This page was exported from Lead2pass Exams [ ] Export date:Fri Nov 27 21:55:42 2020 / +0000 GMT ___________________________________________________ Title: [Lead2pass New] Free Share 200-355 PDF Dumps With Lead2pass Updated Exam Questions (221-240) --------------------------------------------------- 2017 October Cisco Official New Released 200-355 Dumps in! 100% Free Download! 100% Pass Guaranteed! 200-355 dumps free share: Lead2pass presents the highest quality of 200-355 exam dump which helps candidates to pass the 200-355 exams in the first attempt. Following questions and answers are all new published by Cisco Official Exam Center: QUESTION 221What are two modules of the CCX Lite program? (Choose two.) A.    foundationB.    voiceC.    RF powerD.    roamingAnswer: ABExplanation:In summer 2011, Cisco separated the CCX features into four subfamilies to help vendors integrate only those features that are needed for their specific wireless clients (called application-specific devices, which are devices built for a specific function [for example, barcode scanners or VoWLAN phones] and therefore do not need all the CCX features that a data laptop would need). This is called the CCX Lite program, with four components: QUESTION 222What are two security threats to wireless networks? (Choose two.) A.    ad-hoc networksB.    client misassociationC.    port redirectionD.    cross-site scripting Answer: ABExplanation:An ad hoc network is a collection of wireless clients that form a network amongst themselves without the use of an AP. As far as network administrators are concerned, ad hoc wireless networks are uncontrolled. If they do not use encryption, they may expose sensitive data to outside eavesdroppers. If a device is connected to a wired network and has bridging enabled, an ad-hoc network may also function like a rogue AP. Additionally, ad-hoc networks can expose client devices to viruses and other security vulnerabilities. For these reasons, many administrators choose to prohibit ad-hoc networks.Valid Client Misassociation:This feature does not detect attacks, but rather it monitors authorized (valid) wireless clients and their association within the network. Valid client misassociation is potentially dangerous to network security. The four types of misassociation that we monitor are: QUESTION 223In a network with a deployed Cisco WLC, which two entities must be configured with the shared secret key for 802.1X authentication? (Choose two.) A.    WLCB.    RADIUS serverC.    APD.    supplicantE.    wireless client Answer: ABExplanation:The WLC needs to be configured in order to forward the user credentials to an external RADIUS server. The external RADIUS server then validates the user credentials and provides access to the wireless clients. QUESTION 224Which two formats are supported for uploading background graphics to create a network map in Cisco WCS? (Choose two.) A.    PNGB.    JPEGC.    DWGD.    TIFF Answer: AB QUESTION 225Which two destinations can Cisco WCS administrators specify for a scheduled report? (Choose two.) A.    a file on the Cisco WCSB.    a specified email addressC.    a specified World Wide Web serverD.    a TFTP server Answer: ABExplanation: QUESTION 226Which two formats are available for Cisco WCS reports? (Choose two.) A.    PDFB.    CSVC.    HTMLD.    TXT Answer: ABExplanation:Reports are saved in either CSV or PDF format and are either saved to a file on WCS for later download or e-mailed to a specific e-mail address. QUESTION 227Which two protocols are available to download or upload files to or from Cisco WLC? (Choose two.) A.    FTPB.    TFTPC.    SCPD.    HTTPE.    HTTPS Answer: ABExplanation:Uploading the Configuration Files (GUI)Step 1Choose Commands > Upload File to open the Upload File from Controller page.Step 2From the File Type drop-down list, choose Configuration.Step 3Encrypt the configuration file by selecting the Configuration File Encryption check box and entering the encryption key in the Encryption Key text box.Step 4From the Transfer Mode drop-down list, choose from the following options:Step 5In the IP Address text box, enter the IP address of the server.Step 6In the File Path text box, enter the directory path of the configuration file.Step 7In the File Name text box, enter the name of the configuration file.Step 8If you are using an FTP server, follow these steps:Step 9Click Upload to upload the configuration file to the server. A message appears indicating the status of the upload. If the upload fails, repeat this procedure and try again. QUESTION 228Which two Cisco WLC management-access methods are available as the default setting? (Choose two.) A.    SSHB.    HTTPSC.    TelnetD.    HTTP Answer: ABExplanation:The less secure methods of telnet and SSH are disabled by default and need to be manually configured. Only SSH and HTTPS are enabled by default. QUESTION 229Which statement describes spread spectrum technology in wireless communications? A.    Signal is spread across optical pulses.B.    Signal is spread across variations of amplitudes.C.    Signal is spread across one frequency.D.    Signal is spread across a whole band of frequencies. Answer: DExplanation:spread-spectrum techniques are methods by which a signal with a particular bandwidth is deliberately spread in the frequency domain, resulting in a signal with a wider bandwidth. Spread spectrum generally makes use of a sequential noise-like signal structure to spread the normally narrowband information signal over a relatively wideband (radio) band of frequencies. QUESTION 230Which type of basic radiation pattern does a Yagi antenna have? A.    circularB.    semicircularC.    straight lineD.    cone Answer: DExplanation:High gain directional antennas: A point to point high gain antenna is a directional antenna that has a focused radiation pattern. The radiation pattern is typically a cone 10 to 30 degrees wide. A yagi and a parabolic dish are examples of high gain directional antennas. QUESTION 231Which wireless topology supports roaming? A.    IBSSB.    BSSC.    ESSD.    bridging Answer: C QUESTION 232You are configuring an IP address on an autonomous access point. Which interface do you use to configure the IP address? A.    BVI1B.    FastEthernet 0C.    Dot11Radio0D.    VLAN 1 Answer: AExplanation:Assigning the IP Address to the BVIWhen you assign an IP address to the access point by using the CLI, you must assign the address to the bridge-group virtual interface (BVI). Beginning in a privileged EXEC mode, follow these steps to assign an IP address to the access point BVI using the access point console port.CommandPurposeStep 1configure terminalEnter global configuration mode.Step 2interface bvi1Enters interface configuration mode for the BVI.Step 3ip address ip_address net_maskAssigns an IP address and subnet mask address to the BVI. de/ap1140aut_getstart.html QUESTION 233You run minimum PEAP-GTC authentication in your wireless environment. Which version of Cisco Compatible Extensions supports PEAP-GTC? A.    Cisco Compatible Extensions v1B.    Cisco Compatible Extensions v2C.    Cisco Compatible Extensions v3D.    Cisco Compatible Extensions v4E.    Cisco Compatible Extensions v5 Answer: BExplanation:* PEAP/GTC is supported on Cisco Compatible Version 2 clients and above. QUESTION 234Which device divides a signal between two antennas? A.    splitterB.    lightening arrestorC.    attenuatorD.    amplifier Answer: AExplanation:A splitter causes insertion loss and divides available power between two antennas. QUESTION 235What does RF determine? A.    cycle pattern sizeB.    how often a wave occursC.    signal sizeD.    quantity of energy injected in a signal Answer: BExplanation:RF communication works by creating electromagnetic waves at a source and being able to pick up those electromagnetic waves at a particular destination. These electromagnetic waves travel through the air at near the speed of light. The wavelength of an electromagnetic signal is inversely proportional to the frequency; the higher the frequency, the shorter the wavelength. QUESTION 236Which module does the Cisco AnyConnect Secure Mobility client integrate into the AnyConnect client package for access to both wired and wireless networks? A.    Network Access ManagerB.    TelemetryC.    Web SecurityD.    DART Answer: AExplanation:The main components used in IUWNE are the Cisco AnyConnect Mobility Client itself, associated with the Network Access Module (NAM) used to manage existing profiles and provide the wireless connectivity. QUESTION 237Access points must discover a wireless LAN controller before they can become an active part of the network. In which order does an access point try to discover a controller? A.    Layer 3 CAPWAP or LWAPP broadcast discoveryDHCP option 43Locally stored controller IP address discoveryDNS controller name resolutionB.    Layer 3 CAPWAP or LWAPP broadcast discoveryLocally stored controller IP address discoveryDNS controller name resolutionDHCP option 43C.    Layer 3 CAPWAP or LWAPP broadcast discoveryLocally stored controller IP address discoveryDHCP option 43DNS controller name resolutionD.    DNS controller name resolutionDHCP option 43Layer 3 CAPWAP or LWAPP broadcast discoveryLocally stored controller IP address discovery Answer: CExplanation:The different methods by which the access point (AP) discovers the controller are: QUESTION 238You are configuring SNMPv1/v2c on a WLC. What should you do for improved security? A.    Remove the default SNMPv1 community.B.    Remove the default SNMPv1 and SNMPv2 communities.C.    Remove the default SNMPv2 community.D.    Remove the default SNMPv3 users. Answer: BExplanation:The controller has commonly known default values of "public" and "private" for the read-only and read-write SNMP community strings. Using these standard values presents a security risk. If you use the default community names, and since these are known, the community names could be used to communicate to the controller using SNMP. Therefore, we strongly advise that you change these values.Step 1Choose Management and then Communities under SNMP. The SNMP v1 / v2c Community page appears.Step 2If "public" or "private" appears in the Community Name column, hover your cursor over the blue drop-down arrow for the desired community and choose Remove to delete this community.Step 3Click New to create a new community. The SNMP v1 / v2c Community > New page appears.Step 4In the Community Name text box, enter a unique name containing up to 16 alphanumeric characters. Do not enter "public" or "private."Step 5In the next two text boxes, enter the IPv4/IPv6 address and IP Mask/Prefix Length from which this device accepts SNMP packets with the associated community and the IP mask.Step 6Choose Read Only or Read/Write from the Access Mode drop-down list to specify the access level for this community.Step 7Choose Enable or Disable from the Status drop-down list to specify the status of this community.Step 8Click Apply to commit your changes.Step 9Click Save Configuration to save your settings.Step 10Repeat this procedure if a "public" or "private" community still appears on the SNMP v1 / v2c Community page. QUESTION 239Which spread spectrum technique uses 11-bit chips to transmit 1 bit of data over a 22-MHz channel? A.    DSSSB.    FHSSC.    OFDMD.    MIMOE.    CCK Answer: AExplanation:For every 0 or 1 you want to send, DSSS generates a code representing that 0 or that 1. This code, also called symbol or chip, can be a sequence of up to 11 bits (this is called the Barker 11 code), and these 11 bits are sent in parallel over the 22 MHz channel. You can lose up to nine of these 11 bits due to interferences and still understand whether the code sent was supposed to represent a 0 or a 1. QUESTION 240The network administrator has used VLANs to separate VoIP frames from data frames in the wired network. What must the administrator use to separate those frames in the wireless network? A.    multiple SSIDsB.    multiple authenticationsC.    multiple WEP or WPA keysD.    multiple channelsE.    multiple 802.11 radios (a, b, g, n) Answer: AExplanation:Multiple IEEE 802.11 service set identifiers (SSIDs) allow you to create different levels of network access and to access virtual LANs (VLANs).You can configure up to 16 separate SSIDs to support up to 16 VLANs. Each VLAN can have a different wireless security configuration so that the devices that support the latest Cisco security enhancements can exist alongside legacy devices. This additional access point functionality enables a variety of users having different security levels to access different parts of the network. Lead2pass is now offering Lead2pass 200-355 PDF dumps with 100% passing guarantee. Use Lead2pass 200-355 PDF and pass your exam easily. Download Cisco 200-355 exam dumps and prepare for exam. 200-355 new questions on Google Drive: 2017 Cisco 200-355 exam dumps (All 500 Q&As) from Lead2pass: [100% Exam Pass Guaranteed] --------------------------------------------------- Images: --------------------------------------------------- --------------------------------------------------- Post date: 2017-10-14 03:47:43 Post date GMT: 2017-10-14 03:47:43 Post modified date: 2017-10-14 03:47:43 Post modified date GMT: 2017-10-14 03:47:43 ____________________________________________________________________________________________ Export of Post and Page as text file has been powered by [ Universal Post Manager ] plugin from