What is fading?
A. Another signal source is producing energy on the channel in which you are trying to operate.
B. The desired signal reaches the receiving antenna via multiple paths, each of which has a
different propagation delay and path loss.
C. A time-varying change in the path loss of a link with the time variance governed by the
movement of objects in the environment, including the transmitter and receiver themselves.
D. A function of the frequency and should be provided in the cable specification by the vendor.
E. The minimum signal level for the receiver to be able to acceptably decode the information.
F. The time delay from the reception of the first instance of the signal until the last instance.
Which limitation applies to the use of the Cisco WLAN Solution Management over Wireless
A. Controllers must be managed using only secure protocols (that is, SSH and HTTPS),
notnonsecure protocols (that is, HTTP and Telnet).
B. Read-write access is not available; only read-only access is supported.
C. Uploads and downloads from the controller are not allowed.
D. Wireless clients can manage other controllers however not the same controller and AP to which
the client is associated.
Up to how many Cisco WiSMs are supported in a single mobility group operating under v5.0
The existing Cisco Unified Wireless Controller is running v5.0 code for both the controllers and the
Cisco WCS. A controller has been configured with an appropriate rogue rule condition to report
discovered APs to the Cisco WCS. What default alarm level is used to display all rogue APs in the
Cisco Client Management Frame Protection is running on a mobility group with two controllers.
Which two MFP requirements protect the network? (Choose two.)
A. forces clients to authenticate, using a secure EAP method only
B. implements the validation of wireless management frames
C. requires CCXv5
D. requires the use of anonbroadcast SSID
E. requires CCXv4
What is the result when client exclusion is enabled with a timeout value of zero?
A. Clients are excluded indefinitely.
B. Clients are never excluded.
C. Client exclusion is disabled.
D. Clients must be explicitly included by specifying the MAC address.
E. Exclusion and inclusion is determined by access list.
The central office is currently using a combination of 4400 and 2100 series WLAN controllers
running v4.2 and a variety of LWAPP-enabled access points servicing both 2.4 GHz and 5 GHz.
The WLAN deployment has been extended to each remote office by implementing a 526 WLAN
controller running v4.1 and several 521 access points. Wireless client deployment uses EAP-TLS
authentication using a centralized RADIUS server plus 802.11n for performance. After the first
remote office deployment, remote office users complain that they are not connecting via 802.11n.
What is the most likely cause of this problem?
A. The 526 WLAN controller does not support external authentication via RADIUS, prohibiting
B. The 521 AP does not support 5 GHz, which prohibits 802.11n.
C. The 521 AP and 526 WLAN controllers do not support AES, which prohibits 802.11n.
D. The 526 WLAN controller does not support 802.11n with v4.1 and must be upgraded to v4.2.
E. The 526 WLAN controller does not support 802.11n with either v4.1 or v4.2.
How do the features that are available on the Cisco WCS for Linux version differ from those of the
Cisco WCS for Windows version?
A. Assuming that there are no differences in hardware, a Cisco WCS for Linux can support up to
750 wireless LAN controllers. A Cisco WCS for Windows can support up to 250 wireless LAN
B. Cisco WCS for Windows includes support for Cisco Spectrum Expert clients. Cisco WCS for
Linux does not support Cisco Spectrum Expert clients.
C. Cisco WCS for Linux is required for deployments.
D. There are no differences in features between the Linux and Windows versions of Cisco WCS.
Which CLI command shows the controller configuration in a way that is similar to the way that it is
displayed on Cisco IOS routers?
B. show runconfig
C. show run-config
D. show runningconfig
E. show running-config
Which two attacks does Management Frame Protection help to mitigate? (Choose two.)
B. Denial of Service
C. War Driving