0 of 70 Questions completed
Questions:
You have already completed the quiz before. Hence you can not start it again.
You must sign in or sign up to start the quiz.
You must first complete the following:
Quiz complete. Results are being recorded.
0 of 70 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0 )
Earned Point(s): 0 of 0 , (0 )
0 Essay(s) Pending (Possible Point(s): 0 )
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
Current
Review
Answered
Correct
Incorrect
Question 1 of 70
1 point(s)
Transmitter A has a power level of 1 mW, and transmitter B has 100 mW. Using dB, compare transmitter B to transmitter A and then select the correct answer from the following.
Question 2 of 70
1 point(s)
A transmitter is configured to transmit at a power level of 17 mW. Later, it is reconfigured to transmit at a power level of 34 mW. How much has the power level increased in dB?
Question 3 of 70
1 point(s)
When two transmitters are set to transmit at the power level of 100 mW, then what will be the difference in dB after comparing both power levels?
Question 4 of 70
1 point(s)
Wireless clients are connected to a lightweight AP (default local mode); when a client sends some traffic to another wireless client, what will be the path for the traffic to reach the client?
Question 5 of 70
1 point(s)
A centralized wireless network is designed using only one WLC and 32 APs. Which of the following best describes the resulting network architecture?
Question 6 of 70
1 point(s)
Which unique feature is true for an embedded wireless network architecture?
Question 7 of 70
1 point(s)
When a lightweight AP boots up, which of the following comes first in its state machine?
Question 8 of 70
1 point(s)
How does a lightweight AP get the image if it needs to download a software image?
Question 9 of 70
1 point(s)
Which of the following is not a valid method for an AP to learn the WLC that it may join?
Question 10 of 70
1 point(s)
What happens next if an AP fails to discover the WLC after trying all possible methods?
Question 11 of 70
1 point(s)
Which of the following deterministic strategies can be used in order to push a particular AP to join a particular WLC?
Question 12 of 70
1 point(s)
Which of the following antennas may have the greatest gain?
Question 13 of 70
1 point(s)
Which of the following characteristics are usually possessed by an omnidirectional antenna? (Choose two)
Question 14 of 70
1 point(s)
When a client changes its connection from one autonomous AP to another, what exactly is the client leaving and joining?
Question 15 of 70
1 point(s)
When a device roams from one AP to another, which of the following is responsible for deciding the device that wants to roam?
Question 16 of 70
1 point(s)
Which of the following correctly describes the roam when ten lightweight APs are joined to a single WLC, and the client roams from one AP to another?
Question 17 of 70
1 point(s)
Which of the following provides the most efficient roaming in terms of time when a client roams to another AP?
Question 18 of 70
1 point(s)
Which of the following is used for efficient roaming by caching the authentication key information?
Question 19 of 70
1 point(s)
Which mechanisms are used to tunnel the client data between the controllers in layer 2 roaming?
Question 20 of 70
1 point(s)
In a layer 3 roam, what will be the role of controller A when the client roams to controller B from it?
Question 21 of 70
1 point(s)
There are four controllers in a network: A, B, C, and D. A and B belong to mobility group 1, while C and D belong to mobility group 2. What happens when a client tries to roam between controllers B and C?
Question 22 of 70
1 point(s)
Which parameter is used to determine the location of a client device in a wireless network respective to an AP?
Question 23 of 70
1 point(s)
Which of the following mechanism is used by Open Authentication?
Question 24 of 70
1 point(s)
Which one of the following can be used in combination with Open Authentication?
Question 25 of 70
1 point(s)
Which devices must be configured with the key string when PSK authentication is used on a WLAN without an ISE server? (Choose two)
Question 26 of 70
1 point(s)
Which of the following methods uses WPA2 personal mode for authentication?
Question 27 of 70
1 point(s)
Which WPA version is considered to be the most secure personal mode?
Question 28 of 70
1 point(s)
Which of the following wireless security configurations are used with the PSK? (Choose all that apply)
Question 29 of 70
1 point(s)
Which authentication methods are used along with the 802.1x on a WLAN?
Question 30 of 70
1 point(s)
Which of the following roles will WLC perform when a Cisco Wireless LAN Controller is configured to use 802.1x authentication using a RADIUS server (external server)?
Question 31 of 70
1 point(s)
Where is the role of the supplicant located in the WLAN when WPA2 enterprise mode is used?
Question 32 of 70
1 point(s)
Assume that an organization offers a wireless network for guests, and they grant access only if the guests have read and accepted the policy displayed by the organization. Which of the following methods can handle this process?
Question 33 of 70
1 point(s)
What is the first best step when troubleshooting a wireless network?
Question 34 of 70
1 point(s)
When troubleshooting a wireless client, which information is useful for finding that particular client in the WLC?
Question 35 of 70
1 point(s)
Assume that you have entered the wireless MAC address in the search bar of the WLC and found the client. A sequence of dots represents connectivity. The last green dot is labeled Online. Which statement is the most correct?
Question 36 of 70
1 point(s)
While viewing the connectivity chart on the WLC client view screen, which of the following states represents that the client has met all of the requirements and can start using the wireless network?
Question 37 of 70
1 point(s)
WLC client view screen shows a client to be in an Association state rather than the Authentication state because the client tried to join the network a few minutes ago. Which of the following best describes the condition of the client?
Question 38 of 70
1 point(s)
There is a large wireless network consisting of many APs, several controllers, a syslog server, and a RADIUS server. A client has reported connectivity issues in a particular building without giving any information about the controller or AP he tried to join. What is the best way to troubleshoot and gather information about the client?
Question 39 of 70
1 point(s)
Suppose you search a controller for a client’s MAC address. The results show a 10% value for the Connection Score. Which one of the following describes the best scenario?
Question 40 of 70
1 point(s)
A new AP is installed, and no user is able to connect to it. Which of the following information will you use to find the name of AP in the WLC? (Choose all that apply)
Question 41 of 70
1 point(s)
Assume that you search for an AP on a WLC and find out that the Noise is -20 on the 2.4 GHz band. Select the correct statement.
Question 42 of 70
1 point(s)
Suppose you search for a certain AP (An AP about which users have complained) on the WLC, and you look at the 5 GHz information of that AP; you find out that the AP is using channel 60, whose utilization is 1%, it has a transmit power of 5 dBm, 65 clients, -90 noise level, and the Air Quality value of 10. Select the most accurate conclusion from this information.
Question 43 of 70
1 point(s)
Which statement best describes the hierarchical LAN design model? (Choose all that apply)
Question 44 of 70
1 point(s)
Which of the following is also known as an access layer?
Question 45 of 70
1 point(s)
How many distribution switches can be deployed inside a building block in a hierarchical LAN design?
Question 46 of 70
1 point(s)
Which enterprise network architecture is also referred to as the collapsed core?
Question 47 of 70
1 point(s)
Which of the following can be used to provide access to cloud providers for customers or end users? (Choose two)
Question 48 of 70
1 point(s)
Which of the following technologies can be used to implement a simplified campus design? (Choose all that apply)
Question 49 of 70
1 point(s)
What is the major reason behind SD-Access using VXLAN data encapsulation rather than LISP data encapsulation?
Question 50 of 70
1 point(s)
SD-Access uses the VXLAN header that is exactly the same as the original VXLAN header. True or false?
Question 51 of 70
1 point(s)
Which control plane is used by SD-Access?
Question 52 of 70
1 point(s)
Which fields were added to the original VXLAN header to transport SGT tags?
Question 53 of 70
1 point(s)
Which network environment type was SD-Access designed for?
Question 54 of 70
1 point(s)
Which components are included in the SD-Access fabric architecture? (Choose all that apply)
Question 55 of 70
1 point(s)
What are the primary components of the SD-WAN solution of Cisco?
Question 56 of 70
1 point(s)
The vSmart controller creates permanent and IPSec connections to all the SD-WAN routers present in the SD-WAN fabric. True or false?
Question 57 of 70
1 point(s)
SD-WAN only works on MPLS networks or over the Internet. True or false?
Question 58 of 70
1 point(s)
Which of the following can be used as a single pane of glass for SD-WAN?
Question 59 of 70
1 point(s)
Select the main and primary function of the vBond orchestrator.
Question 60 of 70
1 point(s)
By default, the command traceroute tries 20 hops before quitting. True or false?
Question 61 of 70
1 point(s)
What are the reasons for debugging in OSPF? (Choose three)
Question 62 of 70
1 point(s)
Which of the following is the latest version of NetFlow?
Question 63 of 70
1 point(s)
Which of the following permits the matching key fields?
Question 64 of 70
1 point(s)
Which of the following options are required to configure the Flexible NetFlow? (Choose three)
Question 65 of 70
1 point(s)
What is ERSPAN used for?
Question 66 of 70
1 point(s)
Which of the following is monitored by IP SLA? (Choose four)
Question 67 of 70
1 point(s)
Which of the following are the components of Cisco DNA Center? (Choose three)
Question 68 of 70
1 point(s)
Cisco DNA Center Assurance can only manage switches and routers. True or false?
Question 69 of 70
1 point(s)
Which of the following is known as the Cisco Security Architectural Framework?
Question 70 of 70
1 point(s)
Which of the following are PINs (Place in the Network) in Cisco SAFE architecture? (Choose all that apply)