We provide real ccna wireless 200 355 pdf exam questions and answers braindumps in two formats. Download PDF & Practice Tests. Pass Cisco 200 355 vce Exam quickly & easily. The 200 355 dumps PDF type is available for reading and printing. You can print more and practice many times. With the help of our Cisco 200 355 vce dumps pdf and vce product and material, you can easily pass the ccna wireless 200 355 dumps exam.


2026 New 200-355 Exam Dumps with PDF and VCE Free: https://www.2passeasy.com/dumps/200-355/

Q1. Which statement describes a security weakness of a WPA2 with a PSK? 

A. The compromised key can be used for another connection. 

B. The key can be eavesdropped from the wireless medium. 

C. The key can be recreated from a few eavesdropped frames. 

D. The key is not case-sensitive and is vulnerable to compromise by brute-force methods. 

Answer:

Q2. When the pre-shared key authentication method is used for WPA or WPA2, for which two functions is the pre-shared key used? (Choose two.) 

A. to act as the Group Transient Key during the bidirectional handshake 

B. to act as the Pairwise Master Key during the bidirectional handshake 

C. to derive the nonce at each side of the exchange 

D. to derive the Pairwise Transient Key 

Answer: B,D 

Q3. Which portion of a WLAN deployment can WLC message logs help to troubleshoot? 

A. RF issues 

B. encryption issues between APs and clients 

C. configuration verification issues 

D. infrastructure and client Issues 

E. AP placement issues 

Answer:

Q4. An engineer is using WCS' client troubleshooting tool to investigate issues with a client 

device. What is the longest log capture they will be able to take? 

A. 2 minutes 

B. 5 minutes 

C. 10 minutes 

D. 30 minutes 

Answer:

Q5. What is a risk when initiating the containment of a rogue AP? 

A. disassociating clients of valid access points that are operated by a neighboring organization 

B. disrupting transmission of neighboring AP clients 

C. breaking the radio of the containing AP 

D. breaking the rogue client radio or its firmware 

Answer:

Q6. A controller is connected to a Cisco Catalyst switch. The switch port configuration looks like this: 

interface GigabitEthernet 1/0/10 

switchport 

switchport trunk encapsulation dot1q 

switchport trunk allowed vlan 1,20,30,50 

switchport trunk native vlan 20 

switchport mode trunk 

Which controller CLI command assigns its management interface to the native VLAN interface of the Cisco Catalyst switch? 

A. config interface vlan management 0 

B. config interface vlan management 1 

C. config interface vlan management 20 

D. config interface vlan management 30 

E. config interface vlan management 50 

Answer:

Q7. When using a Cisco WLC version 7.0 with a default configuration, how is a remote management HTTPS access connection secured? 

A. The Cisco WLC uses a pre-shared key to authenticate the user, which limits the number of potential users that can access the controller. 

B. The Cisco WLC generates its own local web administration SSL certificate and automatically applies it to the GUI. 

C. The Cisco WLC uses a CA certificate for SSL access. 

D. The Cisco WLC uses HTTPS to secure the HTTP session via a preconfigured password that generates a certificate for each session. 

Answer:

Q8. A Cisco Aironet 1260 AP is unable to join a Cisco 2500 Series WLC that is connected through a Layer 2 switch. 

Which three options help to verify the wireless network operation and locate a possible issue? (Choose three.) 

A. Verify status of GUI Wireless > Country 

B. Verify status of GUI Wireless > Timers 

C. Verify status of GUI WLANs > ID > Advanced 

D. CLI debug of dot11 

E. CLI debug of DHCP 

F. Verify Cisco WLC license 

G. Verify Cisco WLC model 

Answer: A,E,F 

Q9. Access points must discover a wireless LAN controller before they can become an active part of the network. In which order does an access point try to discover a controller? 

A. Layer 3 CAPWAP or LWAPP broadcast discovery DHCP option 43 Locally stored controller IP address discovery DNS controller name resolution 

B. Layer 3 CAPWAP or LWAPP broadcast discovery Locally stored controller IP address discovery DNS controller name resolution DHCP option 43 

C. Layer 3 CAPWAP or LWAPP broadcast discovery Locally stored controller IP address discovery DHCP option 43 DNS controller name resolution 

D. DNS controller name resolution DHCP option 43 Layer 3 CAPWAP or LWAPP broadcast discovery Locally stored controller IP address discovery 

Answer:

Q10. When using the CLI command eping, configured for auto-anchor mobility wireless guest access, which type of packet is tested? 

A. data packets 

B. mobility unencrypted packets 

C. mobility encrypted packets 

D. SNMP control packets 

E. NTP control packets 

Answer: