Q31. Which three AP modes of operation allow for the wIPS sub mode? (Choose three.) 

A. local mode 

B. bridge mode 

C. monitor mode 

D. H-REAP mode 

E. rogue detector mode 

F. SE-Connect mode 

G. sniffer mode 

Answer: A,C,D 


Q32. Microsoft Active Directory integrated machines are not authenticating to the internal WLAN. The WLAN settings are WPA2-AES-802.1x and are authenticating to a Cisco Identity Services Engine server. You investigate and note that non-domain authenticated machines are properly authenticating to the WLAN using their Active Directory credentials. Why would this problem occur? 

A. The WLAN is configured improperly in group policy. 

B. The ACS server is not joined to the domain, causing authentications to fail. 

C. The domain machines are configured to disable the wireless adapter. 

D. The non-domain machines are using local accounts that are not authenticated through the domain. 

Answer:


Q33. Which EAP protocol requires a certificate only on the server side? 

A. EAP-PEAP 

B. EAP-FAST 

C. EAP-TLS 

D. EAP-SSL 

Answer:


Q34. An engineer is using WCS' client troubleshooting tool to investigate issues with a client 

device. What is the longest log capture they will be able to take? 

A. 2 minutes 

B. 5 minutes 

C. 10 minutes 

D. 30 minutes 

Answer:


Q35. A customer has a corporate SSID that is configured to authenticate against an ACS server to validate client credentials on the corporate SSID. The customer has a firewall logically positioned on the network between the WLC and the ACS server in the network architecture. Which port must the firewall allow to ensure that authentication can occur? 

A. 43 

B. 1812 

C. 5146 

D. 8143 

Answer:


Q36. When a wireless client is authenticated in a controller-based wireless network, which three pieces of source identification information can be used by the controller for an Access-Request message that is sent to an external RADIUS server? (Choose three.) 

A. wireless client IP address 

B. controller IP address 

C. AP IP address 

D. wireless client MAC address 

E. controller MAC address 

F. AP MAC address 

Answer: B,E,F 


Q37. A customer has completed the installation of an 802.11ac greenfield deployment at their corporate headquarters. They would like to leverage 802.11ac enhanced speeds on the trusted employee WLAN. In order to configure the employee WLAN, what Layer 2 security policies are valid? 

A. WPA2 (TKIP) 

B. WPA(AES) 

C. OPEN 

D. WEP 

Answer:


Q38. What is an MBSSID? 

A. a virtual AP configured on a physical AP that share a single physical device, which is one half-duplex radio 

B. a set of physical APs configured in a BSA to form cells that are controlled by a single controller 

C. the group of clients that are allowed to gain access to one or more SSIDs configured in an AP 

D. the identified overlap area between two cells, which identifies the clients that are operating in that area at any given time 

Answer:


Q39. Refer to the exhibit. A customer is determining whether a Windows 7 laptop is operating on the correct IEEE 802.11 standard. Which standard is being used by the laptop in the exhibit? 

A. 802.11b 

B. 802.11g 

C. 802.11n 

D. 802.11p 

Answer:


Q40. Refer to the exhibit. 

Which menu gives you access to manage background tasks in Cisco WCS? 

A. None, because the General tab provides access to the management of background tasks 

B. Monitor 

C. Configure 

D. Services 

E. Administration 

F. Tools 

Answer: