Q1. An engineer would like to setup secure authentication for a wireless network that will utilize single sign-on. Which two authentication methods can be used to accomplish this? (Choose two.)
A. LDAP
B. RADIUS
C. Local authentication
D. WEP
E. PSK
Answer: A,B
Q2. A wireless engineer has been asked to plan a deployment covering the aisles of a warehouse with optimal coverage while bleeding RF across aisles. Which antenna type provides the necessary coverage?
A. patch
B. omnidirectional
C. Yagi
D. parabolic dish
Answer: A
Q3. RAG DROP
Answer:
Q4. What two AP configurations will show RF prediction on maps in WCS? (Choose two.)
A. Lightweight APs with internal antennas
B. Lightweight APs with external Cisco antennas
C. Lightweight APs with external 3rd Party antennas
D. Autonomous APs with internal antennas
E. Autonomous APs with external Cisco antennas
F. Autonomous APs with external 3rd Party antennas
Answer: A,B
Q5. An engineer is gathering information for a wireless survey of a hospital. What three pieces of information must be collected for an active survey to assess the outcome best suited for the facility? (Choose three.)
A. presence of microwave ovens
B. number of patients that are at the facility
C. utilization of Location Services or voice applications
D. floor plans of adjacent facilities
E. use of wireless for secure records
F. spectrum analysis to locate all the computer work stations
G. existing Network Switch types and model numbers
H. type of devices present on the new wireless network
Answer: A,C,H
Q6. Microsoft Active Directory integrated machines are not authenticating to the internal WLAN. The WLAN settings are WPA2-AES-802.1x and are authenticating to a Cisco Identity Services Engine server. You investigate and note that non-domain authenticated machines are properly authenticating to the WLAN using their Active Directory credentials. Why would this problem occur?
A. The WLAN is configured improperly in group policy.
B. The ACS server is not joined to the domain, causing authentications to fail.
C. The domain machines are configured to disable the wireless adapter.
D. The non-domain machines are using local accounts that are not authenticated through the domain.
Answer: A
Q7. How does an LWAP receive a configuration file?
A. It is configured manually.
B. It receives a configuration from the controller.
C. It automatically ships with a configuration.
D. It receives a configuration from a TFTP server.
Answer: B
Q8. An engineer needs to find out the maximum EIRP allowed for their office in Asia. What regulatory body should be contacted?
A. CRTC
B. ETSI
C. IEEE
D. NTT
Answer: D
Q9. A network engineer is connected via wireless to a Cisco AireOS WLC and wants to download the configuration but is unable to do so. Which change will correct the issue?
A. enable management via wireless
B. connect via wired network
C. enable Telnet
D. enable WebAuth SecureWeb
E. connect on 5-GHz SSID
Answer: B
Q10. The administrator has noticed that the configuration on a controller is different than in Cisco WCS. How can the administrator fix this issue?
A. The configuration can be copied from the controller to the Cisco WCS or from the WCS to the controller.
B. The configuration can be copied only from the Cisco WCS to the controller.
C. The configuration can be copied only from the controller to the Cisco WCS.
D. The controller must be removed from the Cisco WCS and then added again.
Answer: A