1.
Which service component in the wireless operate phase helps isolate and resolve an incident?
2.
On a Cisco Aironet 1240AG Series standalone access point, the radio LED is dark blue and blinking, but the status LED and Ethernet LED are both off. What does this indicate?
3.
You are charged with implementing a secure wireless installation which will provide Internet access to client devices but will not allow communications between wireless clients. In addition to implementing PSPF or peer-
to-peer blocking on the wireless side, which of the following actions should you perform on the wired infrastructure?

 
4.
A mobility group is created by a Cisco WLCM and 4402 Series Wireless LAN Controller. A client that is anchored on the Cisco WLCM roams to an access point on the 4402 controller. You then run a debug
command on the 4402 controller.
Which message would best describe the establishment of the tunnel from the foreign controller's perspective?
5.
In order for a controller-based access point to be allowed to participate in aggressive load balancing, it must have heard the client within how many seconds?
6.
Which command will enable DHCP debugging on a WLAN controller?
7.
Choose the service component in the optimize phase which assesses the WLAN system and drives continuous improvements by recommending remediation measures including device configuration optimization, capacity planning, traffic analysis, security assessment, and quality issue resolution.
8.
In the operate phase, providing and maintaining reliable, current information about the WLAN system hardware, software, and applications pertinent to the system's individual components and attributes is part of
which service component?
9.
The IOS of a North American Cisco Aironet 1130AG Series standalone access point has become corrupt. You must therefore reload the TFTP firmware. Before you press and hold the MODE button, you should verify that the file name is which of the following?
10.
Which of the following statements explains why it is normally best to have more than one controller-based access point participate in the containment of one rogue access point?