Topic 1: Exam Pool A
Which measurement is used from a post wireless survey to depict the cell edge of the access points?
A.
SNR
B.
Noise
C.
RSSI
D.
CCI
SNR
Explanation: Coverage defines the ability of wireless clients to connect to a wireless AP with a signal strength and quality high enough to overcome the effects of RF interference. The edge of the coverage for an AP is based on the signal strength and SNR measured as the client device moves away from the AP.
The signal strength required for good coverage varies dependent on the specific type of client devices and applications on the network.
To accommodate the requirement to support wireless Voice over IP (VoIP), refer to the RF guidelines specified in the Cisco 7925G Wireless IP Phone Deployment Guide. The minimum recommended wireless signal strength for voice applications is -67 dBm and the minimum SNR is 25 dB.
The first step in the analysis of a post site survey is to verify the ‘Signal Coverage’. The signal coverage is measured in dBm. You can adjust the color-coded signal gauge to your minimum-allowed signal level to view areas where there are sufficient and insufficient coverage. The example in Figure 8 shows blue, green, and yellow areas in the map have signal coverage at -67 dBm or better. The areas in grey on the coverage maps have deficient coverage. Source from Cisco:
https://www.cisco.com/c/en/us/td/docs/wireless/technology/vowlan/troubleshooting/vowlan_troubleshoot/8_Site_Survey_RF_Design_Valid.html
How is Layer 3 roaming accomplished in a unified wireless deployment?
A.
An EoIP tunnel is created between the client and the anchor controller to provide seamless connectivity as the client is associated with the new AP.
B.
The client entry on the original controller is passed to the database on the new controller.
C.
The new controller assigns an IP address from the new subnet to the client
D.
The client database on the original controller is updated the anchor entry, and the new controller database is updated with the foreign entry.
The client database on the original controller is updated the anchor entry, and the new controller database is updated with the foreign entry.
Which features does Cisco EDR use to provide threat detection and response protection?
A.
containment, threat intelligence, and machine learning
B.
firewalling and intrusion prevention
C.
container-based agents
D.
cloud analysis and endpoint firewall controls
firewalling and intrusion prevention
An engineer runs the code against an API of Cisco DMA Center, and the platform returns this output What does the response indicate?
A.
The authentication credentials are incorrect
B.
The URl string is incorrect
C.
The Cisco DNA Center API port is incorrect
D.
The HTTP method is incorrect
The HTTP method is incorrect
Explanation: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status
What is a consideration when designing a Cisco SD-Access underlay network?
A.
End user subnets and endpoints are part of the underlay network.
B.
The underlay switches provide endpoint physical connectivity for users.
C.
Static routing is a requirement,
D.
It must support IPv4 and IPv6 underlay networks
The underlay switches provide endpoint physical connectivity for users.
Explanation: https://www.cisco.com/c/en/us/td/docs/solutions/CVD/Campus/cisco-sdadesign-guide.html#Underlay
Page 35 out of 168 Pages |
Previous |