Vous êtes sur la page 1sur 10

Take Assessment - Module 6 Exam - CCNP: Optimizing Converged Networks (Version 5.

0)

Refer to the exhibit. Which statement is true about the handling of QoS packets as they transition from the wired LAN to the centralized
WLAN architecture, where the wireless clients are WMM -aware?
The wireless controller translates the DSCP value of the incoming Ethernet packet to the 802.11e priority value and places th e
packet in the transmit queue for this priority level.
The access point translates the DSCP value of the incoming LWAPP packet to the 802.11e priority value and places the packet i n
the transmit queue for this priority level.
The wireless controller places the packet in the default 802.11e or WMM transmit queue based on the WLAN QoS policy that is
assigned to that client.
The access point places the packet in the default 802.11e or WMM transmit queue based on the WLAN QoS policy that is assigned
to that client.

2 What are three characteristics of the Lightweight Extensible Authentication Protocol (LEAP)? (Choose three.)
supports dynamic Wired Equivalent Privacy (WEP) keys

is open standard

requires one-time authentication

uses a wireless encryption technique

based on Advanced Encryption Standard (AES)

supports mutual authentication

3 Which statement is true about the split MAC architecture?


It distributes the processing of 802.11 data and management protocols between a lightweight access point and a centralized WL AN
controller.
Multiple devices can be grouped together to combine total bandwidth.

The conversation flow can be split between multiple switches.


The conversation flow can be split between multiple routers.

4
Refer to the exhibit. What two Wireless Control System (WCS) parameters other than “Disabled” are allowed for the 802.11e policies?
(Choose two.)
Aged

Applied

Required

Allowed

Backup

Peer

5 What are the three deployment options for the Cisco Wireless Control System (WCS)? (Choose three.)
core

base

location

intermediate

Wireless Location Appliance

advanced

6
Refer to the exhibit. QoS has been configured on the wireless network to ensure that packets receive the correct over −the−air
prioritization. What functionality is added by configuring 802.1p tagging?
It will appropriately map the QoS classification for the packets that go from the wireless controller to the lightweight AP.

It will appropriately map the QoS classification for the packets that go from the lightweight AP to the wireless client.

It will appropriately map the QoS classification for the packets that go fr om the wireless client to the lightweight AP.

It will appropriately map the QoS classification for the packets that go from the lightweight AP to the wireless controller.

It will appropriately map the QoS classification for the packets that go from the wireless controller to the Ethernet switch.

7 Which statement is true about the Wi -Fi Multimedia (WMM) traffic prioritization method?
The WMM client retains the same priority level as orignally assigned to the wireless traffic sent to the Lightweight Access P oint
Protocol (LWAPP) and it is based on a best -effort algorithm. The Lightweight Access Point marks the traffic with new DSCP value.
The WMM client retains the same priority level as orignally assigned to the wireless traffic sent to th e Lightweight Access Point
Protocol (LWAPP)and it is based on a best -effort algorithm. The Wireless Controller marks the traffic with new a DSCP value.
The WMM client assigns four defined access categories to the wireless traffic sent to the Lightweight Access Point Protocol
(LWAPP). The LWAPP marks the traffic with new a DSCP value.
The WMM client assigns four defined access categories to the wireless traffic sent to the Lightweight Access Point Protocol
(LWAPP). The LWAPP translates the user priority (UP) to the DSCP value.

8 Which three methods can be used to manage lightweight APs in a Cisco WCS environment? (Choose three.)
SNMP versions 1-3

HTTP

CLI on management station

HTTPS
AP console ports

wireless LAN controller console

9 The Cisco Wireless Control System (WCS) Location version includes all the features of the Cisco WCS Base version as well as which
two additional features? (Choose two.)
automatic channel and power level assignment
autodiscovery of access points as they associate with controllers

map-based organization of access point coverage areas

automated and manual data client monitoring and control functions


on-demand location of rogue access points

ability to use location appliances to collect historical lo cation data

10 Which Cisco Wireless Control System (WCS) option creates the ability to simultaneously track 1500 wireless clients with the addition of
a Wireless Location Appliance?
WCS base option

WCS enhanced option

WCS expanded memory option

WCS location option

WCS track option


WCS 2700T option

11

Refer to the exhibit. Which two options accurately describe the drop -down menu options of the Network Summary page of the Cisco Wireless
Control System (WCS) GUI? (Choose two.)
The Configure menu allows you to configure templates, controller, and access points on your network.

The Help menu provides you with a top -level description of the devices on your network.

The Monitor menu allows you to configure Cisco Wire less Location Appliances.

The Location menu allows you to locate Cisco lightweight access points.

The Administration menu allows you to schedule tasks such as checking device status.

12 Which two statements are correct about web authentication? (Choose two.)
It is triggered when a client NIC attempts to associate with an AP.

It is triggered when a client makes an HTTP request.

Data between the client and the AP is encrypted once the user is authenticated.
Networks using this feature can allow clients access withou t authentication.

Users can only be authenticated via an internal controller user database.

13

Refer to the exhibit. Which QoS profile should be enabled in order to give voice packets the highest over -the-air priority?
Platinum

Gold

Silver

Bronze

14 In the context of Wi-Fi Multimedia (WMM), what happens when packets are not assigned a specific access category?
They are categorized by default as best -effort.
They are categorized by default as background.

They are categorized by default as voice.

They are categorized by default as video.

15
Refer to the exhibit. The WEP key size i s configured to be 104 bits. What are the other two WEP key sizes available? (Choose two.)
24

40

80

128

160

16
Refer to the exhibit. What two conclusions can be drawn from the Wireless Control System (WCS) Network Summary p age that is
displayed? (Choose two.)
It is not apparent that any location appliances are deployed on the network.
There are 632 major alarms related to rogue access points.

There were at least 10 clients associated at 9:00 P.M. on 12/11/05.

Some of the associated clients are using IEEE 802.11b wireless NICs.

There are 189 critical alarms related to security.

17 Which two Cisco technologies are 802.11 security enhancements that protect a WEP key from exploits? (Choose two.)
802.1x

Cisco Temporal Key Integrity Protocol (CKIP)

Extensible Authentication Protocol -Flexible Authentication via Secure Tunneling (EAP -FAST)

Cisco Message Integrity Check (CMIC)

One-Time Passwords (OTP)

Advanced Encryption Standard (AES)

18
Refer to the exhibit. Which option accurately describes the information elements displayed in the Cisco Wireless Control System (WCS)
Controller Summary page?
The IP address refers to the local network IP address of the controller management interface.

The Controller name must be entered within WCS.

The Location of the controller is not selectable.

The number of APs supported is the maximum allowed with WCS.

19
Refer to the exhibit. Which two statements accurately reflect the exhibited 802.1x wireless LAN controller configuration? (Choose two.)
WPA1 is disabled and WPA2 is enabled.

WPA1 is enabled and WPA2 is disabled.

WPA1 is enabled and WPA2 is enabled.

TKIP is the default parameter for WPA1 and WPA2.

AES is the default parameter for WPA1 and WPA2.

The default WPA1 and WPA2 encryption parameters are enabled.

20
Refer to the exhibit. The required components for an 802.1x installation are labeled X, Y, and Z. Which two pairs of associations
correctly identify the components? (Choose two.)
Y is the controller and Z is the EAP server.

Y is the authenticator and Z is the RADIUS server.

Y is the component seeking authentication and Z is the authenticator.

X is the supplicant and Y is the authenticator.

X is the requester and Y is the petitioner.


X is the authenticator and Z is the external database ser ver.

Vous aimerez peut-être aussi