Q1. Refer to the exhibit. Which two wireless functions is the client experiencing? (Choose two.)
A. Inter-controller Roaming
B. Intra-controller Roaming
C. Layer 2 Roaming
D. Layer 3 Roaming
E. Inter-subnet roaming
F. Re-authentication
Answer: B,C
Q2. A controller is connected to a Cisco Catalyst switch. The switch port configuration looks like this:
interface GigabitEthernet 1/0/10
switchport
switchport trunk encapsulation dot1q
switchport trunk allowed vlan 1,20,30,50
switchport trunk native vlan 20
switchport mode trunk
Which controller CLI command assigns its management interface to the native VLAN interface of the Cisco Catalyst switch?
A. config interface vlan management 0
B. config interface vlan management 1
C. config interface vlan management 20
D. config interface vlan management 30
E. config interface vlan management 50
Answer: A
Q3. What is an interferer that an engineer may see in Cisco CleanAir?
A. microwave ovens
B. rogue APs
C. malicious clients
D. co-channel interference
Answer: A
Q4. An engineer assists a user in configuring an Android device for authentication to an IEEE 802.1x EAP WLAN with PEAPv1. The Phase 2 authentication should be configured as which option?
A. LEAP
B. MSCHAPv2
C. TLS
D. TTLS
Answer: B
Q5. An engineer is using a predictive survey tool to estimate placement of APs in a carpeted office space. Most interior walls should be assigned which attenuation value?
A. 2 dB
B. 3 dB
C. 4 dB
D. 5 dB
Answer: B
Q6. How can you protect the configuration file from eavesdropping, when uploading from a Cisco WLC?
A. Use the Configuration File Encryption option.
B. Choose an SCP as the transfer method.
C. Connect to the Cisco WLC by using HTTPS.
D. Connect to the Cisco WLC by using SSH.
Answer: A
Q7. Which statement correctly describes the procedure for a lightweight AP to successfully establish a connection to a controller?
A. The AP authenticates the received Cisco WLC certificate as valid. The AP then sends its certificate to the controller.
B. The AP sends its certificate to the controller. The AP then authenticates the received Cisco WLC certificate as valid.
C. The AP sends its certificate to the RADIUS server. The AP then authenticates the controller certificate as valid.
D. The AP sends its certificate to the RADIUS server. The AP then authenticates the RADIUS certificate as valid.
E. The AP authenticates the received RADIUS server certificate as valid. The AP then sends its certificate to the RADIUS server.
F. The AP authenticates the received RADIUS server certificate as valid. The AP then sends its certificate to the controller.
Answer: B
Q8. A Cisco WCS administrator has marked an alarm as acknowledged. For how many days does Cisco WCS prevent the alarm from reappearing, even if the source of the alarm reoccurs?
A. 1
B. 7
C. 10
D. 30
Answer: B
Q9. The administrator needs to create a report that shows all controllers, APs, and Cisco 3300 Series MSEs in the WLAN, including hardware and software information. Which report includes this information?
A. Device > Inventory
B. Mesh > Nodes
C. Network Summary > Executive Summary
D. Network Summary > 802.11 Summary
Answer: A
Q10. Which protocol helps the administrator to determine whether a detected rogue AP is in the network of the organization?
A. RLDP
B. RCP
C. RDP
D. RAPP
Answer: A