Download Cisco.350-050.v35-5.2016-02-15.1e.166q.vcex

Download Exam

File Info

Exam CCIE Wireless Written Exam
Number 350-050
File Name Cisco.350-050.v35-5.2016-02-15.1e.166q.vcex
Size 3.54 Mb
Posted February 15, 2016
Downloads 22
Download Cisco.350-050.v35-5.2016-02-15.1e.166q.vcex

How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.

Purchase

Coupon: MASTEREXAM
With discount: 20%



 
 



Demo Questions

Question 1

Which two options are correct according to debug output presented in the following exhibit? (Choose two.)

 

  • A: The wireless client uses a static IP address, so "0.0.0.0 START (0)" can be found in the logs.
  • B: The wireless client has been successfully authenticated. Reauthentication is set to occur on an extremely aggressive schedule (every five seconds).
  • C: The wireless client "hangs" in probes (does not proceed with 802.11 authentication and association). It is likely that the "encryption" or "key-management" advertised in the probe response does not match.
  • D: Since the AP receives a probe request from the wireless client, the Access Point Functions state for the machine changes from "Idle" to "Probe."

Correct Answer: CD




Question 2

Lightweight Access Point Protocol or LWAPP is the name of a protocol that can control multiple Wi-Fi wireless access points at once. How does the Cisco WCS know what has happened in an LWAPP system when an AP's interface goes down and then comes up again?

  • A: The Cisco WCS polls the APs and when the AP is unreachable, reports "Max retransmissions reached on AP <name>".
  • B: The AP sends a linkDown then linkUp trap to the Cisco WCS; these are two of the six traps defined in RFC 1215, A Convention for Defining Traps for use with the SNMP.
  • C: The AP cannot send a linkDown trap, as per RFC 1215, because the link is down; when the link comes back up, the AP sends a linkup trap to the Cisco WLC, which then forwards the trap to the Cisco WCS.
  • D: The Cisco WLC sends a trap to the Cisco WCS when it detects that an AP is down.

Correct Answer: D




Question 3

When using the enterprise-based authentication method for WPA2, a bidirectional handshake exchange occurs between the client and the authenticator. Which five options will be the results of that exchange by use of controller based network? (Choose five.)

  • A: proof that each side is alive
  • B: creation of the Pairwise Transient Key
  • C: distribution of the Group Transient Key
  • D: binding of a Pairwise Master Key at the client and the controller
  • E: distribution of the Pairwise Master key for caching at the access point
  • F: a bidirectional exchange of a nonce used for key generation

Correct Answer: ABCDF




Question 4

You can click on the buttons at the bottom of the screen to access resources associated with this item. The following resources are available to you:

show run - show run on AP-1
debug logs - Logs/debugs on AP-1
Radius sniffer trace taken betwen AP-1 and AAA-Server. packet-overview

frame-1
frame-2 frame-3 frame-4

Given:
Wireless-Client (CB21) configured for SSID "CCIE-2"
Standalone AP (autonomous), configured with 3 SSID's and 3 Data-Vlan plus the native VLAN. AAA server configured for LEAP and EAP-FAST authentication and dynamic VLAN assignment. Question:
Why is this wireless client not able to associate to the network?

 

  • A: Pending

Correct Answer: A




Question 5

Study the exhibit carefully. You are deploying a site survey for a new implementation and see this information in Cisco Spectrum Expert. Which option is true?

 

  • A: The capture shows radar. It is most probably military radar because of the frequency hopping in the "Swept Spectrogram." The workaround is to disable DFS on the AP.
  • B: There is general background noise of -70dBm, which is not an issue at all for an 802.11b/g deployment.
  • C: The location of this capture is most likely near a kitchen, because it is clear that there is a microwave oven disrupting channel 1-13. There will be some packet loss while cooking, which is not a problem, because employees will not be working during lunch time.
  • D: This is a typical Bluetooth pattern. The source needs to be identified and eliminated because it will affect an 802.11b/g deployment.

Correct Answer: D










CONNECT US

Facebook

Twitter

PROFEXAM WITH A 20% DISCOUNT

You can buy ProfExam with a 20% discount!



HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files