Free Cheat-test Samples and Demo Questions Download
Adobe exams Adobe
Apple exams Apple
Avaya exams Avaya
Check Point exams Check Point
Cisco exams Cisco
Citrix exams Citrix
CIW exams CIW
CompTIA exams CompTIA
EC-Council exams EC-Council
EMC exams EMC
Exin exams Exin
Fortinet exams Fortinet
Hitachi exams Hitachi
HP exams HP
IBM exams IBM
Isaca exams Isaca
ISC exams ISC
Juniper exams Juniper
LPI exams LPI
McAfee exams McAfee
Microsoft exams Microsoft
Oracle exams Oracle
PMI exams PMI
Riverbed exams Riverbed
SNIA exams SAP
Sun exams SAS
Symantec exams Symantec
VMware exams VMware
All certification exams

Cisco 642-736 Exam -

Free 642-736 Sample Questions:

1. With the new Wired Guest Access feature support on the Cisco WLAN Controllers that uses Cisco Unified Wireless Software Release and later, IT managers can provide wired and wireless secured and controlled access to the Internet for guests on the same wireless LAN controller. Which TWO of the following descriptions about wired guest access support are true as of controller release v5.2?
A. It is not supported on the Cisco 2100 Series Controllers.
B. Layer 3 web authentication and passthrough are not supported.
C. No more than three wired guest access LANs can be configured on a controller.
D. The wired guest access ports must be in the same Layer 2 network as the foreign controller.
Answer: A, D

2. The Cisco Secure Services Client (SSC) is a software supplicant that helps you deploy a single authentication framework to access both wired and wireless networks. If we use Cisco SSC to configure a wireless LAN connection that uses EAP-FAST, which THREE of the following options can be used as the inner authentication method?
D. MSChapV2
Answer: A, C, D

3. In computer networking, the Dynamic Host Configuration Protocol (DHCP) is a network application protocol used by devices (DHCP clients) to obtain configuration information for operation in an Internet Protocol network. If we implement DHCP services on the anchor controller, which of the following IP address is locally populated in the primary DHCP server field?
A. DHCP relay IP address
B. next-hop router IP address
C. firewall DMZ interface IP address
D. management IP address of the controller
Answer: D

4. Which of the following function is performed by a rogue detector access point?
B. switch port tracing
C. rogue AP containment
D. identifying a rogue AP on the wired network
Answer: D

5. Cisco NAC uses the network infrastructure to enforce security policy compliance on all devices that seek to access network computing resources. Out-of-band deployments require user traffic to traverse through the NAC appliance only within authentication, posture assessment, and remediation. The Cisco WLC is added as what kind of device on the Cisco NAC Appliance Manager for wireless NAC OOB implementation?
A. RADIUS client
B. RADIUS server
C. SNMP trap receiver
D. OOB management device
Answer: D

6. The guest user account allows a login without a user account to access a database. If the Guest User check box is selected, what will happen once we add a new Local Net User on the controller?
A. Web authentication will be enabled on the guest account.
B. The amount of time the guest user has access to the local network will be limited.
C. The guest user traffic will be associated to the guest VLAN.
D. The controller will authenticate the guest account using the Cisco NAC Guest Server.
Answer: B

7. Drag and Drop question


8. Extensible Authentication Protocol, or EAP, is a universal authentication framework frequently used in wireless networks and Point-to-Point connections. When to use the local EAP authentication on the controller?
A. to authenticate the APs that act as 802.1X supplicants
B. as a backup in case the APs cannot reach the controllers
C. as a backup in case the RADIUS servers are not reachable
D. when deploying guest access using the anchor controller
Answer: C

9. We can use the anchor controller to deploy guest WLAN access. If we want to transport the guest data traffic between the foreign and anchor controllers, which of the following can be used?
A. UDP port 16666
B. UDP port 16667
C. IP protocol 97
D. UDP port 161
Answer: C

10. A wireless LAN (WLAN) is a wireless local area network that links two or more computers or devices using spread-spectrum or OFDM modulation technology based to enable communication between devices in a limited area. Which of the following aims at looking for anomalous behavior on a WLAN infrastructure?
A. identifying new attack tools
B. auditing employee's bandwidth usage
C. identifying attacks using signature matching
D. improving performance by load balancing
Answer: A

© 2014, All Rights Reserved