An Expert interview about ccna wireless 640-722 study guide

640-722 Royal Pack Testengine pdf

100% Actual & Verified — 100% PASS

Unlimited access to the world's largest Dumps library!

https://www.2passeasy.com/dumps/640-722/

Approved of 640-722 free exam questions materials and questions pool for Cisco certification for IT engineers, Real Success Guaranteed with Updated 640-722 pdf dumps vce Materials. 100% PASS CCNA - Wireless Associate - IUWNE exam Today!

2016 Jul cisco ccna wireless iuwne 640-722 cbt nuggets:

Q121. - (Topic 6) 

Which type of management tasks can be completed on a Cisco WLC remotely from a wireless client? 

A. All management and configuration tasks can be performed from a wireless client except for using debug commands. 

B. In the default configuration, no management or configuration is possible through the GUI or CLI on the Cisco WLC. 

C. The default configuration of the Cisco WLC allows only CLI access and then only the use of show commands, so no configuration is possible. 

D. All management and configuration tasks, except uploads from and downloads to the Cisco WLC, are permitted. 

Answer: B 

Explanation: 

You can use either the service port interface or the management interface to access the GUI. Cisco recommends that you use the service-port interface. GUI access is not available from a wireless client. You access the controller CLI using one of two methods: . 

A direct serial connection to the controller console port . 

A remote console session over Ethernet through the pre-configured service port or the distribution system ports. CLI access from a remote client is not allowed. 

Reference: http://www.cisco.com/c/en/us/td/docs/wireless/controller/6-0/configuration/guide/Controller60CG/c60intf.html 


Q122. - (Topic 6) 

Instructions 

. THIS TASK DOES NOT REQUIRE DEVICE CONFIGURATION. 

. To access the multiple-choice questions, click on the numbered boxes on the left of the top panel. 

. There are two multiple-choice questions with this task. Be sure to answer both questions before selecting the Next button. 

Scenario 

You are deploying a small wireless test network in a lab. The network is made up of a wireless LAN controller, a dual radio AP, and an IOS switch. You are testing the ability of wireless clients to access the network and are experiencing problems. Use the exhibits to resolve the issues. 










Tablets and other wireless clients are unable to connect at any 802.11 n data rates. What is the most likely cause of this problem? 

A. WLAN > General properties are incorrectly configured. 

B. WLAN > QoS properties are incorrectly configured. 

C. WLAN > Security properties are incorrectly configured. 

D. WLAN > Advanced properties are incorrectly configured. 

E. Wireless > AP > 802.11 a/n is incorrectly configured. 

F. Wireless > 802.11a/n > Network is incorrectly configured. 

Answer: C 

Explanation: 

802.11n only supports open authentication or the use of WPAv2 with AES. From the output shown in this question, we can see that WPA/WPA2 using TKIP has been configured, not AES. 


Q123. - (Topic 4) 

When a wireless client is authenticated in a controller-based wireless network, which three pieces of source identification information can be used by the controller for an Access-Request message that is sent to an external RADIUS server? (Choose three.) 

A. wireless client IP address 

B. controller IP address 

C. AP IP address 

D. wireless client MAC address 

E. controller MAC address 

F. AP MAC address 

Answer: B,E,F 

Explanation: 

From the Call Station ID Type drop-down list, choose IP Address, System MAC Address, or AP MAC Address to specify whether the IP address, system MAC address, or AP MAC address of the originator will be sent to the RADIUS server in the Access-Request message. 

Reference: 

http://www.cisco.com/c/en/us/td/docs/wireless/controller/7-0/configuration/guide/c70/c70sol.html#wp1389032 (Step 3) 


Q124. - (Topic 3) 

The introduction of consumer phones and tablets into enterprise WLANs can have an impact on 802.11a/b/g/n deployments. The Apple iPhone 4 and iPad 2 are very common examples. 

Which statement best describes the abilities of these devices? 

A. The Apple iPhone 4 and the iPad 2 use 2.4 GHz and 5 GHz. The Apple iPhone 4 uses only one spatial stream and the iPad 2 uses two spatial streams. 

B. The Apple iPhone 4 uses only 2.4 GHz and the iPad 2 only uses 5 GHz. The Apple iPhone 4 uses only one spatial stream and the iPad 2 uses two spatial streams. 

C. The Apple iPhone 4 uses 2.4 GHz and the iPad 2 uses 2.4 GHz or 5 GHz. The Apple iPhone 4 only uses one spatial stream and the iPad 2 uses two spatial streams. 

D. The Apple iPhone 4 uses 2.4 GHz and the iPad 2 uses 2.4 GHz or 5 GHz. The Apple iPhone 4 and the iPad 2 use only one spatial stream. 

Answer: D 

Explanation: 

The apple iPhone 4 and iPAD2 supports only 2.4 Ghz (no 5 Ghz) wireless networks. Support for 5Ghz networks was introduced with the Apple iPhone5 and the iPAD 3. 


Q125. - (Topic 1) 

Which two wireless technologies can interfere with 802.11 networks? (Choose two.) 

A. DECT 

B. ZigBee 

C. WiMax 

D. GSM 

Answer: A,B 

Explanation: 

Digital Enhanced Cordless Telecommunication (DECT), also known as cordless telephones, and Zigbee are both well-known sources of interferences within an 802.11 network. 


640-722  free exam questions

Avant-garde cisco ccna wireless iuwne 640-722 cbt nuggets:

Q126. - (Topic 2) 

Which two items are needed to discover the IP address of a new Cisco Aironet 1260 autonomous AP that just finished booting? (Choose two.) 

A. username = "cisco" and password = "cisco" 

B. username = "Admin" and password = "Cisco" 

C. username=Cisco and password=Cisco 

D. show int vlan1 

E. show int bvi1 

F. show int gigabitethernet0 

G. show int radio0-802.11n 

H. show int radio1-802.11n 

Answer: C,E 

Explanation: 

Enter your username in the User Name field. The default username is Cisco. 

Enter the wireless device password in the Password field and press Enter. The default password is Cisco. The Summary Status page appears. 

The access point is configured with the factory default values including the IP address (set to receive an IP address using DHCP). To obtain the new IP address for an access point/bridge, you can use the show interface bvi1 CLI command. 

Reference: http://www.cisco.com/c/en/us/td/docs/wireless/access_point/12-4-25d-JA/Configuration/guide/cg_12_4_25d_JA/scg12-4-25d-JA-chap4-first.html 


Q127. - (Topic 2) 

Which action secures the SNMPv2C protocol in a Cisco WLC? 

A. configure new communities and disable default communities 

B. use digital certificates to authenticate and encrypt transmissions 

C. enable password or transfer encryption 

D. set a username and difficult-to-guess password 

Answer: A 

Explanation: 

See the SNMP configuration for Cisco WLC page shown in reference link below: 

Reference: http://www.cisco.com/c/en/us/td/docs/wireless/controller/7-4/configuration/guides/consolidated/b_cg74_CONSOLIDATED/b_cg74_CONSOLIDATED_ chapter_0111.html 


Q128. - (Topic 4) 

Which encryption algorithm does WPA use? 

A. RC4 

B. DES 

C. AES 

D. DH5 

Answer: A 

Explanation: 

The RC4 Encryption Algorithm, developed by Ronald Rivest of RSA, is a shared key stream cipher algorithm requiring a secure exchange of a shared key. The symmetric key algorithm is used identically for encryption and decryption such that the data stream is simply XORed with the generated key sequence. The algorithm is serial as it requires successive exchanges of state entries based on the key sequence. Hence implementations can be very computationally intensive. The RC4 encryption algorithm is used by standards such as IEEE 802.11 within WEP (Wireless Encryption Protocol) using 40 and 128-bit keys. Published procedures exist for cracking the security measures as implemented in WEP. 

Reference: http://www.vocal.com/cryptography/rc4-encryption-algoritm/ 


Q129. - (Topic 5) 

Refer to the exhibit. 


Which two menus do you click to determine the reachability status of a controller from Cisco WCS? (Choose two.) 

A. Monitor 

B. Reports 

C. Configure 

D. Services 

E. Administration 

F. Tools 

Answer: A,C 

Explanation: 

Monitor Menu 

The Monitor menu provides you with a top-level description of the devices on your network. 

You can monitor your network, maps, Google Earth maps, various devices (controllers, access points, clients, tags, chokepoints, Wi-Fi TDOA receivers), RRM, alarms, and events. 

Configure Menu. 

The Configure menu enables you to configure templates, controllers, access points, Ethernet switches, chokepoints, Wi-Fi TDOA receivers, config groups, auto provisioning, scheduled configuration tasks, profiles, ACS view servers, and TFTP servers on your network. 


Topic 6, Conduct Basic WLAN Maintenance and Troubleshooting 

198. - (Topic 6) 

Which CLI command is used on a Cisco WLC to troubleshoot mobility, rogue detection, and load-balancing events? 

A. debug dot11 

B. debug capwap all 

C. show dot11 details 

D. show capwap details 

Answer: A 

Explanation: 

ebug dot11 

To configure the debugging of 802.11 events, use the debug dot11 command. 

debug dot11 { all | load-balancing | management | mobile | nmsp | probe | rldp | rogue 

| state} { enable | disable} 

Syntax Description 

all 

Configures the debugging of all 802.11 messages. 

load-balancing 

Configures the debugging of 802.11 load balancing events. 

management 

Configures the debugging of 802.11 MAC management messages. 

mobile 

Configures the debugging of 802.11 mobile events. 

nmsp 

Configures the debugging of the 802.11 NMSP interface events. 

probe 

Configures the debugging of probe. 

rldp 

Configures the debugging of 802.11 Rogue Location Discovery. 

rogue 

Configures the debugging of 802.11 rogue events. 

state 

Configures the debugging of 802.11 mobile state transitions. 

enable 

Enables the 802.11 debugging. 

disable 

Disables the 802.11 debugging. 

Reference: http://www.cisco.com/c/en/us/td/docs/wireless/controller/7-3/command/reference/cr73/b_cr_7-3_chapter_010.html#wp3619872221 


Q130. - (Topic 1) 

What are three primary components that describe TKIP? (Choose three.) 

A. broadcast key rotation 

B. dynamic WEP 

C. message integrity check 

D. per-packet key hashing 

E. symmetric key cipher 

F. WPA2 enterprise mode 

Answer: A,C,D 

Explanation: 

TKIP uses the same underlying mechanism as WEP, and consequently is vulnerable to a number of similar attacks. The message integrity check, per-packet key hashing, broadcast key rotation, and a sequence counter discourage many attacks. The key mixing function also eliminates the WEP key recovery attacks. 

Reference: http://en.wikipedia.org/wiki/Temporal_Key_Integrity_Protocol 




see more CCNA - Wireless Associate - IUWNE