The Most Recommended Cisco 350-050 Certification For Free Download

Cisco Comments Off

Which two options are correct according to debug output presented in the following exhibit? (Choose two.)

A. The wireless client uses a static IP address, so “ START (0)” can be found in the logs.
B. The wireless client has been successfully authenticated. Reauthentication is set to occur on an extremely aggressive schedule (every five seconds). – Make You Succeed To Pass IT Exams Certkey 350-050
C. The wireless client “hangs” in probes (does not proceed with 802.11 authentication and association). It is likely that the “encryption” or “key-management” advertised in the probe response does not match.
D. Since the AP receives a probe request from the wireless client, the Access Point Functions state for the machine changes from “Idle” to “Probe.”

Correct Answer: CD
Lightweight Access Point Protocol or LWAPP is the name of a protocol that can control multiple Wi-Fi wireless access points at once. How does the Cisco WCS know what has happened in an LWAPP system when an AP’s interface goes down and then comes up again?
A. The Cisco WCS polls the APs and when the AP is unreachable, reports “Max retransmissions reached on AP <name>”.
B. The AP sends a linkDown then linkUp trap to the Cisco WCS; these are two of the six traps defined in RFC 1215, A Convention for Defining Traps for use with the SNMP.
C. The AP cannot send a linkDown trap, as per RFC 1215, because the link is down; when the link comes back up, the AP sends a linkup trap to the Cisco WLC, which then forwards the trap to the Cisco WCS.
D. The Cisco WLC sends a trap to the Cisco WCS when it detects that an AP is down.
Correct Answer: D
When using the enterprise-based authentication method for WPA2, a bidirectional handshake exchange occurs between the client and the authenticator. Which five options will be the results of that exchange by use of controller based network? (Choose five.)
A. proof that each side is alive
B. creation of the Pairwise Transient Key
C. distribution of the Group Transient Key
D. binding of a Pairwise Master Key at the client and the controller
E. distribution of the Pairwise Master key for caching at the access point
F. a bidirectional exchange of a nonce used for key generation
Correct Answer: ABCDF
You can click on the buttons at the bottom of the screen to access resources associated with this item.
The following resources are available to you:

show run – show run on AP-1
debug logs – Logs/debugs on AP-1 – Make You Succeed To Pass IT Exams
Certkey 350-050

Radius sniffer trace taken betwen AP-1 and AAA-Server. packet-overview frame-1
frame-2 frame-3 frame-4

Wireless-Client (CB21) configured for SSID “CCIE-2”
Standalone AP (autonomous), configured with 3 SSID’s and 3 Data-Vlan plus the native VLAN. AAA
server configured for LEAP and EAP-FAST authentication and dynamic VLAN assignment. Question:
Why is this wireless client not able to associate to the network?
A. Pending
Correct Answer: A
According to the troubleshooting actions, choose proper troubleshooting process order.
Create a testing action plan based on the information gathered.

Clearly define the trouble reported.

If the problem has not been solved, change vanables and repeat process.

Collect data to isolate possible causes.

Analyze the results.

Execute tests to identify the actual source of the problem.
A. Step1 II.Step2 III.Step3 IV.Step4
B. Step5 VI.Step6
C. I-2,II-4,III-1,IV-5,V-6,VI-3
D. I-2,II-4,III-1,IV-5,V-3,VI-6
E. I-2,II-4,III-1,IV-3,V-6,VI-5
F. I-2,II-4,III-1,IV-3,V-5,VI-6 – Make You Succeed To Pass IT Exams Certkey 350-050
Correct Answer: A
Study the exhibit carefully. You are deploying a site survey for a new implementation and see this information in Cisco Spectrum Expert. Which option is true?

A. The capture shows radar. It is most probably military radar because of the frequency hopping in the “Swept Spectrogram.” The workaround is to disable DFS on the AP.
B. There is general background noise of -70dBm, which is not an issue at all for an 802.11b/g deployment.
C. The location of this capture is most likely near a kitchen, because it is clear that there is a microwave oven disrupting channel 1-13. There will be some packet loss while cooking, which is not a problem, because employees will not be working during lunch time.
D. This is a typical Bluetooth pattern. The source needs to be identified and eliminated because it will affect an 802.11b/g deployment.
Correct Answer: D
ETSI produces globally-applicable standards for Information and Communications Technologies (ICT). What does the current European Telecommunications Standards Institute rule state is the 2.4-GHz maximum transmitter output power for point-to-point installations?
A. 20 dBm – Make You Succeed To Pass IT Exams Certkey 350-050
B. 17 dBm
C. 30 dBm
D. 16 dBm
Correct Answer: B
Which three statements best describe the communication between the Cisco Catalyst 6500 Series Supervisor Engine and the Cisco WiSM module? (Choose three.)
A. The communication between the Catalyst Supervisor Engine and Cisco WiSM goes to the service port on the Cisco WiSM.
B. WLCCP is used to communicate between the Cisco WiSM and Catalyst Supervisor Engine.
C. WCP runs on UDP/IP port 10000.
D. WCP is used to communicate between the Cisco WiSM and Catalyst Supervisor Engine.
Correct Answer: ACD
How to apply WMM access categories in an autonomous AP?
A. The autonomous AP automatically converts the DSCP values of the incoming packets based on a conversion table in the AP.
B. Policy maps are used on the autonomous AP to apply CoS values to frames coming into the AP, based on the ACLs associated with the policy MAP. If no policy maps are applied, the AP will use the incoming frame’s CoS to map the frame to the appropriate WMM access category.
C. AP policy maps allow the DSCP to be set for packets to and from the autonomous AP. These DSCP values are translated to CoS values by the upstream switch.
D. Autonomous APs do not support WMM access categories.
Correct Answer: B
Key Encryption Key is used for the group key handshake to send to the Group Transient Key, so it can be delivered securely to the client.
A. True
B. False
Correct Answer: A


Back to Top