|
New questions plz i need it anyone have to ad it thanks
|
Question 1. What is the purpose of looking for anomalous behavior on a WLAN infrastructure? A. Identifying new attack tools B. Auditing employee's bandwidth usage C. Identifying attacks using signature matching D. Improving performance by load balancing Answer: A Question 2. As of controller release v5.2, which two statements about wired guest access support are true? (Choose two.) A. It is not supported on the Cisco 2100 Series Controllers. B. No more than three wired guest access LANs can be configured on a controller. C. Layer 3 web authentication andpassthrough are not supported. D. Wired guest access cannot be configured in a dual-controller configuration that uses an anchor controller and a foreign controller. E. The wired guest access ports must be in the same Layer 2 network as the foreign controller. Answer: A, E Question 3. The wireless client can roam faster on the Cisco Unified Wireless Network infrastructure when which condition is met? A. EAP-FAST is used for client authentication on the wireless network. B. Cisco Centralized Key Management is used for Fast Secure Roaming. C. QoS is being used on the WLAN to control which client packets get through the network faster. D. RRM protocol is used between multiple APs that the client associates to while roaming. Answer: B Question 4. Which option best describes an evil twin attack? A. A rouge access point broadcasting a trusted SSID B. A rogue access point broadcasting any SSID C. A rouge ad-hoc with the SSID "FreeWiFi" D. A rouge access point spreading malware upon client connection Answer: A Question 5. Which two configuration parameters does NAC OOB require on a SSID/WLAN? (Choose two.) A. WMM enabled on the WLAN B. Open authentication on the WLAN C. AAA override configuration on the WLAN D. 802.1x configuration on the WLAN Answer: B, D Question 6. Which two 802.11 frame types can be used in a virtual carrier (big NAV) attack? (Choose two.) A. Association B. ACK C. CTS D. Beacon E. De-authentication Answer: B, C Question 7. When adding the foreign controller as a mobility group member in the guest anchor controller, which statement is true? A. The mobility group name on the guest anchor controller must match the mobility group name on the foreign controller. B. The mobility group member IP address and MAC address belong to the management interface of the foreign controller. C. To successfully add the foreign controller as a mobility group member in the guest anchor controller, all the parameters defined in the WLAN Security,QoS, and Advanced tabs must be configured identically in both the anchor and foreign controller. D. In the guest anchor controller GUI, WLANs > Mobility Anchors page, use the Switch IP Address (Anchor) drop-down menu to select the IP address corresponding to the management interface of the anchor controller. Answer: B Question 8. DRAG DROP Drop Click and drag the WLAN Qos level on the left to its intended usage on the right. Answer: Explanation: Question 9. For wireless NAC out-of-band operations, which protocol is used between the Cisco NAC Appliance Manager and the wireless controller to switch the wireless client from the quarantine VLAN to the access VLAN after the client passed the NAC authentication/posture assessment process? A. RADIUS B. TACACS+ C. SNMP D. SSL E. EAP Answer: C Question 10. Which WLAN option, when enabled, allows different wireless clients to be connected to different VLANs based on the returned RADIUS attributes from the AAA server? A. H-REAP B. Override interface ACL C. NAC state D. Cisco CKM E. Auth-proxy F. Allow AAA override Answer: F Question 11. Which two statements about the EAP-FAST client-server authentication protocol are true? (Choose two.) A. EAP-FAST establishes secure tunnel between the client and the server using certificates. B. PAC can be distributed manually (out-of-band provisioning) or automatically (in-band provisioning). C. EAP-FAST protocol uses PAC keys to establish secure encrypted tunnels between client and server. D. Secure passwords are used to generate PAC key for creating secure TTLS tunnel between the client and the server. Answer: B, C
Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.