★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions
Free Instant Download NEW 640-722 Exam Dumps (PDF & VCE):
Available on:
https://www.certleader.com/640-722-dumps.html
It is more faster and easier to pass the Cisco 640-722 exam by using Refined Cisco CCNA - Wireless Associate - IUWNE questuins and answers. Immediate access to the Renew 640-722 Exam and find the same core area 640-722 questions with professionally verified answers, then PASS your exam with a high score now.
2021 Dec ccna wireless 640-722 dumps:
Q111. - (Topic 3)
You are in a coffee shop and you have connected to their wireless hot-spot. Your Windows 7 wireless client shows five green bars with a yellow shield.
Which statement about the level of signal strength and the WLAN security that is present is true?
A. You have excellent signal strength and a secure network connection.
B. Your wireless client needs a username and password before it can connect to the WLAN.
C. You have excellent signal strength and the client is waiting for you to enter a username and password.
D. Your laptop is not receiving a signal.
E. Your laptop is receiving an excellent signal and the network security is open.
Answer: E
Explanation:
Five green bars means that the signal you are receiving is excellent (there are up to 5 bars) and the yellow shield is a warning indication signal that the security settings have been set to open, meaning no authentication is needed.
Q112. - (Topic 7)
A company wants to implement wireless in all 20 remote office locations and wants centralized management of these remote sites. What application would meet the requirements?
A. Control And Provisioning of Wireless Access Points
B. Cisco point- to multi-point wireless bridging
C. Cisco autonomous access points in FlexConnect mode
D. Split MAC architecture utilizing LWAPP and WLC
Answer: D
Q113. - (Topic 2)
Which two statements best describe the LAG configuration between a Cisco WLC and a Cisco Catalyst switch? (Choose two.)
A. The Catalyst switch should be configured for PAgP.
B. The Catalyst switch should be configured only for Layer 2 load balancing.
C. The Catalyst switch should be configured for "on" mode.
D. The Cisco WLC relies on the connected switch to perform the load-balance of traffic.
E. The Cisco WLC aggregates multiple management interfaces into a single virtual interface.
Answer: C,D
Reference: Restrictions for Link Aggregation
You can bundle all eight ports on a Cisco 5508 Controller into a single link.
Terminating on two different modules within a single Catalyst 6500 series switch provides redundancy and ensures that connectivity between the switch and the controller is maintained when one module fails. The controller’s port 1 is connected to Gigabit interface 3/1, and the controller’s port 2 is connected to Gigabit interface 2/1 on the Catalyst 6500 series switch. Both switch ports are assigned to the same channel group.
LAG requires the EtherChannel to be configured for 'mode on' on both the controller and the Catalyst switch.
Once the EtherChannel is configured as on at both ends of the link, the Catalyst switch should not be configured for either Link Aggregation Control Protocol (LACP) or Cisco proprietary Port Aggregation Protocol (PAgP) but be set unconditionally to LAG. Because Cisco WLC relies on the connected switch to perform the load-balance of traffic, the controller does not answer to negotiation frames and the LAG is not formed if a dynamic form of LAG is set on the switch. Additionally, LACP and PAgP are not supported on the controller.
Reference: http://www.cisco.com/c/en/us/td/docs/wireless/controller/7-4/configuration/guides/consolidated/b_cg74_CONSOLIDATED/b_cg74_CONSOLIDATED_ chapter_0100011.html
Q114. - (Topic 7)
Refer to the exhibit.
An engineer wants to setup a mobility anchor for the Guest WLAN, but does not see the
Anchor IP address listed in the drop-down. What is the most likely cause of this problem?
A. The mobility anchor is currently unreachable.
B. The mobility anchor must also be included in the mobility group of the WLC.
C. Layer 3 Security must be configured for Web Policy Authentication.
D. The mobility anchor is attached to another WLAN.
E. Layer 3 Security must be configured for Web Policy Passthrough.
Answer: B
Q115. - (Topic 2)
Which statement best describes the ability of a wireless client to access and transmit a data frame to an AP?
A. The client listens to the media until polled by the AP using PCF to send its data.
B. The client listens to the media until a data frame is finished, at which time it transmits, unless a collision of data frames has occurred.
C. The client uses random countdown timers to start the transmission of a data frame.
D. The client listens to the media and countdown timers to start the transmission of a data frame.
Answer: D
Explanation:
The figure below illustrates the transmission of a frame. In the figure, Station A wants to send a frame. As the process goes, both the physical and virtual carrier need to be free. This means the client has to listen. To listen, the client chooses a random number and begins a countdown process, called a backoff timer. The speed at which the countdown occurs is called a slottime and is different for 802.11a, b, and g.
Reference: http://www.ciscopress.com/articles/article.asp?p=1271797&seqNum=2
Up to the immediate present ccna wireless 640-722 dumps:
Q116. - (Topic 4)
Refer to the exhibit.
Which option must be chosen if only the WPA is needed?
A. WPA+WPA2
B. Static-WEP + 802.1X
C. 802.1X
D. CKIP
Answer: A
Explanation:
Wi-Fi Protected Access (WPA) and Wi-Fi Protected Access II (WPA2) are two security protocols and security certification programs developed by the Wi-Fi Alliance to secure wireless computer networks.
Reference: http://en.wikipedia.org/wiki/Wi-Fi_Protected_Access
Q117. - (Topic 7)
What two capabilities would be present on a wireless client device that supports CCXv3? (Choose two.)
A. WPA2
B. 802.1x
C. PEAP-MSCHAP
D. NAC
E. MFP
F. EAP-TLS
Answer: A,B
Q118. - (Topic 4)
A client is attached to the Cisco Unified Wireless Network using controllers.
When the client is using WPA2 and EAP authentication, where are the wireless encryption keys located during the active user session? (Choose two.)
A. on the access point
B. on the RADIUS server
C. on the Cisco WCS
D. on the client
E. on the Cisco WLC
Answer: A,D
Explanation:
During the Active user session, WEP keys can be located on the access point as well as on the client. Network managers need to provide end users with freedom and mobility without offering intruder’s access to the WLAN or the information sent and received on the wireless network. With a WLAN, transmitted data is broadcast over the air using radio waves that travel between client devices, or stations, and access points-the WLAN endpoints on the Ethernet network that link stations to the network. This means that any WLAN client device within an access point service area can receive data transmitted to or from the access point.
Q119. - (Topic 4)
Refer to the exhibit.
Which tab is used to set up web authentication for guest users?
A. Security > Layer 3
B. Security > Layer 2
C. Security > AAA Servers
D. Advanced
E. General
Answer: A
Explanation:
From the Layer 3 Security drop-down list, choose one of the following: .
None — Layer 3 security is disabled. .
Web Authentication — Causes users to be prompted for a username and password when connecting to the wireless network. This is the default value.
Web Passthrough — Allows users to access the network without entering a username and password.
Reference: http://www.cisco.com/c/en/us/td/docs/wireless/controller/7-0/configuration/guide/c70/c70users.html#wp1066335
Q120. - (Topic 4)
Which statement describes a security weakness of a WPA2 with a PSK?
A. The compromised key can be used for another connection.
B. The key can be eavesdropped from the wireless medium.
C. The key can be recreated from a few eavesdropped frames.
D. The key is not case-sensitive and is vulnerable to compromise by brute-force methods.
Answer: A
Explanation:
WPA2-Enterprise is (in my opinion) considerably more secure than PSK. Reasons
. WPA2-PSK has a single shared key amongst all devices. That means that if one of the devices is compromised the key is lost, so the more devices you have the risk of loss or compromise increases. As against this WPA2-Enterprise has per user secrets, so not the same problem.
. Using WPA2-Enterprise each user can change their credentials as required, whereas with WPA2-PSK changing the secret could be a major undertaking, depending on the size and make-up of the user/device population. This increases the potential severity of a compromise as key rotation will be much slower (in most cases) than password rotation so if a credential is compromised, it's likely to remain so for longer with PSK.
. With WPA2-Enterprise you can make use of stronger authentication mechanisms (e.g. 2-factor if needed)
. With WPA2-Enterprise you can add certificate authentication to stop random attackers brute-forcing the users creds to get access.