IT인증,IT자격증,IT자격증시험,IT인증시험

http://www.pass4test.net/

Cisco 640-722 시험덤프

네트웨크시대인 지금 인터넷에 검색하면 수많은  Cisco 640-722 (Implementing Cisco Unified Wireless Networking Essentials v2.0) 시험공부자료가 검색되는데 그중에서도Pass4Test에서 출시한 Cisco 640-722 (Implementing Cisco Unified Wireless Networking Essentials v2.0) 덤프가 가장 높은 인지도를 지니고 있습니다. Cisco 640-722 (Implementing Cisco Unified Wireless Networking Essentials v2.0) 덤프에는  Cisco 640-722 (Implementing Cisco Unified Wireless Networking Essentials v2.0) 시험문제의 기출문제와 예상문제가 수록되어있어 덤프에 있는 문제만 잘 공부하시면 시험은 가볍게 패스가능합니다. Cisco 640-722 (Implementing Cisco Unified Wireless Networking Essentials v2.0) 시험을 통과하여 자겨증취득하는 꿈에 더욱 가까이 다가가세요.

 

NO.1 What is the impact of configuring a single SSID to support TKIP and AES encryption simultaneously?

A. The overhead associated with supporting both encryption methods degrades client throughput

significantly.

B. Some wireless client drivers might not handle complex SSID settings and may be unable to associate

to the WLAN.

C. This configuration is unsupported and the Cisco Wireless Control System generates alarms

continuously until the configuration is corrected.

D. This configuration is common for migrating from WPA to WPA2. No problem is associated with using

this configuration.

Answer: B

 

NO.2 What is the difference between the IEEE, the WiFi Alliance, and the FCC, ETSI, and TELEC?

A. The IEEE and FCC are responsible for the standards that apply to wireless networks. The WiFi Alliance,

ETSI, and TELEC are the governmental agencies that regulate compliance with local standards.

B. The IEEE is responsible for Layer 1 and Layer 2 protocols. The WiFi Alliance is responsible for

interoperability testing. The FCC, ETSI, and TELEC are responsible for radio frequency and transmission

power-level regulations and standards in the U.S., Europe, and Japan.

C. The IEEE is responsible for Layer 1 and Layer 2 protocols. The FCC, ETSI, and TELEC are

responsible for interoperability testing and compliance. The WiFi Alliance is responsible for radio

frequency and transmission power-level regulations and standards on a global basis.

D. The IEEE and FCC are responsible for the Layer 3 protocol support and frequency and power- level

regulations in the United States. ETSI and TELEC are responsible for frequency and power- level

regulations in Europe and Japan. The WiFi Alliance is responsible to interoperability testing.

Answer: B

 

NO.3 Which Cisco AnyConnect module allows troubleshooting for core Cisco AnyConnect problems?

A. telemetry

B. web security

C. VPN

D. NAM

E. DART

F. posture

G. CSSC

Answer: E

 

NO.4 A WLAN deployment uses a combination of Cisco Aironet 1260 APs and multiple Cisco 5500 Wireless

LAN Controllers to provide wireless LAN access to end-users. The network administrator has decided to

use DHCP Option 43 to enable the APs to discover the wireless LAN controllers. When configuring the

DHCP scope, which format should be used for the Cisco WLC addresses?

A. a comma-separated ASCII string of Cisco WLC AP-manager addresses

B. a comma-separated ASCII string of Cisco WLC management addresses

C. a comma-separated ASCII string of Cisco WLC virtual IP addresses

D. a hexadecimal string of Cisco WLC AP-manager addresses

E. a hexadecimal string of Cisco WLC management addresses

F. a hexadecimal string of Cisco WLC virtual IP addresses

Answer: E

 

NO.5 You are testing a new autonomous Cisco Aironet 1260 AP that has booted for the first time on the

existing corporate network, which includes voice, data, and location services.

How do you reach the GUI of the AP?

A. HTTP to 10.0.0.1.

B. HTTP to 192.168.1.1.

C. HTTP to the DHCP address.

D. HTTPS to 10.0.0.1.

E. HTTPS to the 192.168.1.1.

F. HTTPS to the DHCP address.

Answer: C

 

NO.6 Which three items do you need to establish a wireless connection to an enterprise wireless network?

(Choose three.)

A. SSID name

B. RF channel

C. RF signal

D. 802.1X/EAP credentials

E. pre-shared key

F. web page

G. WPA/WPA2 settings

Answer: ACD

 

NO.7 Which type of authentication is used initially by a controller-based AP so that a guest client can get an IP

address?

A. 802.1x

B. EAP

C. LEAP

D. open authentication

E. TLS

F. SSL

Answer: D

 

NO.8 Which method of encryption does the 802.11i standard use?

A. AES/CCMP

B. AES/ECB

C. AES/OCB

D. TKIP

E. both AES/ECB and AES/CCMP

Answer: A

 

NO.9 Refer to the exhibit.

Which two options does this icon represent about the status of the respective AP on a Cisco WCS version

7.0 map? (Choose two.)

A. The 802.11a/n radio is administratively disabled.

B. The 802.11a/n radio has a minor fault.

C. The 802.11a/n radio has a major fault.

D. The 802.11b/g/n radio is administratively disabled.

E. The 802.11b/g/n radio has a minor fault.

F. The 802.11b/g/n radio has a major fault.

Answer: CD

 

NO.10 You have brought your MacBook Pro running OS 10.6 to work and intend use the enterprise wireless

network. This network is using EAP-FAST and 2.4 GHz for data and 5 GHz for VoWLAN. Which statement

about the laptop configuration and wireless connection is true?

A. Install a USBwireless adapter and configure

B. Install AppleEAP-Fast plug-in and configure

C. Install Cisco AnyConnect v2.4 and configure

D. Configure Apple network preferences for EAP-FAST

E. The laptop does not support EAP-FAST and will be unable to connect

F. The laptop only supports 5 GHz and will be unable to connect

Answer: D

 

NO.11 Which interface is considered a dynamic interface?

A. the virtual interface

B. the AP manager interface

C. the LAG interface

D. the management interface

E. the service port interface

F. a WLAN client data interface

Answer: F

 

NO.12 Refer to the exhibit.

Which menu gives you access to manage background tasks in Cisco WCS?

A. None, because the General tab provides access to the management of background tasks

B. Monitor

C. Configure

D. Services

E. Administration

F. Tools

Answer: E

 

NO.13 Strong security is required, but a centralized RADIUS authenticator has not been implemented.

Which two steps must you take to provide maximum security when using a pre-shared key? (Choose

two.)

A. Change the TKIP on a weekly basis.

B. Use a key that includes mixed-case letters, numbers, and symbols with a length greater than 10

characters.

C. Use only with WPA and WPA2, following proper strong key guidelines.

D. Use the longest possible WEP key in your security policy.

Answer: BC

 

NO.14 Which two tasks does RRM routinely perform? (Choose two.)

A. antenna selection

B. AP address assignment

C. channel assignment

D. encryption method assignment

E. transmit power control

Answer: CE

 

NO.15 Which option is needed to earn the Cisco Compatible credential for Cisco Compatible Extensions Lite?

A. Foundation and Management are required.

B. Location and Management are required.

C. Foundation and Location are required.

D. Foundation and Voice are required.

E. Voice is required.

F. Foundation is required.

G. Location is required.

H. Management is required.

Answer: F

 

NO.16 Which two statements are true about WiMAX technology? (Choose two.)

A. WiMAX is defined by 802.11i.

B. Typically, fixed WiMAX networks have a higher gain direction antenna installed near the client.

C. WiMAX is capable of working as a long-range system over several miles.

D. WiMAX works only for licensed frequencies.

Answer: BC

 

NO.17 What is the maximum number of lightweight APs that can be supported from a single Cisco WCS

Navigator management console with Cisco WCS and Cisco WLC running version 7.0 code?

A. 10,000

B. 20,000

C. 25,000

D. 30,000

E. 60,000

Answer: D

 

NO.18 Which Cisco AnyConnect module provides wireless connectivity?

A. telemetry

B. web security

C. VPN

D. NAM

E. DART

F. posture

G. CSSC

Answer: D

 

NO.19 In general, what is the difference in transmit power between an AP operating at Tx Power Level 1 and

the same AP operating at Tx Power Level 3?

A. 2 dB

B. 3 dB

C. 6 dB

D. 11 dB

E. 17 dB

Answer: C

 

NO.20 In a typical wireless network using WPA, WPA2 or VPN, why is it still possible for a rogue client to

launch a DOS attack?

A. WPA and WPA2 are not considered strong encryption algorithms and are easily cracked.

B. 802.11 management frames are easily compromised.

C. Cisco Compatible Extensions v5 are required with WPA, WPA2, or VPN to keep rogues from launching

attacks in the wireless network.

D. The message integrity check frames are never encrypted or authenticated, which allows rogues to

spoof clients.

Answer: B

 

 

Posted 2014/4/14 13:51:50  |  Category: cisco  |  Tag: 640-722 시험덤프