Adobe certification Adobe
Apple certification Apple
Avaya certification Avaya
Check Point certification Check Point
Cisco certification Cisco
Citrix certification Citrix
CIW certification CIW
CompTIA certification CompTIA
CWNP certification CWNP
EC-Council certification EC-Council
EMC certification EMC
Exin certification Exin
F5 certification F5
Fortinet certification Fortinet
GIAC certification GIAC
Hitachi certification Hitachi
HP certification HP
IBM certification IBM
Isaca certification Isaca
ISC certification ISC
ISEB certification ISEB
Juniper certification Juniper
LPI certification LPI
Microsoft certification Microsoft
Oracle certification Oracle
PMI certification PMI
Riverbed certification Riverbed
SAP certification SAP
Sun certification Sun
Sybase certification Sybase
Symantec certification Symantec
VMware certification VMware
All Exams

Cisco 350-050 Exam -

Free 350-050 Sample Questions:

Q: 1 Tom works as a network administrator for a company. He is asked to manually configure the Tx power on an 802.11b access point to a power level of 1 (100 mW) after implementing a Cisco 7921G wireless IP phone within a Cisco Unified Wireless Network. Which problem is the user likely to experience when the phone associates to the AP?
A. one-way audio
B. loss of connectivity to Cisco Unified Communications Manager
C. audio delay or jitter or both
D. the phone displays a "network busy" status message
Answer: A

Q: 2 Which two statements correctly describe RTS/CTS? (Choose two.)
A. When the transmitted packet is equal to or larger than the RTS threshold, an RTS packet is sent. The destination node must respond with a CTS packet before the originator can send the real data packet.
B. Since the introduction of EDCA (WMM and 802.11e), the RTS/CTS sequence has been rendered
C. 802.11d replaced the RTS/CTS sequence with CTS to Self.
D. The RTS and CTS are small and, if lost in a collision, they can be retried more quickly and with less overhead than if the whole packet must be retried.
Answer: A, D

Q: 3 The following message can be seen on a Cisco WCS:
AP 'floor-1-lobby', interface '802.11b/g' on Controller ''. Noise threshold violated.
There is also a correlation between the occurrence of the message and user complaints. Which action should you take?
A. Check the logs for rogues in the area, then turn on rogue mitigation.
B. Seek out the source of the noise with a spectrum analyzer.
C. Manually increase the power of the AP to overcome the interference.
D. Increase the interference threshold from the default 10%.
Answer: B

Q: 4 Which three options are true when an H-REAP AP is in the "authentication down/local switching" state for a given WLAN? (Choose three.)
A. New WebAuth sessions are permitted.
B. The AP continues to send beacon probes and responses to keep current clients connected.
C. 802.11 roaming events incur a full 802.1X re-authentication.
D. Any new clients trying to authenticate are rejected.
Answer: B, C, D

Q: 5 It is suggested that you prime or stage your lightweight access points in a convenient location, rather that after they have been installed in locations that may be difficult to reach.
Which three items can be configured by using the controller CLI, controller GUI, or Cisco WCS while priming a lightweight AP prior to deployment? (Choose three.)
A. to configure the lightweight access point with primary, secondary, and tertiary controller names
B. to configure the Controller Mobility Group name, if the lightweight access point is in a Controller Mobility Group
C. to configure the access-point-specific LED blink sequence
D. to configure the access-point-specific 802.11a, 802.11b, and 802.11g network settings
Answer: A, B, D

Q: 6 How to describe the radiation pattern of patch and Yagi antennas when viewed from the side (H-plane)?
A. the patch patterns are egg-shaped, the Yagi patterns are conical
B. the patch patterns are doughnut-shaped, the Yagi patterns are conical
C. the patch patterns are conical, the Yagi patterns are doughnut-shaped
D. the patch patterns are conical, the Yagi patterns are egg-shaped
Answer: A

Q: 7 Which description concerning wireless voice traffic is correct?
A. Voice traffic is more latency-sensitive.
B. Wireless voice traffic must be on a dedicated channel apart from wireless data.
C. Wireless voice devices cannot share APs with wireless data NIC cards.
D. 1Mb/s and 2Mb/s data rates are required for the phones, but not for the wireless data traffic.
Answer: A

Q: 8 Observe the following statements, which limitation applies to the use of the Cisco WLAN Solution Management over Wireless feature?
A. Read-write access is not available; only read-only access is supported.
B. Controllers must be managed using only secure protocols (that is, SSH and HTTPS), not nonsecure protocols (that is, HTTP and Telnet).
C. Uploads and downloads from the controller are not allowed.
D. Wireless clients can manage other controllers however not the same controller and AP to which the client is associated.
Answer: C

Q: 9 Observe the following options carefully, which functionality, as defined by IEEE 802.11e, does WWM certify as part of the tests for QoS done by the WiFi Alliance?
C. Direct Link Setup
Answer: A

Q: 10 Lightweight Access Point Protocol or LWAPP is the name of a protocol that can control multiple Wi-Fi wireless access points at once. How does the Cisco WCS know what has happened in an LWAPP system when an AP's interface goes down and then comes up again?
A. The Cisco WCS polls the APs and when the AP is unreachable, reports "Max retransmissions reached on AP <name>".
B. The AP sends a linkDown then linkUp trap to the Cisco WCS; these are two of the six traps defined in RFC 1215, A Convention for Defining Traps for use with the SNMP.
C. The AP cannot send a linkDown trap, as per RFC 1215, because the link is down; when the link comes back up, the AP sends a linkup trap to the Cisco WLC, which then forwards the trap to the Cisco WCS.
D. The Cisco WLC sends a trap to the Cisco WCS when it detects that an AP is down.
Answer: D

Q: 11 You work as a network engineer .If the WLAN interfaces configured on the different controllers are on different IP subnets (Layer 3 inter-controller roaming), can you telle me what will happen when a client roams from one controller (controller A) to a new controller (controller B)?
A. Controller A will mark the client's entry in its client database as an anchor, controller B will not update its client database because of the anchored entry in controller A, and all ingress and egress traffic will flow through controller A.
B. Controller A will mark the client with an anchor entry in its client database, the database, and the database entry will be copied to controller B and marked with a foreign entry.
C. Controller A will mark the client's entry in its client database as foreign, controller B will update its client database, all ingress traffic will flow through controller A, and egress traffic will flow through controller B when symmetric tunneling is disabled.
D. Controller B will update its client database and all client ingress and egress traffic will transition to the new controller.
Answer: B

Q: 12 You work as a network technician at, read this subject carefully ,then answer the question. The existing Cisco Unified Wireless Controller is running v5.0 code for both the controllers and the Cisco WCS. A controller has been configured with an appropriate rogue rule condition to report discovered APs to the Cisco WCS. What default alarm level is used to display all rogue APs in the Alarm Summary?
A. Major
B. Critical
C. Flash
D. Minor
Answer: D

Q: 13 802.11i is a forthcoming specification that will clear up a number of security problems in 802.11. For the following items, which 802.11i key can provide data origin authenticity during the four-way handshake and the group key handshake messages?
A. Key Caching Key
B. Key Encryption Key
C. Groupwise Master Key
D. Key Confirmation Key
Answer: D

Q: 14 For the following commands, which one can determine the health of a RADIUS server on an autonomous AP?
A. show radius statistics
B. debug radius-server
C. show radius table {server_ip}
D. show radius-server {server_ip}
Answer: A

Q: 15 In order to be able to communicate with the WDS master, what must be configured on the APs while setting up a WLAN for Wireless Domain Services?
A. username and password valid on the AAA server
B. multicast group for the WDS
C. IP address of the master WDS and any backup master WDS
D. pre-shared key which matches that of the master WDS
Answer: A

Q: 16 Cisco Client Management Frame Protection is running on a mobility group with two controllers. For the following options ,which two MFP requirements protect the network? (Choose two.)
A. requires the use of a nonbroadcast SSID
B. requires CCXv5
C. implements the validation of wireless management frames
D. forces clients to authenticate, using a secure EAP method only
Answer: B, C

Q: 17 Refer to the following options, which two are long-term solutions to hidden node problems? (Choose two.)
A. enable CTS to Self
B. change the RF situation by increasing the power on client work stations (None-AP-STA)
C. increase the radio speed to at least 24 Mb/s
D. change the RF situation by adding additional access points
Answer: B, D

Q: 18 A user complains about problems authenticating via wireless. Which two of the Cisco WLC debug commands below would solve this problem? (Choose two.)
A. debug mac { addr MAC}
B. debug client authentication enable
C. debug dot1x events enable
D. debug client events enable
Answer: A, C

Q: 19 Can you tell me what the LWAPP data and control port numbers are?
A. TCP 16666 and 16667
B. UDP 16666 and 16667
C. TCP 12124 and 12134
D. UDP 12222 and 12223
Answer: D

Q: 20 The central office is currently using a combination of 4400 and 2100 series WLAN controllers running v4.2 and a variety of LWAPP-enabled access points servicing both 2.4 GHz and 5 GHz. The WLAN deployment has been extended to each remote office by implementing a 526 WLAN controller running v4.1 and several 521 access points. Wireless client deployment uses EAP-TLS authentication by use of a centralized RADIUS server plus 802.11n for performance. After the first remote office deployment, remote office users complain that they are not connecting via 802.11n.
Which will most likely cause this problem?
A. The 521 AP does not support 5 GHz, which prohibits 802.11n.
B. The 521 AP and 526 WLAN controllers do not support AES, which prohibits 802.11n.
C. The 526 WLAN controller does not support external authentication via RADIUS, prohibiting authentication.
D. The 526 WLAN controller does not support 802.11n with either v4.1 or v4.2.
Answer: D

Q: 21 A VoWLAN user reports bad voice quality. Which three items most likely cause this problem? (Choose three.)
A. round trip delay is greater than 150 ms
B. packet loss is greater than 1%
C. jitter is greater than 30 ms
D. one-way delay is greater than 150 ms
Answer: B, C, D

Q: 22 Which is the objective of a radome?
A. to reduce the mechanical load from wind
B. to indicate which way the antenna is pointing
C. to increase the gain of an antenna
D. to mitigate interference
Answer: A

Q: 23 Do you know at what distance the curve of the earth factors into the antenna elevation calculation?
A. greater than 6 miles (~10 km)
B. 60% of the Fresnel zone
C. greater than 26 miles (~42 km)
D. the width of the Fresnel zone, which varies depending on the distance by which the bridges are separated
Answer: A

Q: 24 How do the characteristics that are available on the Cisco WCS for Linux version differ from those of the Cisco WCS for Windows version?
A. Cisco WCS for Linux is required for deployments.
B. Assuming that there are no differences in hardware, a Cisco WCS for Linux can support up to 750 wireless LAN controllers. A Cisco WCS for Windows can support up to 250 wireless LAN controllers.
C. Cisco WCS for Windows includes support for Cisco Spectrum Expert clients. Cisco WCS for Linux does not support Cisco Spectrum Expert clients.
D. There are no differences in features between the Linux and Windows versions of Cisco WCS.
Answer: D

Q: 25 In the AP Layer 3 controller discovery process, after the LWAPP Discovery Request is broadcast on a local subnet, which action will AP take next?
A. Send an LWAPP response to the master controller if known.
B. Send an LWAPP discovery request to controllers learned via OTAP if operational.
C. Wait 5 seconds and resend a Discovery Request to the local subnet.
D. Determine whether the controller responses are the primary controller.
Answer: B

Q: 26 Which two actions will happen when a wireless client deploys a Layer 2 roam between two WLCs with management IP addresses on different IP subnets but dynamic interfaces in the same VLAN? (Choose two.)
A. The new WLC exchanges mobility messages with the original WLC and the client database entry is moved to the new WLC.
B. The client database entry is maintained on both the original and new WLCs.
C. The original WLC marks the client with an "Anchor" entry in its own client database.
D. The client database entry is removed from the original WLC once it has been entered into the new WLC.
Answer: A, D

Q: 27 What is the reason that using a tool like Cisco Spectrum Expert is important?
A. It maps the RF area to a floor plan.
B. It allows you to detect multipath.
C. It allows you to see the radiating environment at Layer 1.
D. It decodes WLAN IPS attacks
Answer: C