1.
What two modes can LWAPP operate in? (Choose two.)- a. Layer 2 LWAPP mode190 CCNA Wireless Official Exam Certification Guide
- b. Joint LWAPP mode
- c. Autonomous LWAPP mode
- d. Layer 3 LWAPP mode
Correct Answer(s)
A. Option1
D. Option4
Explanation
LWAPP can operate in two modes: Layer 2 LWAPP mode and Layer 3 LWAPP mode. Layer 2 LWAPP mode allows the LWAPP control messages to be encapsulated in Ethernet frames and forwarded over Layer 2 networks. Layer 3 LWAPP mode allows the LWAPP control messages to be encapsulated in IP packets and forwarded over Layer 3 networks. Both modes provide different options for deploying and managing LWAPP-enabled devices.
2.
When LWAPP communication between the access point and the wireless LAN con-troller happens in native, Layer 2 Ethernet frames, what is this known as?- a. EtherWAPP
- b. Hybrid mode
- c. Native mode LWAPP
- d. Layer 2 LWAPP mode
Correct Answer
D. Option 4
3.
What is the only requirement for Layer 3 LWAPP mode?- a. IP connectivity must be established between the access points and the WLC.
- b. You must know the IP addressing on the AP.
- c. Client devices must be in the same VLAN.
- d. Each device in the Layer 3 domain must be on the same subnet.
Correct Answer
A. Option 1
Explanation
IP connectivity must be established between the access points and the WLC.
4.
Which state is not a valid state of an AP that is discovering and joining a controller?- a. Discover
- b. Join
- c. Image Data
- d. Hybrid-REAP
Correct Answer
D. Option 4
Explanation
Option 4, "Hybrid-REAP," is not a valid state of an AP that is discovering and joining a controller. The other options, "Discover," "Join," and "Image Data," are all valid states in the process of an AP discovering and joining a controller. However, "Hybrid-REAP" is not a recognized state in this context.
5.
What is the first step in a Layer 3 LWAPP discovery?- a. Priming
- b. AP Join Request
- c. Subnet broadcast of Layer 3 LWAPP discovery message
- d. OATAP
Correct Answer
C. Option 3
Explanation
The first step in a Layer 3 LWAPP discovery is the subnet broadcast of Layer 3 LWAPP discovery message. This is the initial step where the LWAPP client broadcasts a Layer 3 LWAPP discovery message to all devices on the local subnet. This message is used to discover and join a LWAPP controller on the network.
6.
AP-Priming is used for which of the following?- a. Prime an AP prior to bootup with complex algorithms
- b. Deliver a list of controllers to the AP using a hunting process and discovery algo-
- rithm
- c. Perform basic setup of controller configurations delivered to the AP
- d. Provision an AP over the air
Correct Answer
B. Option2
Explanation
AP-Priming is used to deliver a list of controllers to the AP using a hunting process and discovery algorithm. This process helps the AP to establish a connection with the appropriate controller for further configuration and management. It enables the AP to discover and connect to the correct controller, ensuring efficient network operation.
7.
Which of the following is not contained in a join response message?- a. Type of controller
- b. Interfaces in the controller
- c. Number and type of radios
- d. AP name
Correct Answer
B. Option 2
Explanation
A join response message is used in a wireless network to provide information to a device that is attempting to join the network. It typically includes details such as the type of controller, the number and type of radios, and the AP name. However, the type of interfaces in the controller is not contained in a join response message. This information is typically provided separately or can be inferred from the type of controller and the number and type of radios.
8.
The join request message is sent to the primary controller only under what condition?- a. The controller is reachable.
- b. The AP has an IP address.
- c. The primary controller has low load.
- d. The AP is primed.
Correct Answer
D. Option 4
Explanation
The join request message is sent to the primary controller only when the AP is primed. This means that the AP has been configured with the necessary information to connect to the controller. Priming includes setting up the AP's IP address and other required parameters. The AP will only send the join request to the primary controller when it is properly primed and ready to establish a connection.
9.
If no primed information is available, what does the AP look for next when trying tojoin a controller?- a. A master controller
- b. A primer controller
- c. A new controller
- d. A new subnet
Correct Answer
A. Option 1
Explanation
When no primed information is available, the AP looks for a master controller next when trying to join a controller. A master controller is responsible for managing and controlling multiple APs in a network. So, if the AP cannot find any primed information, it will search for a master controller to establish a connection and join the network.
10.
When an AP retrieves its configuration file, where is it applied?- a. RAM
- b. ROM
- c. NVRAM
- d. Flash
Correct Answer
A. Option 1
Explanation
The correct answer is option 1, RAM. When an AP retrieves its configuration file, it is applied in RAM. RAM (Random Access Memory) is a volatile memory that stores data temporarily while the device is powered on. The configuration file contains settings and parameters that define the behavior of the AP, and applying it in RAM allows the AP to use these settings during its operation.
11.
How many backup controllers are in an N + 1 design?- a. 1
- b. 2
- c. 3
- d. 4
Correct Answer
A. Option 1
Explanation
In an N + 1 design, there is only one backup controller. This means that there are N primary controllers and one additional controller that serves as a backup in case any of the primary controllers fail. The backup controller is ready to take over the workload of any failed primary controller, ensuring the continuity and reliability of the system.
12.
Which method is considered the most redundant?- a. N + 1
- b. N + N
- c. N + N + 1
- d. N * N + 1
Correct Answer
C. Option 3
Explanation
Option 3 (N + N + 1) is considered the most redundant method because it adds N twice and then adds 1. This is unnecessary as adding N twice already accounts for the addition of 1. Therefore, the extra addition of 1 makes this method redundant.
13.
Which AP mode can you use for site surveys?- a. Local mode
- b. H-REAP mode
- c. Bridge mode
- d. Rogue Detection mode
Correct Answer
A. Option 1
Explanation
Local mode is the AP mode that can be used for site surveys. In local mode, the AP operates as a standalone device and is not dependent on a central controller. This mode allows for the AP to scan and analyze the wireless environment, providing valuable information for site surveys. H-REAP mode (Option 2) is a mode that allows the AP to function in a remote location while still being connected to a central controller. Bridge mode (Option 3) is used for connecting two networks together. Rogue Detection mode (Option 4) is used for detecting unauthorized or rogue access points in the network.
14.
In Monitor mode, which command can you use to change the value of the channelsmonitored?- a. config advanced channel-list
- b. config advanced 802.11b channel-list monitor
- c. config advanced 802.11b monitor channel-list
- d. config advanced monitor channel-list
Correct Answer
C. Option 3
15.
AP-Priming is used for which of the following?- a. Provision an AP over the air
- b. Prime an AP prior to bootup with complex algorithms
- c. Perform basic setup of controller configurations delivered to the AP
- d. Deliver a list of controllers to the AP using a hunting process and discovery algorithm
Correct Answer
D. Option 4
Explanation
AP-Priming is used to deliver a list of controllers to the AP using a hunting process and discovery algorithm. This process allows the AP to identify and connect to the appropriate controller for configuration and management. Option 4 accurately describes the purpose of AP-Priming, making it the correct answer.
16.
How does the code version on a controller - based access point compare to the controller that supports it?- a. The controller and the access point must always be at the same level of code.
- b. Code levels have no absolute requirement. If an AP is at a higher level of code than its controller, the AP may be limited to only performing tasks compatible with its supporting controllers version of code.
- c. The controller has to be at the same level of code or higher than any AP joined to it. Controller code is always backward compatible, with lower code revisions on access points.
- d. The controller code must be within two revisions of any supported AP, although it may be higher or lower than the code on the supported AP.
17.
Which interface on a controller does the access point communicate with when using Layer 2 LWAPP?- a. AP -Manager interface
- b. Service Port interface
- c. Virtual interface
- d. Management interface
Correct Answer
D. Option 4
Explanation
The access point communicates with the management interface on the controller when using Layer 2 LWAPP.
18.
Which of the following are characteristics of Layer 2 LWAPP? (Select all that apply)- a. All LWAPP traffic is sent IP address to IP address.
- b. Layer 2 LWAPP uses a proprietary Ethernet frame.
- c. All LWAPP traffic is sent MAC address to MAC address.
- d. The access point and controller must be in the same subnet.
- e. The access point and controller may be in different subnets.
- f. Layer 2 LWAPP uses UDP/IP.
Correct Answer(s)
B. Option2
C. Option3
D. Option4
Explanation
Layer 2 LWAPP uses a proprietary Ethernet frame, meaning that it does not use standard Ethernet frames. All LWAPP traffic is sent MAC address to MAC address, meaning that the traffic is addressed using the MAC addresses of the devices. The access point and controller must be in the same subnet, meaning that they need to have IP addresses within the same network. These characteristics are true for Layer 2 LWAPP.
19.
Which sniffer programs work with controller-based APs placed in Sniffer mode? (Choose all that apply.)- a. Wireless Sniffer
- b. Sniphere
- c. Wireshark
- d. AirMagnet
- e. Network Analyzer
- f. Omni-Peek
Correct Answer(s)
C. Option3
D. Option4
F. Option6
Explanation
Wireshark, AirMagnet, and Omni-Peek are all sniffer programs that can work with controller-based APs placed in Sniffer mode. These programs are designed to capture and analyze network traffic, making them suitable for monitoring and troubleshooting wireless networks. Wireless Sniffer, Sniphere, and Network Analyzer are not specifically mentioned as compatible with controller-based APs in Sniffer mode, so they are not the correct answers.