we provide Vivid Cisco ccna wireless 200 355 exam price which are the best for clearing 200 355 dumps test, and to get certified by Cisco Implementing Cisco Wireless Network Fundamentals. The 200 355 pdf Questions & Answers covers all the knowledge points of the real ccna wireless 200 355 dumps exam. Crack your Cisco ccna wireless 200 355 pdf download Exam with latest dumps, guaranteed!

Q1. What are two security threats to wireless networks? (Choose two.) 

A. ad-hoc networks 

B. client misassociation 

C. port redirection 

D. cross-site scripting 

Answer: A,B 


Q2. Mac OS X machines are having issues accessing the wireless network. While working with TAC, the administrator is asked to find the Mac laptop's wireless adapter model and driver. Where should the administrator look to find this information? 

A. About This Mac > System Report 

B. Control Panel > System 

C. System Preferences > Network > Wi-Fi Adapter > Advanced 

D. Control Panel > Networking > Adapters > Properties 

Answer:


Q3. Which option is used to form the BSSID in a BSS? 

A. AP radio MAC address 

B. AP wired MAC address 

C. AP serial number 

D. client radio MAC address 

E. client wired MAC address 

F. client serial number 

Answer:


Q4. Which two wireless technologies can interfere with 802.11 networks? (Choose two.) 

A. DECT 

B. ZigBee 

C. WiMax 

D. GSM 

Answer: A,B 


Q5. What suite of algorithms results in slower connection rates when using 802.11N technology? 

A. WPA2 

B. CCMP 

C. TKIP 

D. AES 

Answer:


Q6. A customer has asked for the proper port configuration to allow for LAG on a Cisco 2504 Wireless Controller to a Cisco IOS switch. Which EtherChannel mode should be used on the switch to allow for the WLC to connect? 

A. on 

B. auto 

C. desirable 

D. passive 

E. active 

Answer:


Q7. Refer to the exhibit. Based on the diagram, what two design requirements must be met? (Choose two.) 

A. WGB is Autonomous 

B. WGB is Universal 

C. WGB can be Autonomous or Universal 

D. Upstream AP is Aironet 

E. Upstream AP is not Aironet 

F. Upstream AP can be any make/model 

Answer: A,D 


Q8. How can you protect the configuration file from eavesdropping, when uploading from a Cisco WLC? 

A. Use the Configuration File Encryption option. 

B. Choose an SCP as the transfer method. 

C. Connect to the Cisco WLC by using HTTPS. 

D. Connect to the Cisco WLC by using SSH. 

Answer:


Q9. A company wants to implement wireless in all 20 remote office locations and wants centralized management of these remote sites. What application would meet the requirements? 

A. Control And Provisioning of Wireless Access Points 

B. Cisco point- to multi-point wireless bridging 

C. Cisco autonomous access points in FlexConnect mode 

D. Split MAC architecture utilizing LWAPP and WLC 

Answer:


Q10. An engineer is trying to identify if radar has impacted the wireless network at a customer site. When using the controller GUI, which dashboard in the Monitor section presents this information? 

A. 802.11a/n - Air Quality Reports 

B. Clean Air - Worst Air Quality Report 

C. 802.11b/g/n - Interfering Devices 

D. Statistics - Mobility Statistics 

Answer: