Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: force70

Pass the Cisco CCIE Wireless 350-101 Questions and answers with CertsForce

Viewing page 3 out of 3 pages
Viewing questions 21-30 out of questions
Questions # 21:

What is a characteristic of gain in wireless antenna design?

Options:

A.

Scale used for calculating system loss


B.

Checksum figure appended to signal blocks


C.

Amount of increased energy sent toward a specific direction


D.

Standard temperature tolerance during wireless operation


Expert Solution
Questions # 22:

What defines device sensitivity in a wireless environment?

Options:

A.

capability to process the signal


B.

detection of redundant gateways


C.

synchronization of beacon intervals


D.

implementation of key refresh schedules


Expert Solution
Questions # 23:

Which Cisco Ultra-Reliable Wireless Backhaul process enables devices to establish a reliable connection with the next AP along their path before losing connectivity to the current one in a wireless network during roaming?

Options:

A.

Open roaming


B.

Fast client handoff


C.

802.11v high speed roaming


D.

Make-before-break handover logic


Expert Solution
Questions # 24:

A network administrator at a marketing company manages a Cisco Catalyst 9800 Series Wireless Controller running Cisco IOS XE 17.x. The WLAN named XYZ-Guest is set up for visitors, and the administrator wants to implement a web authentication (WebAuth) portal using an external server to manage guest access. To ensure seamless and secure guest authentication, the controller must be configured to use an external WebAuth server for the WLAN. The administrator must configure the XYZ-Guest WLAN to use an external WebAuth server with a parameter map named webauth-ext. Which set of Cisco IOS XE commands must be used?

Options:

A.

wireless wlan XYZ-Guestsecurity web-auth external webauth-ext


B.

wireless wlan XYZ-Guest 2 XYZ-Guestparameter-map webauth-ext


C.

wlan XYZ-Guest 2parameter external security-map webauth-ext


D.

wlan XYZ-Guest 2 XYZ-Guestsecurity web-auth parameter-map webauth-ext


Expert Solution
Questions # 25:

Which process enables seamless Layer 2 handoff in a wireless network during roaming?

Options:

A.

increased beacon interval setting


B.

optimized roaming


C.

fast BSS transition protocol


D.

deferred probe response technique


Expert Solution
Questions # 26:

What happens when a radio wave bends around objects?

Options:

A.

absorption


B.

diffusion


C.

reflection


D.

diffraction


Expert Solution
Questions # 27:

Exhibit:

Question # 27

Refer to the exhibit. An organization wants to use Cisco Spaces for location analytics, and an engineer is setting up the Cisco Catalyst 9800 WLC to send location data. The Spaces connector has already been configured and is operational on the WLC. The engineer must now configure the controller to forward telemetry data to the correct Spaces cloud endpoint using TLS to complete the integration. Which CLI command must be added to the box in the code?

Options:

A.

profile spaces-profile ip address 198.51.100.10 receiver tls-native


B.

receiver protocol tls-native profile spaces-profile ip address 198.51.100.10 57555


C.

receiver ip address 198.51.100.10 57555 protocol tls-native profile spaces-profile


D.

profile spaces-profile receiver 198.51.100.10 57555 protocol tls-native


Expert Solution
Questions # 28:

Which feature does a high-gain patch antenna impart to a wireless signal?

Options:

A.

single narrow frequency use


B.

partial overlap of frequency bands


C.

focused beam in a flat area


D.

alternating direction with elevation


Expert Solution
Questions # 29:

Refer to the exhibit.]

Question # 29

An engineer is setting up a new WLC in a branch office. The IT security policy states that all management access must use encrypted protocols, administrators will connect remotely, and network scans will be run to check for any noncompliant management protocol exposure. Which action must the engineer take to achieve the required management access policy?

Options:

A.

Permit only HTTP, Telnet, and SSH across all VLANs for 10.10.1.0/24.


B.

Enable Telnet, SSH, and HTTPS across the management and guest interfaces.


C.

Permit console access for 10.10.1.0/24 only with HTTP disabled.


D.

Enable HTTPS and SSH, and disable HTTP and Telnet on the WLC.


Expert Solution
Questions # 30:

What is a benefit of applying TACACS authentication for device access?

Options:

A.

static user grouping without role differentiation


B.

fragmented statistics across controllers and devices


C.

streamlined administrator access across platforms


D.

single user for device and network access


Expert Solution
Viewing page 3 out of 3 pages
Viewing questions 21-30 out of questions