[PDF&VCE] Lead2pass Cisco 200-355 VCE And PDF Instant Download (206-230)

2016 September Cisco Official New Released 200-355 Dumps in Lead2pass.com!

100% Free Download! 100% Pass Guaranteed!

Lead2pass 200-355 latest updated braindumps including all new added 200-355 exam questions from exam center which guarantees you can 100% success 200-355 exam in your first try!

Following questions and answers are all new published by Cisco Official Exam Center: http://www.lead2pass.com/200-355.html

QUESTION 206
How does an LWAP receive a configuration file?

A.    It is configured manually.
B.    It receives a configuration from the controller.
C.    It automatically ships with a configuration.
D.    It receives a configuration from a TFTP server.

Answer: B
Explanation:
You can use an upgrade conversion tool to convert autonomous Cisco Aironet 1100, 1130AG, 1200, 1240AG, and 1300 Series Access Points to lightweight mode. When you upgrade one of these access points to lightweight mode, the access point communicates with a controller and receives a configuration and software image from the controller.
http://www.cisco.com/c/en/us/td/docs/wireless/controller/5-2/configuration/guide/Controller52CG/c52lwap.html

QUESTION 207
A network engineer is troubleshooting a LAP that is unable to join the controller and receives the message below:
LWAPP_CLIENT_ERROR_DEBUG. No more AP manager IP addresses remain
What does the log indicate?

A.    Two or more LAPs have the same IP address.
B.    An AP manager has the same IP address as another AP manager.
C.    A LAP has the same IP address as the AP manager.
D.    Two or more controllers have the same IP address.

Answer: C
Explanation:
This is another common issue that is seen when the AP tries to join the WLC. You might see this error message when the AP tries to join the controller.
No more AP manager IP addresses remain
One of the reasons for this error message is when there is a duplicate IP address on the network that matches the AP manager IP address. In such a case, the LAP keeps power cycling and cannot join the controller.
The debugs will show that the WLC receives LWAPP discovery requests from the APs and transmits a LWAPP discovery response to the APs. However, WLCs do not receive LWAPP join requests from the APs.
In order to troubleshoot this issue, ping the AP manager from a wired host on the same IP subnet as the AP manager. Then, check the ARP cache. If a duplicate IP address is found, remove the device with the duplicate IP address or change the IP address on the device so that it has a unique IP address on the network.
The AP can then join the WLC.
http://www.cisco.com/c/en/us/support/docs/wireless/4400-series-wireless-lan-controllers/99948-lap-notjoin-wlc-tshoot.html

QUESTION 208
Which two of the following authentication methods used for WiFi security require the use of certificates? (Choose two.)

A.    PEAP
B.    EAP-FAST
C.    WPA2
D.    WPA1
E.    EAP-TLS
F.    EAP-MD5

Answer: AE
Explanation:
When you use EAP with a strong EAP type, such as TLS with smart cards or TLS with certificates, both the client and the server use certificates to verify their identities to each other. Certificates must meet specific requirements both on the server and on the client for successful authentication.
https://support.microsoft.com/en-us/kb/814394

QUESTION 209
You are designing a wireless network in a medical facility. Which three areas are bad locations in which to install a wireless access point? (Choose three.)

A.    in front of the elevators doors
B.    in the hallways
C.    next to the electrical room
D.    inside offices
E.    near medical imaging devices
F.    in the lobby

Answer: ACE
Explanation:
You should not install access points in areas where interference from outside devices can occur. A great deal of electrical interference can occur near the electrical room and near medical imaging devices. Also, because elevators often have metal doors and the shafts are often concrete or contain other materials that degrade Wi-Fi coverage, it is best to avoid them.

QUESTION 210
What are the three primary functions of the Cisco Unified Wireless LWAPP architecture? (Choose three.)

A.    control and management of the CAPWAP
B.    tunneling of VPN clients over the WAN
C.    tunneling of WLAN client traffic to the WLC
D.    collection of 802.1Q trunks
E.    collection of 802.11 data for management
F.    control and management of VTP

Answer: ACE
Explanation:
Figure below illustrates one of the primary features of the architecture — how Lightweight Access Point Protocol (LWAPP) access points (LAPs) use the LWAPP protocol to communicate with and tunnel traffic to a WLC.
http://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/Mobility/secwlandg20/sw2dg/ch4_2_SPMb.html

QUESTION 211
During Layer 2 intercontroller roaming, which two items change? (Choose two.)

A.    SSID
B.    VLAN
C.    IP address
D.    AP
E.    controller

Answer: DE
Explanation:
When the client associates to an access point joined to a new controller, the new controller exchanges mobility messages with the original controller, and the client database entry is moved to the new controller. New security context and associations are established if necessary, and the client database entry is updated for the new access point. This process remains transparent to the user.
http://www.cisco.com/c/en/us/td/docs/wireless/controller/7-0/configuration/guide/c70/c70mobil.html

QUESTION 212
Which of the following are three functions of Cisco RRM? (Choose three.)

A.    TPC
B.    intercontroller roaming
C.    dynamic channel assignment
D.    intracontroller roaming
E.    coverage hole detection

Answer: ACE
Explanation:
RRM can periodically reconfigure the 802.11 RF network for best efficiency.
To do this, RRM performs these functions:
Radio resource monitoring
Transmit power control
Dynamic channel assignment
Coverage hole detection and correction
http://www.cisco.com/c/en/us/td/docs/wireless/controller/7-0MR1/configuration/guide/wlc_cg70MR1/cg_rrm.pdf

QUESTION 213
You are setting up a laptop to connect to the wireless network of your organization. The protocols that are used for the corporate network are WPA2 Enterprise, PEAP, and AES. Which three parameters do you need to configure in the Windows 7 wireless network properties for this connection? (Choose three.)

A.    VLAN
B.    encryption type
C.    authentication method
D.    VRF
E.    security type
F.    IP address

Answer: BCE
Explanation:
On the Security tab, you can specify the following security types:
Based on the selected security type, you can configure either a network security key or specify and configure a network authentication method. If you specify WPA-Enterprise, WPA2-Enterprise, or 802.1x as your security type, you must configure the following (as shown in the previous figure):
If you specify the use of WPA-Personal or WPA2-Personal as your security type or No authentication (Open) or Shared as your security type with WEP as your encryption type, you must configure a network security key, as shown in Figure 10.
https://technet.microsoft.com/en-us/magazine/ff847520.aspx

QUESTION 214
What are three characteristics of the 802.11g standard? (Choose three.)

A.    speed of as much as 11 Mb/s
B.    speed of as much as 54 Mb/s
C.    backward-compatibility with 802.11a
D.    backward-compatibility with 802.11b
E.    OFDM as an additional modulation technique
F.    OFDM and CCK as additional modulation techniques

Answer: BDE
Explanation:
802.11g is the third modulation standard for wireless LANs. It works in the 2.4 GHz band (like 802.11b) but operates at a maximum raw data rate of 54 Mbit/s. Using the CSMA/CA transmission scheme, 31.4 Mbit/s [1] is the maximum net throughput possible for packets of 1500 bytes in size and a 54 Mbit/s wireless rate (identical to 802.11a core, except for some additional legacy overhead for backward compatibility). In practice, access points may not have an ideal implementation and may therefore not be able to achieve even 31.4 Mbit/s throughput with 1500 byte packets. 1500 bytes is the usual limit for packets on the Internet and therefore a relevant size to benchmark against. Smaller packets give even lower theoretical throughput, down to 3 Mbit/s using 54 Mbit/s rate and 64 byte packets. Also, the available throughput is shared between all stations transmitting, including the AP so both downstream and upstream traffic is limited to a shared total of 31.4 Mbit/s using 1500 byte packets and 54 Mbit/s rate. 802.11g hardware is fully backwards compatible with 802.11b hardware. Details of making b and g work well together occupied much of the lingering technical process. In an 802.11g network, however, the presence of a legacy 802.11b participant will significantly reduce the speed of the overall 802.11g network. Some 802.11g routers employ a back-compatible mode for 802.11b clients called 54g LRS (Limited Rate Support). [2]
The modulation scheme used in 802.11g is orthogonal frequency-division multiplexing (OFDM) copied from 802.11a with data rates of 6, 9, 12, 18, 24, 36, 48, and 54 Mbit/s, and reverts to CCK (like the 802.11b standard) for 5.5 and 11 Mbit/s and DBPSK/DQPSK+DSSS for 1 and 2 Mbit/s. Even though 802.11g operates in the same frequency band as 802.11b, it can achieve higher data rates because of its heritage to 802.11a.
http://en.wikipedia.org/wiki/IEEE_802.11g-2003

QUESTION 215
Which two types of encryption does Windows support for WPA2 security for wireless connections? (Choose two.)

A.    AES
B.    DES
C.    PGP
D.    TKIP
E.    WEP

Answer: AD
Explanation:
TKIP and AES are two different types of encryption that can be used by a Wi-Fi network. TKIP stands for “Temporal Key Integrity Protocol.” It was a stopgap encryption protocol introduced with WPA to replace the very-insecure WEP encryption at the time. TKIP is actually quite similar to WEP encryption. TKIP is no longer considered secure, and is now deprecated. In other words, you shouldn’t be using it.
AES stands for “Advanced Encryption Standard.” This was a more secure encryption protocol introduced with WPA2, which replaced the interim WPA standard. AES isn’t some creaky standard developed specifically for Wi-Fi networks; it’s a serious worldwide encryption standard that’s even been adopted by the US government. For example, when you encrypt a hard drive with TrueCrypt, it can use AES encryption for that. AES is generally considered quite secure, and the main weaknesses would be brute-force attacks (prevented by using a strong passphrase) and security weaknesses in other aspects of WPA2.
http://www.howtogeek.com/204697/wi-fi-security-should-you-use-wpa2-aes-wpa2-tkip-or-both/

QUESTION 216
Refer to the exhibit. Which three switch port types are valid for these connections? (Choose three.)

A.    access
B.    port-channel
C.    port-channel trunk
D.    trunk
E.    port-channel access
F.    routed port

Answer: ACD
Explanation:
The switch must be configured for access or trunks to the WLC, and using trunks over port channel interfaces is supported.

QUESTION 217
Which two wireless technologies can interfere with 802.11 networks? (Choose two.)

A.    DECT
B.    ZigBee
C.    WiMax
D.    GSM

Answer: AB
Explanation:
Digital Enhanced Cordless Telecommunication (DECT), also known as cordless telephones, and Zigbee are both well-known sources of interferences within an 802.11 network.

QUESTION 218
Which two algorithms are available in RRM? (Choose two.)

A.    coverage-hole detection
B.    dynamic channel assignment
C.    RSSI normalizer
D.    transmitting channel expander
E.    rogue detection

Answer: AB
Explanation:
Here is how Cisco RRM works from a high level:
What are the algorithms that the RF Group Leader will be busy with?
http://blog.ine.com/2010/10/08/cisco-radio-resource-management-rrm/

QUESTION 219
Which two pieces of information are needed for the wireless client to connect to the wireless network? (Choose two.)

A.    SSID
B.    security settings
C.    channel number
D.    AP name

Answer: AB
Explanation:
Most clients enable you to associate to a detected network (broadcasted SSID) or configure a specific profile. In all cases, you must configure the network name (SSID), the operating mode (ad-hoc or infrastructure), and some security settings (that will be different depending on whether the SSID uses Pre-Shared Key Security or Enterprise [EAP/802.1x] security).

QUESTION 220
What are two wireless configuration utilities for Apple Mac computers? (Choose two.)

A.    AirPort
B.    AirPort Extreme
C.    AirManager
D.    AirManager Supreme
E.    AirAssistant Ultimate

Answer: AB
Explanation:
AirPort (for 802.11b) and AirPort Extreme (for 802.11b/g/n or 802.11a/b/g/n) are WLAN configuration utilities from Apple. The utility allows the creation of network profiles, association to detected networks, and advanced configuration and troubleshooting. The wireless card can be disabled or enabled from the utility main window.

QUESTION 221
What are two modules of the CCX Lite program? (Choose two.)

A.    foundation
B.    voice
C.    RF power
D.    roaming

Answer: AB
Explanation:
In summer 2011, Cisco separated the CCX features into four subfamilies to help vendors integrate only those features that are needed for their specific wireless clients (called application-specific devices, which are devices built for a specific function [for example, barcode scanners or VoWLAN phones] and therefore do not need all the CCX features that a data laptop would need). This is called the CCX Lite program, with four components:

QUESTION 222
What are two security threats to wireless networks? (Choose two.)

A.    ad-hoc networks
B.    client misassociation
C.    port redirection
D.    cross-site scripting

Answer: AB
Explanation:
An ad hoc network is a collection of wireless clients that form a network amongst themselves without the use of an AP. As far as network administrators are concerned, ad hoc wireless networks are uncontrolled. If they do not use encryption, they may expose sensitive data to outside eavesdroppers. If a device is connected to a wired network and has bridging enabled, an ad-hoc network may also function like a rogue AP. Additionally, ad-hoc networks can expose client devices to viruses and other security vulnerabilities. For these reasons, many administrators choose to prohibit ad-hoc networks.
Valid Client Misassociation:
This feature does not detect attacks, but rather it monitors authorized (valid) wireless clients and their association within the network. Valid client misassociation is potentially dangerous to network security. The four types of misassociation that we monitor are:
http://www.arubanetworks.com/techdocs/ArubaOS_61/ArubaOS_61_UG/New_WIP.php

QUESTION 223
In a network with a deployed Cisco WLC, which two entities must be configured with the shared secret key for 802.1X authentication? (Choose two.)

A.    WLC
B.    RADIUS server
C.    AP
D.    supplicant
E.    wireless client

Answer: AB
Explanation:
The WLC needs to be configured in order to forward the user credentials to an external RADIUS server. The external RADIUS server then validates the user credentials and provides access to the wireless clients.
http://www.cisco.com/c/en/us/support/docs/wireless-mobility/wlan-security/69730-eap-auth-wlc.html

QUESTION 224
Which two formats are supported for uploading background graphics to create a network map in Cisco WCS? (Choose two.)

A.    PNG
B.    JPEG
C.    DWG
D.    TIFF

Answer: AB

QUESTION 225
Which two destinations can Cisco WCS administrators specify for a scheduled report? (Choose two.)

A.    a file on the Cisco WCS
B.    a specified email address
C.    a specified World Wide Web server
D.    a TFTP server

Answer: AB
Explanation:
http://www.cisco.com/c/en/us/td/docs/wireless/wcs/7-0/configuration/guide/WCS70cg/7_0reps.html

QUESTION 226
Which two formats are available for Cisco WCS reports? (Choose two.)

A.    PDF
B.    CSV
C.    HTML
D.    TXT

Answer: AB
Explanation:
Reports are saved in either CSV or PDF format and are either saved to a file on WCS for later download or e-mailed to a specific e-mail address.
http://www.cisco.com/c/en/us/td/docs/wireless/wcs/7-0/configuration/guide/WCS70cg/7_0reps.html.

QUESTION 227
Which two protocols are available to download or upload files to or from Cisco WLC? (Choose two.)

A.    FTP
B.    TFTP
C.    SCP
D.    HTTP
E.    HTTPS

Answer: AB
Explanation:
Uploading the Configuration Files (GUI)
Step 1
Choose Commands > Upload File to open the Upload File from Controller page.
Step 2
From the File Type drop-down list, choose Configuration.
Step 3
Encrypt the configuration file by selecting the Configuration File Encryption check box and entering the encryption key in the Encryption Key text box.
Step 4
From the Transfer Mode drop-down list, choose from the following options:
Step 5
In the IP Address text box, enter the IP address of the server.
Step 6
In the File Path text box, enter the directory path of the configuration file.
Step 7
In the File Name text box, enter the name of the configuration file.
Step 8
If you are using an FTP server, follow these steps:
Step 9
Click Upload to upload the configuration file to the server. A message appears indicating the status of the upload. If the upload fails, repeat this procedure and try again.
http://www.cisco.com/c/en/us/td/docs/wireless/controller/7-3/configuration/guide/b_cg73/b_wlc-cg_chapter_01010.html

QUESTION 228
Which two Cisco WLC management-access methods are available as the default setting? (Choose two.)

A.    SSH
B.    HTTPS
C.    Telnet
D.    HTTP

Answer: AB
Explanation:
The less secure methods of telnet and SSH are disabled by default and need to be manually configured. Only SSH and HTTPS are enabled by default.
QUESTION 229
Which statement describes spread spectrum technology in wireless communications?

A.    Signal is spread across optical pulses.
B.    Signal is spread across variations of amplitudes.
C.    Signal is spread across one frequency.
D.    Signal is spread across a whole band of frequencies.

Answer: D
Explanation:
spread-spectrum techniques are methods by which a signal with a particular bandwidth is deliberately spread in the frequency domain, resulting in a signal with a wider bandwidth. Spread spectrum generally makes use of a sequential noise-like signal structure to spread the normally narrowband information signal over a relatively wideband (radio) band of frequencies.
http://en.wikipedia.org/wiki/Spread_spectrum

QUESTION 230
Which type of basic radiation pattern does a Yagi antenna have?

A.    circular
B.    semicircular
C.    straight line
D.    cone

Answer: D
Explanation:
High gain directional antennas: A point to point high gain antenna is a directional antenna that has a focused radiation pattern. The radiation pattern is typically a cone 10 to 30 degrees wide.
A yagi and a parabolic dish are examples of high gain directional antennas.
http://www.hp.com/rnd/pdfs/antenna_tech_brief.pdf

Lead2pass regular updates of Cisco 200-355 dumps, with accurate answers, keeps the members one step ahead in the real 200-355 exam. The experts with more than 10 years experience in Certification Field work with us.

200-355 new questions on Google Drive: https://drive.google.com/open?id=0B3Syig5i8gpDS2dtNHE0NWQwQzQ

2016 Cisco 200-355 exam dumps (All 410 Q&As) from Lead2pass:

http://www.lead2pass.com/200-355.html [100% Exam Pass Guaranteed]