Free Cheat-test Samples and Demo Questions Download
Adobe exams Adobe
Apple exams Apple
Avaya exams Avaya
Check Point exams Check Point
Cisco exams Cisco
Citrix exams Citrix
CIW exams CIW
CompTIA exams CompTIA
EC-Council exams EC-Council
EMC exams EMC
Exin exams Exin
Fortinet exams Fortinet
Hitachi exams Hitachi
HP exams HP
IBM exams IBM
Isaca exams Isaca
ISC exams ISC
Juniper exams Juniper
LPI exams LPI
McAfee exams McAfee
Microsoft exams Microsoft
Oracle exams Oracle
PMI exams PMI
Riverbed exams Riverbed
SNIA exams SAP
Sun exams SAS
Symantec exams Symantec
VMware exams VMware
All certification exams

Cisco 640-721 Exam -

Free 640-721 Sample Questions:

Q: 1 What is fading?
A. Another signal source is producing energy on the channel in which you are trying to operate.
B. The desired signal reaches the receiving antenna via multiple paths, each of which has a different propagation delay and path loss.
C. A time-varying change in the path loss of a link with the time variance governed by the movement of objects in the environment, including the transmitter and receiver themselves.
D. A function of the frequency and should be provided in the cable specification by the vendor.
E. The minimum signal level for the receiver to be able to acceptably decode the information.
F. The time delay from the reception of the first instance of the signal until the last instance.
Answer: C

Q: 2 Which limitation applies to the use of the Cisco WLAN Solution Management over Wireless feature?
A. Controllers must be managed using only secure protocols (that is, SSH and HTTPS), not nonsecure protocols (that is, HTTP and Telnet).
B. Read-write access is not available; only read-only access is supported.
C. Uploads and downloads from the controller are not allowed.
D. Wireless clients can manage other controllers however not the same controller and AP to which the client is associated.
Answer: C

Q: 3 Up to how many Cisco WiSMs are supported in a single mobility group operating under v5.0 code?
A. 5
B. 12
C. 16
D. 24
E. 150
F. 300
Answer: B

Q: 4 The existing Cisco Unified Wireless Controller is running v5.0 code for both the controllers and the Cisco WCS. A controller has been configured with an appropriate rogue rule condition to report discovered APs to the Cisco WCS. What default alarm level is used to display all rogue APs in the Alarm Summary?
A. Critical
B. Flash
C. Major
D. Minor
E. Urgent
Answer: D

Q: 5 Cisco Client Management Frame Protection is running on a mobility group with two controllers. Which two MFP requirements protect the network? (Choose two.)
A. forces clients to authenticate, using a secure EAP method only
B. implements the validation of wireless management frames
C. requires CCXv5
D. requires the use of a nonbroadcast SSID
E. requires CCXv4
Answer: B, C

Q: 6 What is the result when client exclusion is enabled with a timeout value of zero?
A. Clients are excluded indefinitely.
B. Clients are never excluded.
C. Client exclusion is disabled.
D. Clients must be explicitly included by specifying the MAC address.
E. Exclusion and inclusion is determined by access list.
Answer: A

Q: 7 The central office is currently using a combination of 4400 and 2100 series WLAN controllers running v4.2 and a variety of LWAPP-enabled access points servicing both 2.4 GHz and 5 GHz. The WLAN deployment has been extended to each remote office by implementing a 526 WLAN controller running v4.1 and several 521 access points. Wireless client deployment uses EAP-TLS authentication using a centralized RADIUS server plus 802.11n for performance. After the first remote office deployment, remote office users complain that they are not connecting via 802.11n.
What is the most likely cause of this problem?
A. The 526 WLAN controller does not support external authentication via RADIUS, prohibiting authentication.
B. The 521 AP does not support 5 GHz, which prohibits 802.11n.
C. The 521 AP and 526 WLAN controllers do not support AES, which prohibits 802.11n.
D. The 526 WLAN controller does not support 802.11n with v4.1 and must be upgraded to v4.2.
E. The 526 WLAN controller does not support 802.11n with either v4.1 or v4.2.
Answer: E

Q: 8 How do the features that are available on the Cisco WCS for Linux version differ from those of the Cisco WCS for Windows version?
A. Assuming that there are no differences in hardware, a Cisco WCS for Linux can support up to 750 wireless LAN controllers. A Cisco WCS for Windows can support up to 250 wireless LAN controllers.
B. Cisco WCS for Windows includes support for Cisco Spectrum Expert clients. Cisco WCS for Linux does not support Cisco Spectrum Expert clients.
C. Cisco WCS for Linux is required for deployments.
D. There are no differences in features between the Linux and Windows versions of Cisco WCS.
Answer: D

Q: 9 Which CLI command shows the controller configuration in a way that is similar to the way that it is displayed on Cisco IOS routers?
A. show config
B. show run config
C. show run-config
D. show running config
E. show running-config
Answer: E

Q: 10 Which two attacks does Management Frame Protection help to mitigate? (Choose two.)
A. Eavesdropping
B. Denial of Service
C. War Driving
D. Man-in-the-Middle
Answer: B, D

Q: 11 Lightweight access points send control traffic to which device(s)?
A. Other access points.
B. The Wireless Control System.
C. The Wireless Controller.
D. Lightweight access points don't send control traffic.
Answer: C

Q: 12 Which three elements define the 802.11n implementation of MIMO? (Choose three.)
A. Channel Bonding
B. Dynamic Frequency Selection
C. Maximal Ratio Combining
D. Packet Aggregation
E. Spatial Multiplexing
F. Transmit Beam Forming
Answer: C, E, F

Q: 13 In the AP Layer 3 controller discovery process, after the LWAPP Discovery Request is broadcast on a local subnet, what is the next step that the AP takes?
A. Determine whether the controller responses are the primary controller.
B. Send an LWAPP discovery request to controllers learned via OTAP if operational.
C. Send an LWAPP response to the master controller if known.
D. Wait 5 seconds and resend a Discovery Request to the local subnet.
Answer: B

Q: 14 Effective Isotropic Radiated Power is calculated by using which three values? (Choose three.)
A. antenna bandwidth
B. antenna gain
C. cable loss
D. receiver sensitivity
F. transmission power
Answer: B, C, F

Q: 15 Which four file formats are used when importing a single campus map into the Cisco WCS 5.0? (Choose four.)
Answer: B, C, D, E

Q: 16 When creating a wireless profile in the Cisco ADU and you have selected the WPA/WPA2/CCKM radio button option, what other decision must you make and then configure on this same screen?
A. the address and the server secret of the authentication device you will authenticate with
B. the encryption type
C. the EAP type to be used for authentication
D. the length and value of the pre-shared key
E. the SSID of the wireless client
Answer: C

Q: 17 When choosing an EAP type for your Cisco ADU security profile, what must you ensure to authenticate successfully?
A. that the client and authentication server support the same encryption protocol
B. that the EAP type selected is known not to exchange any of its credentials in the clear
C. that the EAP type that you selected is supported by the authentication server
D. that the time set on the clocks for the wireless client and the authenticator are close to the same time
E. that WEP is not selected
Answer: C

Q: 18 Which roaming situation using controllers in a Cisco Unified Wireless Network requires a client using WPA2 with PKC to reauthenticate to the network?
A. A wireless client roams to another AP on a different controller in the same mobility domain.
B. A wireless client roams to another AP on the same controller.
C. A wireless client roams to another AP after being out of range of the network for 2 minutes.
D. A wireless client roams to another AP on a controller in a different mobility domain.
Answer: D

Q: 19 What three authentication methods are generally used in enterprise wireless networks? (Choose three.)
Answer: C, D, E

Q: 20 A client is attached to the Cisco Unified Wireless network using controllers.
When the client is using WPA2 and EAP authentication, where are the wireless encryption keys located during the active user session? (Choose two.)
A. on the access point
B. on the RADIUS server
C. on the Cisco WCS
D. on the client
E. on the Cisco WLC
Answer: A, D

Q: 21 Which statement about an infrastructure basic service set is true according to IEEE 802.11 specifications?
A. Also called an Ad Hoc Network.
B. The BSSID is generated from the first wireless client that starts up in the IBSS.
C. Enables the use of ESS.
D. No relaying of signals from one client to another client.
Answer: C

Q: 22 What increases bandwidth and resists multipath problems by carrying data in subcarriers?
A. Direct Sequence Spread Spectrum
B. Frequency Hopping Spread Spectrum
C. Narrow Band Frequency
D. Orthogonal Frequency Division Multiplexing
Answer: D

Q: 23 When creating new configuration profiles in Cisco Secure Services Client, in what format are the files saved?
Answer: D

Q: 24 A controller is connected to a Cisco IOS Catalyst switch. The following is the switch port configuration:
interface GigabitEthernet 1/0/10
switchport trunk encapsulation dot1q
switchport trunk allowed vlan 1,20,30,50
switchport trunk native vlan 20
switchport mode trunk
Which controller CLI command assigns its management interface to the Cisco IOS Catalyst switch native vlan interface?
A. config interface vlan management 0
B. config interface vlan management 1
C. config interface vlan management 20
D. config interface vlan management 30
E. config interface vlan management 50
Answer: A

Q: 25 What two statements about beacon frames used by access points are true? (Choose two.)
A. contains SSIDs if this feature is enabled
B. provides vendor proprietary information
C. is another name for an associated request
D. sent in response to a probe frame
E. includes ATIM window information for power save operations
Answer: A, B

Q: 26 Why does Cisco recommend using Tftpd32 version 3.0 or later when upgrading wireless LAN controller software to release 4.1 or later?
A. Tftpd32 is a component of CiscoWorks LMS
B. Tftpd32 supports TFTP file transfers larger than 32 MB
C. Tftpd32 is Cisco Compatible Extensions version 4 compliant
D. Tftpd32 supports EoIP tunneling which is required for remote Cisco WLC upgrades
Answer: B

Q: 27 Which set of commands assigns a standalone access point an IP address of with a 27-bit subnet mask and a gateway of
A. config t
interface BVI1
ip address
ip default-gateway
B. config t
interface BVI1
ip address
ip default-gateway
C. config t
interface FastEthernet1
ip address
ip default-gateway
D. config t
interface Dot11Radio0
ip address
ip default-gateway
E. config t
interface FastEthernet1
ip address
ip default-gateway
F. config t
interface Dot11Radio0
ip address
ip default-gateway
Answer: B

Q: 28 If you have the Cisco ADU installed but want to use the Windows Zero Config utility to configure a wireless network profile, what must you do first?
A. Define a common profile in both the Cisco ADU and WZC.
B. Define the wireless profile in the Wireless Networks tab in WZC.
C. In the WZC utility, make sure that the box labeled "Use Windows to configure my Wireless Network Settings" is checked.
D. Uninstall the Cisco ADU.
Answer: C

Q: 29 How are application-specific devices differentiated from laptop computers in the way they support Cisco Compatible Extensions?
A. ASDs are required to support only CCXv1 and v2 features. Laptops must support all CCX features.
B. ASDs are required to support only CCXv5 management features, while laptops are optional features.
C. Several features that are required for laptops are not required for ASDs.
D. There is no differentiation. ASDs and laptops must both support the same CCX features.
Answer: C

© 2014, All Rights Reserved