★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions
Free Instant Download NEW 200-355 Exam Dumps (PDF & VCE):
Available on:
https://www.certleader.com/200-355-dumps.html
Features about Cisco 200-355: This 200-355 accreditations connected with Cisco supply you with the possiblity to work in any part around the globe which is established both equally in all places. The item not only boosts your talent and data nevertheless helps to construct your occupation. Cisco 200-355 record provides possiblity to make competent and better using just about all items less than various illnesses.
2021 Mar 200-355 test
Q151. Which protocol helps the administrator to determine whether a detected rogue AP is in the network of the organization?
A. RLDP
B. RCP
C. RDP
D. RAPP
Answer: A
Q152. Which two pieces of information are needed for the wireless client to connect to the wireless network? (Choose two.)
A. SSID
B. security settings
C. channel number
D. AP name
Answer: A,B
Q153. When an AP, in its default configuration mode, connects to a Cisco WLC, which methods are available for remote management access to an AP?
A. SSL and SSH are available only after configuration by a Cisco WLC version 7.0.
B. SSH only
C. HTTPS, and SSH
D. SSH and Telnet
E. SSH and Telnet are available only after configuration by a Cisco WLC version 7.0.
Answer: D
Q154. During the deployment of a wireless network for data and location services, an engineer is to fine-tune the location services. What is this type of survey called?
A. passive fingerprinting
B. passive calibrating
C. active fingerprinting
D. active calibrating
Answer: A
Q155. Which three items do you need to establish a wireless connection to an enterprise wireless network? (Choose three.)
A. SSID name
B. RF channel
C. RF signal
D. 802.1X/EAP credentials
E. pre-shared key
F. web page
G. WPA/WPA2 settings
Answer: A,C,D
Replace 200-355 free exam questions:
Q156. Strong security is required, but a centralized RADIUS authenticator has not been implemented.
Which two steps must you take to provide maximum security when using a pre-shared key? (Choose two.)
A. Change the TKIP on a weekly basis.
B. Use a key that includes mixed-case letters, numbers, and symbols with a length greater than 10 characters.
C. Use only with WPA and WPA2, following proper strong key guidelines.
D. Use the longest possible WEP key in your security policy.
Answer: B,C
Q157. In the current RF environment, the noise floor is -95 dBm. A tablet needs an SNR of 25 dB to transmit at the required speed. What must the RSSI cell edge be to meet the required SNR?
A. -120 dBm
B. -90 dBm
C. -70 dBm
D. -60 dBm
E. -50 dBm
Answer: C
Q158. RAG DROP
Answer:
Q159. You need to set up an ad hoc connection to another client in a conference room to exchange files using Windows 7. Which two items do you need to create this connection? (Choose two.)
A. SSID name
B. RF channel
C. 802.1X/EAP credentials
D. pre-shared key
E. Telnet
F. IBSS name
G. SSH
Answer: D,F
Q160. An engineer assists a user in configuring an Android device for authentication to an IEEE 802.1x EAP WLAN with PEAPv1. The Phase 2 authentication should be configured as which option?
A. LEAP
B. MSCHAPv2
C. TLS
D. TTLS
Answer: B