[Free] 2019(Nov) EnsurePass Cisco 200-355 Dumps with VCE and PDF 21-30

Get Full Version of the Exam

Question No.21

Mac OS X machines are having issues accessing the wireless network. While working with TAC, the administrator is asked to find the Mac laptop#39;s wireless adapter model and driver. Where should the administrator look to find this information?

  1. About This Mac gt; System Report

  2. Control Panel gt; System

  3. System Preferences gt; Network gt; Wi-Fi Adapter gt; Advanced

  4. Control Panel gt; Networking gt; Adapters gt; Properties

Correct Answer: A

Question No.22

If an antenna has a dBd of 8.6, what is the dBi value?











Correct Answer: D

Question No.23

Which two statements about the requirements to configure inter-controller roaming are true? (Choose two.)

  1. The same mobility domain names are configured across controllers.

  2. The same RF group names are configured across controllers.

  3. The same controller hardware version is configured across controllers.

  4. The same AP manager interface is configured across controllers.

  5. The same virtual interface is configured across controllers.

  6. The same controller software version is configured across controllers.

Correct Answer: AE

Question No.24

Which type of basic radiation pattern does a Yagi antenna have?

  1. circular

  2. semicircular

  3. straight line

  4. cone

Correct Answer: D

Question No.25

Microsoft Active Directory integrated machines are not authenticating to the internal WLAN. The WLAN settings are WPA2-AES-802.1x and are authenticating to a Cisco Identity Services Engine server. You investigate and note that non-domain authenticated machines are properly authenticating to the WLAN using their Active Directory credentials. Why would this problem


  1. The WLAN is configured improperly in group policy.

  2. The ACS server is not joined to the domain, causing authentications to fail.

  3. The domain machines are configured to disable the wireless adapter.

  4. The non-domain machines are using local accounts that are not authenticated through the domain.

Correct Answer: A

Question No.26

A customer has requested a single point of policy enforcement for LAN and WLAN. Which deployment model should be used?

  1. converged

  2. autonomous

  3. FlexConnect

  4. centralized

Correct Answer: A

Question No.27

Which two principles must be considered when deploying a wireless network through a wooded area? (Choose two.)

  1. absorption

  2. reflection

  3. diffraction

  4. scattering

  5. refraction

Correct Answer: AD

Question No.28

Which two statements about WiMAX technology are true? (Choose two.)

  1. WiMAX is defined by 802.11i.

  2. Typically, fixed WiMAX networks have a higher-gain directional antenna installed near the client.

  3. WiMAX is capable of working as a long-range system over several miles.

  4. WiMAX works only for licensed frequencies.

Correct Answer: BC

Question No.29

Which type of frames are ACK and CF-ACK?

  1. control

  2. management

  3. RTS/CTS

  4. association

Correct Answer: A

Question No.30

When an AP, in its default configuration mode, connects to a Cisco WLC, which methods are available for remote management access to an AP?

  1. SSL and SSH are available only after configuration by a Cisco WLC version 7.0.

  2. SSH only

  3. HTTPS, and SSH

  4. SSH and Telnet

  5. SSH and Telnet are available only after configuration by a Cisco WLC version 7.0.

Correct Answer: D

Get Full Version of the Exam
200-355 Dumps
200-355 VCE and PDF