI.
When configuring NAC in-band to work with a Cisco WLC, which statement is true, from a WLC perspective?
Only the quarantine VLAN ID needs to be configured as the WLAN interface.
Before conducting a passive RF site survey with a standalone AP, which two of these should be statically configured on the AP? (Choose two.)
Tx power level
Which two are components of Cisco MediaNet that simplify network assessment, monitoring, and troubleshooting? (Choose two.)
Traffic Simulator, based on IPSLA
Which two statements describe the role of core technologies with regard to business processes? (Choose two.)
An end-to-end borderless network architecture builds the foundation for integrating people and tasks in changing market environments.
In order to react to market changes, operations and processes have to be modified as well. The network infrastructure has to match the changed requirements.
Which of the following is not a challenge to the enterprise campus?
power consumption of the data center
What is the benefit of using a CA-signed certificate over a self-signed certificate?
You can avoid impersonation attacks.
Which aggregate of the IPv6 addresses 2001:0303:0000:5000:0000:052B:0000:0000/96 and 2001:0303:0000:5000:0000:052C:0000:0000/96 has the longest possible mask?
ABC Company end users are reporting voice roaming issues. Which two situations are possible causes? (Choose two.)
The RF coverage cells have only 10-percent overlap; 15- to 20-percent cell overlap is typically needed for seamless roaming.
There is interference from a 5 GHz DECT-like phone.