we provide Vivid Cisco ccna wireless 200 355 exam price which are the best for clearing 200 355 dumps test, and to get certified by Cisco Implementing Cisco Wireless Network Fundamentals. The 200 355 pdf Questions & Answers covers all the knowledge points of the real ccna wireless 200 355 dumps exam. Crack your Cisco ccna wireless 200 355 pdf download Exam with latest dumps, guaranteed!

Q1. What are two security threats to wireless networks? (Choose two.) 

A. ad-hoc networks 

B. client misassociation 

C. port redirection 

D. cross-site scripting 

Answer: A,B 

Q2. Mac OS X machines are having issues accessing the wireless network. While working with TAC, the administrator is asked to find the Mac laptop's wireless adapter model and driver. Where should the administrator look to find this information? 

A. About This Mac > System Report 

B. Control Panel > System 

C. System Preferences > Network > Wi-Fi Adapter > Advanced 

D. Control Panel > Networking > Adapters > Properties 


Q3. Which option is used to form the BSSID in a BSS? 

A. AP radio MAC address 

B. AP wired MAC address 

C. AP serial number 

D. client radio MAC address 

E. client wired MAC address 

F. client serial number 


Q4. Which two wireless technologies can interfere with 802.11 networks? (Choose two.) 


B. ZigBee 

C. WiMax 


Answer: A,B 

Q5. What suite of algorithms results in slower connection rates when using 802.11N technology? 

A. WPA2 





Q6. A customer has asked for the proper port configuration to allow for LAG on a Cisco 2504 Wireless Controller to a Cisco IOS switch. Which EtherChannel mode should be used on the switch to allow for the WLC to connect? 

A. on 

B. auto 

C. desirable 

D. passive 

E. active 


Q7. Refer to the exhibit. Based on the diagram, what two design requirements must be met? (Choose two.) 

A. WGB is Autonomous 

B. WGB is Universal 

C. WGB can be Autonomous or Universal 

D. Upstream AP is Aironet 

E. Upstream AP is not Aironet 

F. Upstream AP can be any make/model 

Answer: A,D 

Q8. How can you protect the configuration file from eavesdropping, when uploading from a Cisco WLC? 

A. Use the Configuration File Encryption option. 

B. Choose an SCP as the transfer method. 

C. Connect to the Cisco WLC by using HTTPS. 

D. Connect to the Cisco WLC by using SSH. 


Q9. A company wants to implement wireless in all 20 remote office locations and wants centralized management of these remote sites. What application would meet the requirements? 

A. Control And Provisioning of Wireless Access Points 

B. Cisco point- to multi-point wireless bridging 

C. Cisco autonomous access points in FlexConnect mode 

D. Split MAC architecture utilizing LWAPP and WLC 


Q10. An engineer is trying to identify if radar has impacted the wireless network at a customer site. When using the controller GUI, which dashboard in the Monitor section presents this information? 

A. 802.11a/n - Air Quality Reports 

B. Clean Air - Worst Air Quality Report 

C. 802.11b/g/n - Interfering Devices 

D. Statistics - Mobility Statistics