100% Real Cisco CCNA Wireless 200-355 Exam Questions & Answers, Accurate & Verified By IT Experts
Instant Download, Free Fast Updates, 99.6% Pass Rate
Archived VCE files
File | Votes | Size | Date |
---|---|---|---|
File Cisco.ActualTests.200-355.v2016-01-19.by.Henno.52q.vce |
Votes 114 |
Size 1.11 MB |
Date Jan 19, 2016 |
Cisco CCNA Wireless 200-355 Practice Test Questions, Exam Dumps
Cisco 200-355 (CCNA Wireless Implementing Cisco Wireless Network Fundamentals) exam dumps vce, practice test questions, study guide & video training course to study and pass quickly and easily. Cisco 200-355 CCNA Wireless Implementing Cisco Wireless Network Fundamentals exam dumps & practice test questions and answers. You need avanset vce exam simulator in order to study the Cisco CCNA Wireless 200-355 certification exam dumps & Cisco CCNA Wireless 200-355 practice test questions in vce format.
The Cisco 200-355 exam, officially known as Implementing Cisco Wireless Network Fundamentals (WIFUND), was the cornerstone for achieving the CCNA Wireless certification. This certification validated an engineer's skills in the configuration, implementation, and support of Cisco wireless LANs. It was designed for network professionals who were responsible for the day-to-day management of a wireless infrastructure. The curriculum covered a broad range of foundational topics, ensuring that candidates had a solid grasp of how wireless networks operate before moving on to more complex professional-level concepts. The 200-355 Exam served as a critical benchmark for competence in the wireless networking field.
Passing the 200-355 Exam demonstrated a candidate's ability to handle essential tasks related to Cisco wireless networking. This included understanding RF fundamentals, managing client connectivity, securing the wireless network, and working with different Cisco wireless architectures. The exam questions were structured to test both theoretical knowledge and practical application, often presenting scenarios that a network administrator would encounter in a real-world environment. While this specific exam code has been retired as part of Cisco's certification program evolution, the fundamental knowledge it represents remains highly relevant and forms the basis for current wireless certifications.
The target audience for the 200-355 Exam was broad, encompassing roles such as network administrators, wireless support specialists, and project managers involved in wireless deployments. It was an entry point into a specialized career track, providing the necessary credentials to prove proficiency. The exam assumed a basic understanding of wired networking concepts, equivalent to a CCENT or CCNA Routing and Switching certification, as wireless networks are intrinsically linked to the underlying wired infrastructure. Understanding these foundational principles was the first major step in preparing for the challenging but rewarding journey of the 200-355 Exam.
In today's digitally connected world, wireless networking is no longer a luxury but a fundamental utility for businesses of all sizes. This ubiquity has created a significant demand for skilled professionals who can design, deploy, and manage robust and secure wireless networks. Certifications like the one associated with the 200-355 Exam serve as a formal validation of these critical skills. They provide employers with confidence that a candidate possesses a standardized level of knowledge and can effectively contribute to their organization's IT infrastructure from day one. This formal recognition is a powerful tool for career advancement.
Pursuing a wireless certification requires dedication and a structured approach to learning. The curriculum for the 200-355 Exam covered the essential building blocks of Wi-Fi technology, from the physics of radio waves to the intricacies of security protocols. This comprehensive knowledge is indispensable for troubleshooting common wireless issues, optimizing network performance, and planning for future growth. A certified professional is better equipped to make informed decisions that align with business requirements, ensuring that the wireless network is an enabler of productivity rather than a source of frustration for users and a burden for the IT department.
Beyond the technical skills, achieving a certification signals a commitment to professional development. It shows a willingness to learn and adapt to the rapidly evolving landscape of technology. The principles tested in the 200-355 Exam, such as understanding different wireless architectures and security frameworks, are timeless. Even as standards and products evolve, the core concepts remain the same. This foundational knowledge allows certified individuals to quickly grasp new technologies and adapt their skills, ensuring their long-term value and relevance in the competitive IT job market. This makes the effort of studying for such an exam a worthwhile investment.
At the heart of any wireless network lies the science of radio frequency, or RF. A deep understanding of RF fundamentals was a non-negotiable prerequisite for success on the 200-355 Exam. RF energy is a form of electromagnetic radiation used to transmit information wirelessly through the air. This energy is characterized by several key properties, including wavelength, frequency, and amplitude. Frequency, measured in Hertz (Hz), represents the number of cycles a wave completes per second. In Wi-Fi, we primarily operate in the 2.4 GHz and 5 GHz frequency bands, which are further divided into smaller segments called channels.
Amplitude refers to the strength or power of the RF signal. A higher amplitude means a stronger signal, which can travel farther and better overcome obstacles. This power is typically measured in milliwatts (mW) or decibels relative to a milliwatt (dBm), a logarithmic scale that makes it easier to work with the vast range of power levels encountered in wireless networking. Understanding how to interpret and manage signal strength is crucial for designing a network with adequate coverage. The 200-355 Exam required candidates to be comfortable with these units of measurement and their practical implications for network performance.
Bandwidth, another critical concept, refers to the capacity of a communication channel. In the context of RF, it is the range of frequencies that a channel occupies. A wider channel can carry more data, resulting in higher potential speeds. For example, 802.11n and later standards introduced the ability to bond multiple 20 MHz channels together to create 40 MHz, 80 MHz, or even 160 MHz wide channels, significantly boosting throughput. However, using wider channels also means there are fewer non-overlapping channels available, which can increase the potential for interference, a key trade-off that network designers must manage.
Radio frequency signals do not simply travel in a straight line from a transmitter to a receiver without being affected by their environment. As they propagate through the air, they interact with objects in their path, leading to various phenomena that every wireless engineer must understand. The 200-355 Exam placed significant emphasis on these RF behaviors. Reflection occurs when a signal bounces off a smooth surface that is large relative to the signal's wavelength, such as a metal wall or a window. This can create multipath, where the receiver gets multiple copies of the same signal at slightly different times.
Refraction is the bending of an RF signal as it passes through a medium with a different density, such as moving from the air through glass or water. This can change the direction of the signal's travel. Diffraction, on the other hand, occurs when the signal path is obstructed by an object with a sharp edge. The signal bends around the object, which can allow it to reach areas that are not in the direct line of sight of the transmitter. This is why you can sometimes get a signal even when you are behind a large pillar or wall.
Scattering happens when the signal encounters an object that is small relative to its wavelength or has a rough surface. The signal is dispersed in multiple directions, which can weaken its strength at the intended receiver. Finally, absorption occurs when the signal passes through a material that absorbs its energy, converting it into heat. Materials like concrete, brick, and even water (in the human body) are highly absorbent and can significantly weaken or block a Wi-Fi signal. This phenomenon is also known as attenuation. All these behaviors collectively impact the coverage and performance of a wireless network.
Antennas are fundamental components of any wireless system, acting as the bridge between the guided electrical signals in a device and the unguided electromagnetic waves propagating through the air. For the 200-355 Exam, a thorough understanding of antenna types and characteristics was essential. Antennas do not create RF energy; they simply focus it. This ability to focus energy in a particular direction is known as gain, which is measured in decibels isotropic (dBi). An isotropic antenna, which is a theoretical concept, radiates power equally in all directions, like a perfect sphere.
In the real world, antennas are broadly categorized into two types: omnidirectional and directional. Omnidirectional antennas radiate signals in a 360-degree horizontal pattern, similar to a donut shape. They are ideal for providing general coverage in an open area, such as a conference room or an open-plan office, where clients may be located in any direction from the access point. Most consumer-grade routers and enterprise access points come with omnidirectional antennas. Their gain is typically lower compared to directional antennas because their energy is spread out over a wider area.
Directional antennas, by contrast, concentrate the RF energy in a specific, narrow direction. This results in a much higher gain and allows signals to travel longer distances in that intended direction. Yagi, patch, and parabolic grid antennas are common examples. They are used for point-to-point or point-to-multipoint links, such as connecting two buildings or providing coverage down a long hallway. Understanding when to use each type of antenna and how their radiation patterns, known as beamwidth, affect coverage was a key competency tested by the 200-355 Exam. Polarization, the orientation of the electric field, is another important characteristic that must be matched between transmitting and receiving antennas for optimal performance.
Modern Wi-Fi systems need a way to operate reliably in a noisy and crowded RF environment. This is achieved through spread spectrum technologies, which spread the signal across a wider frequency band than is minimally required to transmit the information. This technique makes the signal more resilient to interference and jamming. The 200-355 Exam required knowledge of the primary methods used in 802.11 networks. The earliest method was Frequency Hopping Spread Spectrum (FHSS), where the transmitter and receiver would rapidly change, or "hop," between different frequencies in a predetermined, pseudo-random sequence. This made it difficult for interference on a single frequency to disrupt the entire communication.
A more advanced technique, and one that became dominant in early Wi-Fi standards like 802.11b, is Direct Sequence Spread Spectrum (DSSS). In DSSS, each bit of data is converted into a longer, redundant pattern of bits called a chipping code. This spreads the signal across a fixed, wide channel (22 MHz in the 2.4 GHz band). The receiver, knowing the chipping code, can then recover the original data even if some of the transmitted signal is corrupted by interference. This redundancy is what provides the processing gain and resilience of the system.
The most prevalent technology in modern Wi-Fi (802.11a/g/n/ac/ax) is Orthogonal Frequency Division Multiplexing (OFDM). OFDM is a sophisticated technique that divides a single high-speed data stream into multiple lower-speed sub-streams. Each of these sub-streams is then transmitted on a separate, closely spaced subcarrier frequency within the main channel. These subcarriers are orthogonal, meaning they do not interfere with each other. This approach makes the system highly efficient and robust against multipath interference, which was a major challenge for earlier technologies. Understanding the fundamental differences between FHSS, DSSS, and OFDM was crucial for the 200-355 Exam.
The world of Wi-Fi is governed by a set of standards and regulations to ensure interoperability between devices from different manufacturers and to manage the use of the unlicensed radio spectrum. The Institute of Electrical and Electronics Engineers (IEEE) is responsible for creating the 802.11 family of standards that define the physical layer (PHY) and media access control (MAC) layer protocols for wireless local area networks. The 200-355 Exam required candidates to be familiar with the key amendments, such as 802.11a, 802.11b, 802.11g, 802.11n, and 802.11ac, including their respective frequency bands, data rates, and modulation techniques.
For example, 802.11b operated in the 2.4 GHz band and offered a maximum data rate of 11 Mbps. Following this, 802.11a was introduced in the cleaner 5 GHz band with rates up to 54 Mbps using OFDM. The popular 802.11g standard brought those OFDM speeds back to the 2.4 GHz band, providing backward compatibility with 802.11b devices. The 802.11n amendment was a major leap forward, introducing MIMO (Multiple Input, Multiple Output) technology, which uses multiple antennas to transmit and receive multiple data streams simultaneously, dramatically increasing throughput. 802.11ac further enhanced this, operating exclusively in the 5 GHz band with even wider channels and more complex modulation.
While the IEEE sets the technical standards, regional regulatory bodies govern how the radio spectrum can actually be used. In the United States, this is the Federal Communications Commission (FCC). In Europe, it is the European Telecommunications Standards Institute (ETSI). These organizations set rules for things like maximum transmission power, which frequency channels are available for use, and requirements for dynamic frequency selection (DFS) to avoid interfering with radar systems in the 5 GHz band. A global wireless deployment requires an understanding of these different regional rules, a topic that was an important part of the 200-355 Exam curriculum.
Cisco offers a diverse portfolio of wireless solutions, each with a distinct architecture designed to meet different business needs, from small offices to large-scale enterprise campuses. A core component of the 200-355 Exam was understanding these different architectures and knowing when to deploy each one. The most basic architecture is the Autonomous AP model. In this setup, each Access Point (AP) is a self-contained, independent device with its own configuration and intelligence. It is managed individually, typically through a command-line interface (CLI) or a graphical user interface (GUI). This model is simple and suitable for very small deployments.
As networks grow, managing dozens or hundreds of autonomous APs individually becomes impractical. To solve this, Cisco developed the centralized or Unified architecture. This model introduces a Wireless LAN Controller (WLC), a central appliance that manages all lightweight APs on the network. The WLC acts as the brain of the operation, handling tasks like configuration, client authentication, roaming, and radio frequency management. The APs, often called Lightweight Access Points (LAPs), become simple devices that tunnel all client traffic back to the controller for processing. This creates a highly scalable and manageable system, which is the standard for most enterprise deployments.
A third prominent architecture is Cisco Meraki's cloud-based solution. In this model, both the access points and the management plane reside in the cloud. Administrators configure and monitor their entire wireless network through a web-based dashboard, eliminating the need for an on-premises controller appliance. This simplifies deployment and management, making it an attractive option for organizations with limited IT staff or distributed locations. The 200-355 Exam required candidates to differentiate between these architectures, understanding the flow of management and data traffic in each, and the protocols, such as CAPWAP, that enable them.
The autonomous AP architecture represents the original model for deploying enterprise wireless networks. Each AP operates as a standalone device, handling all functions required for a wireless LAN, including beaconing, client authentication, and bridging traffic to the wired network. Configuration is performed on a per-AP basis. An administrator would typically connect to each AP's web interface or CLI to configure SSIDs, security settings, VLANs, and radio parameters. While straightforward for a handful of devices, this approach lacks centralized control and visibility, making it difficult to scale and maintain consistency across a larger network.
Despite the dominance of controller-based solutions, autonomous APs still have specific use cases where they are a viable option. They are often found in small businesses, remote offices with just one or two APs, or in specialized environments like industrial settings where a rugged, self-sufficient device is required. For the 200-355 Exam, it was important to know how to perform a basic configuration of an autonomous AP, including setting up an SSID with WPA2-Personal security and assigning it to a specific VLAN interface to segment wireless traffic from the wired network.
The major limitation of the autonomous model is the lack of seamless roaming and centralized RF management. When a client device moves from the coverage area of one AP to another, the roaming process is entirely client-driven and can be disruptive, especially for real-time applications like voice or video. Furthermore, there is no central intelligence to coordinate channel and power settings between adjacent APs, which can lead to co-channel interference and suboptimal performance. This is why the centralized WLC architecture became the preferred choice for enterprise deployments, solving these inherent challenges of the autonomous model.
The centralized Wireless LAN Controller (WLC) architecture revolutionized the way enterprise Wi-Fi networks are managed. This model is based on a concept known as a split-MAC architecture. In this design, the functions of an 802.11 access point are divided between the lightweight AP and the central WLC. The AP handles the real-time, time-sensitive functions, such as sending beacons and probes and acknowledging received data frames. All other management and policy-related functions, such as client authentication, security policy enforcement, and roaming management, are handled centrally by the WLC. This division of labor is a key concept for the 200-355 Exam.
Communication between the lightweight APs and the WLC is facilitated by the Control and Provisioning of Wireless Access Points (CAPWAP) protocol. CAPWAP creates a secure tunnel between the AP and the controller. There are two primary components to this tunnel: a control tunnel and a data tunnel. The CAPWAP control tunnel is used for all management traffic, such as pushing configurations from the WLC to the APs and sending status updates from the APs back to the WLC. By default, client data traffic is also sent through the CAPWAP data tunnel from the AP to the WLC before being placed onto the wired network.
The benefits of this centralized approach are immense. It provides a single point of configuration and management for the entire wireless network. An administrator can create a new WLAN or change a security policy on the WLC, and that change is instantly pushed out to all associated APs. The WLC also has a global view of the entire RF environment, allowing it to dynamically optimize channel and power settings across the network to minimize interference and maximize performance through features like Radio Resource Management (RRM). This scalability and intelligence are what make the WLC-based architecture the standard for enterprise wireless.
Lightweight Access Points managed by a WLC can operate in several different modes, each serving a specific purpose. Understanding these modes was a critical objective of the 200-355 Exam. The most common mode is Local mode. In this default mode, the AP actively serves clients by transmitting on one or more configured WLANs. In addition to serving clients, the AP also scans other channels periodically (during off-channel scanning) to monitor for rogue devices, measure noise, and gather information for the RRM algorithms. This is the workhorse mode for providing wireless connectivity in a centralized deployment.
FlexConnect mode is designed for branch office or remote site deployments. In this mode, an AP at a remote site can connect back to a central WLC over a WAN link. Client data traffic can be switched locally at the branch, directly onto the wired network, instead of being tunneled back to the central controller. This saves WAN bandwidth. The AP can also operate in a standalone state if the connection to the WLC is lost, providing basic wireless service to local clients. This survivability makes FlexConnect a powerful solution for distributed enterprises.
Other specialized AP modes provide dedicated monitoring and security functions. Monitor mode APs do not serve clients at all. Instead, they dedicate their radios to scanning all channels to act as a dedicated sensor for the wireless network. This allows them to detect rogue APs, monitor for intrusion attempts, and provide rich data for the WLC's management and security features. Similarly, a Rogue Detector AP is solely focused on identifying unauthorized APs connected to the wired network. Sniffer mode configures an AP to capture all 802.11 traffic on a specific channel and forward it to a protocol analyzer for deep troubleshooting. Lastly, Bridge or Mesh mode allows APs to form a wireless backhaul to extend connectivity to areas where Ethernet cabling is not available.
Deploying access points effectively is both an art and a science, and it begins with thorough planning. A critical first step, and a key topic for the 200-355 Exam, is conducting a site survey. A predictive site survey uses software tools and floor plans to model the RF environment and determine optimal AP locations and configurations before any hardware is installed. This is followed by an on-site, pre-deployment survey using an actual AP on a stick to validate the predictive model and measure real-world signal propagation, identifying potential sources of RF interference from devices like microwave ovens, cordless phones, or neighboring Wi-Fi networks.
When planning, engineers must consider whether the design is for coverage or for capacity. A coverage-based design focuses on ensuring a minimum signal strength (e.g., -67 dBm) throughout the entire desired service area. This is suitable for environments with low user density and basic data needs, such as a warehouse or a library. A capacity-based design, on the other hand, is for high-density environments like lecture halls, conference centers, or stadiums. Here, the goal is not just to provide a signal, but to ensure the network can support a large number of concurrent users and their bandwidth-intensive applications. This often involves using more APs operating at lower power levels to create smaller coverage cells.
Identifying sources of interference is another crucial aspect of planning. Interference can be categorized as co-channel interference, which comes from other Wi-Fi devices on the same channel, or non-Wi-Fi interference, which comes from other devices operating in the same frequency band. A spectrum analyzer is an invaluable tool for detecting non-Wi-Fi interference that a standard Wi-Fi adapter cannot see. Proper channel planning, especially in the crowded 2.4 GHz band, is essential to minimize co-channel interference by using non-overlapping channels (1, 6, and 11). This meticulous planning phase is fundamental to building a reliable and high-performing wireless network.
Once the planning phase is complete, the physical installation of the access points must be carried out with care. The physical placement and mounting of an AP have a direct impact on its performance and coverage pattern. For ceiling-mounted omnidirectional APs, which is the most common enterprise deployment scenario, the AP should be mounted in the center of the intended coverage area. It should be mounted horizontally, with the dome facing down, to ensure the donut-shaped radiation pattern is projected correctly across the horizontal plane where most client devices are located. Mounting the AP vertically on a wall will distort this pattern and lead to suboptimal coverage.
Obstructions must be carefully considered. Placing an AP directly above or near large metal objects like HVAC ducts, pipes, or light fixtures can cause reflections and create null spots in coverage. It is also important to avoid placing APs in concealed spaces above ceiling tiles or inside closets, as these materials can absorb and weaken the RF signal. The goal is to maintain a clear line of sight between the AP and the client devices as much as possible. For directional antennas used in hallways or for point-to-point links, precise alignment is critical to maximize the signal strength at the intended target.
Powering the access point is another key consideration covered in the 200-355 Exam material. The most common method is Power over Ethernet (PoE), as defined by the IEEE 802.3af and 802.3at (PoE+) standards. This allows a single Ethernet cable to provide both data connectivity and electrical power to the AP from a PoE-capable switch. This simplifies installation and reduces the need for separate power outlets near each AP location. If the network switch does not support PoE, a power injector can be used inline to add power to the Ethernet cable.
For a lightweight AP to be managed by a Wireless LAN Controller, it must first discover and join the controller. This discovery process is a fundamental aspect of the centralized architecture and a topic frequently tested on the 200-355 Exam. An AP straight out of the box will boot up and begin trying to find a controller. It uses a variety of methods to do this. First, it can use a Layer 3 broadcast on its local subnet to find any controllers that are on the same VLAN. If that fails, the AP will send a DHCP request to get an IP address.
The DHCP server can be configured with DHCP Option 43, which provides the IP address of the WLC directly to the AP as part of the DHCP lease. This is a very common and scalable method for discovery. If Option 43 is not configured, the AP will try to resolve the DNS name "CISCO-CAPWAP-CONTROLLER.localdomain" in its local domain. An A record must be created in the DNS server that points this name to the WLC's management IP address. As a last resort, the AP will remember the IP address of the last controller it joined and try to contact it again.
Once the AP discovers the WLC's IP address, it sends a CAPWAP join request. The controller then validates the AP. If the AP's certificate is valid and its serial number is not on a blocklist, the controller sends a CAPWAP join response. The AP then downloads the latest software image and configuration from the WLC. After this process is complete, the AP is fully joined and managed by the controller, ready to begin broadcasting SSIDs and serving clients. Understanding these sequential steps is crucial for troubleshooting why an AP might be failing to join its intended WLC.
Roaming is the process by which a wireless client device moves its connection from one access point to another within the same network without losing connectivity. For the 200-355 Exam, it was important to understand how this process works in a Cisco centralized WLC environment. The most common type of roam is a Layer 2 roam. This occurs when a client moves between two APs that are managed by the same WLC and are broadcasting an SSID that is mapped to the same VLAN. From the network's perspective, the client's IP address does not change, and the connection is maintained seamlessly. The WLC orchestrates this handoff by updating its internal tables to show the client is now associated with the new AP.
A more complex scenario is an inter-controller or Layer 3 roam. This happens when a client moves between two APs that are associated with different WLCs. If the new WLC is on a different subnet, the client would normally need to obtain a new IP address, which would break any active sessions. To prevent this, WLCs can be configured into a mobility group. When a client roams between controllers in the same mobility group, the original controller, known as the mobility anchor, establishes a tunnel with the new, foreign controller. The client's traffic is then tunneled from the foreign controller back to the anchor, allowing the client to keep its original IP address and maintain its sessions.
The efficiency of roaming is largely determined by the client device itself. The client's wireless adapter is responsible for scanning for better APs and deciding when to initiate a roam based on signal strength and other factors. However, Cisco networks provide features to assist with this process. Technologies like 802.11k allow the WLC to provide the client with a list of neighboring APs and their channels, which speeds up the scanning process. 802.11v provides information that can influence the client's roaming decision, and 802.11r (Fast BSS Transition) streamlines the authentication process to make the handoff even faster, which is critical for voice and video applications.
Wireless networks, by their very nature, broadcast data over the air, making them inherently less secure than their wired counterparts. Anyone within range with the right equipment can potentially intercept the traffic. Therefore, implementing robust security measures is not just a best practice; it is a critical necessity. A significant portion of the 200-355 Exam was dedicated to the principles and practices of securing a wireless LAN. The foundational model for information security is the CIA triad: Confidentiality, Integrity, and Availability. These three pillars guide all security decisions in a wireless environment.
Confidentiality ensures that the data transmitted over the air is protected from eavesdropping. This is achieved through encryption, which scrambles the data so that it is unreadable to anyone without the correct decryption key. Integrity guarantees that the data has not been altered or tampered with during transmission. This is typically accomplished using a message integrity check (MIC), which is a form of checksum that the receiver can use to verify the message's authenticity. Availability ensures that the wireless network is accessible and usable by authorized users when they need it. This involves protecting the network from attacks that could disrupt service, such as denial-of-service attacks.
The evolution of wireless security has been a continuous response to emerging threats. The earliest security standard, Wired Equivalent Privacy (WEP), was found to have serious cryptographic flaws and is now considered completely insecure. This led to the development of Wi-Fi Protected Access (WPA) as an interim solution, which was soon replaced by the much stronger WPA2 standard. WPA2 became the industry benchmark for many years, implementing the robust AES encryption algorithm. Understanding this evolution and the specific vulnerabilities of older protocols was a key knowledge requirement for any candidate taking the 200-355 Exam.
Before a client is allowed to access the wireless network, it must first prove its identity through a process called authentication. The 200-355 Exam covered several authentication methods, each offering a different level of security. The most basic method is Open Authentication. As the name implies, this method involves no real authentication at all. Any client that knows the SSID (the network name) can connect. This is typically used only for public guest networks where access is meant to be completely open, often in conjunction with a captive portal or web authentication page that users must navigate before gaining full access.
The most common authentication method used in home and small office environments is WPA2-Personal, which uses a Pre-Shared Key (PSK). In this model, a single password or passphrase is configured on the access point and is shared with all authorized users. When a client attempts to connect, it must provide the correct PSK to be authenticated. While much more secure than an open network, PSK has limitations in an enterprise environment. If the key is compromised, it must be changed on every single device, which can be a logistical nightmare. It also does not provide individual user accountability.
For enterprise environments, the gold standard for authentication is the IEEE 802.1X framework, used in conjunction with WPA2-Enterprise. This method provides robust, centralized, and per-user authentication. Instead of a shared password, each user authenticates with their own unique credentials, typically a username and password or a digital certificate. This process involves three components: the supplicant (the client device), the authenticator (the access point or WLC), and the authentication server, which is almost always a RADIUS server. This granular level of control is essential for corporate networks, and mastering its configuration was a vital skill for the 200-355 Exam.
The 802.1X framework provides the structure for authentication, but the actual exchange of credentials happens using the Extensible Authentication Protocol (EAP). EAP is not a single protocol but rather a framework that supports many different authentication methods, known as EAP types. This flexibility allows organizations to choose the method that best fits their security requirements. A key part of preparing for the 200-355 Exam was learning to differentiate between the most common EAP types and understanding their specific use cases and requirements.
Protected EAP (PEAP) is one of the most widely deployed EAP types. With PEAP, the authentication server first presents a digital certificate to the client. The client verifies this certificate to ensure it is talking to the legitimate server. This process creates a secure, encrypted TLS tunnel. Inside this tunnel, the client then sends its username and password credentials for authentication. Because the credentials are only sent after the secure tunnel is established, they are protected from eavesdropping. This method is popular because it only requires a server-side certificate and relies on familiar user credentials.
Another common method is EAP-TLS (Transport Layer Security). EAP-TLS is considered the most secure EAP type because it provides mutual authentication. Not only does the server present a certificate to the client, but the client must also present a certificate to the server. This means both sides of the conversation are cryptographically verified. While highly secure, deploying EAP-TLS is more complex because it requires a public key infrastructure (PKI) to issue and manage digital certificates for every single client device on the network. A third method, EAP-FAST (Flexible Authentication via Secure Tunneling), is a Cisco-proprietary protocol that was designed to be a faster and lighter alternative to PEAP.
The 802.1X/EAP framework relies on a backend server to make the final authentication decisions. This role is filled by an Authentication, Authorization, and Accounting (AAA) server. The most common protocol used for AAA services in network access control is the Remote Authentication Dial-In User Service (RADIUS). In a wireless context, when a client (the supplicant) tries to connect to an AP (the authenticator), the AP does not make the authentication decision itself. Instead, it acts as a middleman, forwarding the client's credentials to the RADIUS server for verification. Understanding this three-party interaction was fundamental for the 200-355 Exam.
The authentication process begins when the client sends an EAP-start message. The authenticator (the WLC in a centralized model) then forwards this to the RADIUS server. The RADIUS server and the supplicant then engage in a series of EAP message exchanges, with the authenticator simply passing these messages back and forth. The RADIUS server challenges the client for its credentials based on the configured EAP type. For example, in PEAP, it would ask for a username and password after establishing a TLS tunnel. The RADIUS server then checks these credentials against its user database, which could be a local database, Microsoft Active Directory, or another directory service.
Once the RADIUS server has verified the credentials, it sends an Access-Accept message back to the authenticator. This message tells the WLC that the user is legitimate and should be allowed onto the network. The Access-Accept message can also contain specific authorization attributes, such as assigning the user to a particular VLAN, applying a Quality of Service (QoS) profile, or enforcing an Access Control List (ACL). If authentication fails, the server sends an Access-Reject message. This centralized approach provides robust security, granular policy control, and detailed accounting logs of all user access.
Once a user is authenticated, the next critical step is to ensure that all the data they send and receive over the wireless network is confidential. This is achieved through encryption. The 200-355 Exam required a clear understanding of the different encryption protocols used in Wi-Fi. The original encryption standard, WEP, used the RC4 stream cipher with a small, static key. Due to fundamental flaws in its implementation, it was quickly found to be easily breakable, and its use is now strongly discouraged.
To address the weaknesses of WEP, the Wi-Fi Alliance introduced WPA, which still used RC4 for encryption but added a mechanism called the Temporal Key Integrity Protocol (TKIP). TKIP was a significant improvement as it dynamically changed the encryption keys for every packet, making it much more difficult to crack than WEP's static key. However, TKIP was designed as an interim solution to run on older hardware that could not support more computationally intensive encryption. It was essentially a patch for WEP and still had underlying vulnerabilities.
The long-term and much more secure solution arrived with WPA2. WPA2 made the use of the Advanced Encryption Standard (AES) mandatory. AES is a block cipher that is considered the gold standard in cryptography and is used by governments and organizations worldwide to protect sensitive data. WPA2 uses AES within a framework called Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP). This not only provides strong encryption for confidentiality but also incorporates a robust message integrity check to protect against data tampering. For any secure enterprise network, WPA2 with AES-CCMP is the minimum acceptable standard.
Configuring a secure enterprise-grade wireless network was a practical skill tested by the 200-355 Exam. A typical scenario involves setting up a new WLAN (or SSID) on a Cisco Wireless LAN Controller and securing it with WPA2-Enterprise using 802.1X authentication. The first step in this process is to configure the WLC to communicate with the RADIUS server. This involves navigating to the security section of the WLC's GUI, defining a new RADIUS server, and entering its IP address and the shared secret key that will be used to encrypt communication between the WLC and the server.
Next, a new WLAN needs to be created. This involves choosing a profile name and an SSID that will be broadcast to the clients. On the security tab for this new WLAN, Layer 2 security must be set to WPA+WPA2. Then, 802.1X must be enabled as the authentication key management method. This tells the WLC that it will be using a RADIUS server for authentication. The previously configured RADIUS server is then selected from a dropdown list to be used for this specific WLAN.
Finally, the WLAN needs to be associated with an interface on the WLC to segment its traffic onto the correct VLAN on the wired network. Once these settings are saved and the WLAN is enabled, the WLC will push this configuration to all of its associated access points. The APs will then begin broadcasting the new SSID. When a client attempts to connect, the WLC will proxy the authentication request to the configured RADIUS server, completing the WPA2-Enterprise setup. This process provides a secure, scalable, and manageable solution for corporate wireless access.
Providing internet access to visitors, contractors, and guests is a common requirement for almost every organization. However, this access must be provided in a secure manner that isolates guest traffic from the internal corporate network. The 200-355 Exam curriculum covered various methods for implementing secure guest access. A popular method is Web Authentication, often referred to as a captive portal. With this solution, guests connect to an open SSID. When they open a web browser, they are automatically redirected to a special login page.
This captive portal can be customized with the company's branding and an acceptable use policy that guests must agree to before being granted access. The authentication can be as simple as clicking an "accept" button, or it can require guests to enter a username and password that was provided to them, or even self-register for an account. Once authenticated through the web portal, the WLC allows their device to access the internet. Critically, this guest traffic is kept completely separate from the internal network, typically by placing guest users onto a dedicated VLAN that is firewalled off from all corporate resources.
For more advanced guest management, Cisco offers solutions like the Identity Services Engine (ISE), which can provide sponsored guest access. In this workflow, a guest attempts to connect and is redirected to a portal where they enter their name and the email address of the employee who is their sponsor. The sponsor then receives an email and must approve the access request before the guest is allowed on the network. This creates an audit trail and adds a layer of accountability. These solutions ensure that providing guest access does not compromise the security posture of the internal network.
A wireless network administrator must be aware of the common types of attacks that can be launched against a WLAN. The 200-355 Exam expected candidates to be able to identify these threats and understand the appropriate mitigation techniques. One of the most significant threats is a Rogue Access Point. A rogue AP is an unauthorized access point connected to the corporate wired network, often installed by a well-meaning but naive employee. This can create a massive security hole, bypassing all the network's perimeter defenses. Cisco WLCs can detect rogue APs by listening for their MAC addresses on the wired network.
Another common attack is a Man-in-the-Middle (MITM) attack. In a wireless context, this often takes the form of an "evil twin" AP. An attacker sets up an access point with the same SSID as the legitimate corporate network but with a stronger signal. Unsuspecting clients may automatically connect to this malicious AP. The attacker can then intercept all of the user's traffic, potentially capturing sensitive information like login credentials and financial data. Using WPA2-Enterprise with 802.1X and server certificate validation is the primary defense against this, as the client will detect that the evil twin does not have the correct certificate.
Denial-of-Service (DoS) attacks aim to make the wireless network unavailable to legitimate users. This can be done by flooding the airwaves with RF noise using a jammer, or more subtly by sending a flood of deauthentication or disassociation management frames. These frames, which are normally unencrypted, trick client devices into disconnecting from the network. To combat this, Cisco developed a feature called Management Frame Protection (MFP). MFP uses digital signatures to ensure the integrity and authenticity of critical management frames, preventing them from being spoofed by an attacker.
Understanding the step-by-step process of how a wireless client connects to an access point is a fundamental skill for any wireless professional and was a key area of focus for the 200-355 Exam. The entire journey from being disconnected to passing data on the network involves a carefully orchestrated exchange of 802.11 frames. It begins with the discovery phase. The client device needs to find out what networks are available in its vicinity. It does this in one of two ways: passive scanning or active scanning.
In passive scanning, the client simply listens for Beacon frames. Access points constantly transmit Beacon frames, typically every 102.4 milliseconds, to announce their presence and advertise the SSIDs they are hosting, along with other network capabilities like supported data rates and security protocols. In active scanning, the client takes a more proactive approach. It broadcasts a Probe Request frame, either for a specific SSID it is configured to connect to or a general request for any APs in the area. APs that hear this request will respond with a Probe Response frame, which contains similar information to a beacon.
Once the client has discovered a suitable network and decided to join, it moves to the authentication phase. This is not the same as the 802.1X authentication discussed previously; this is the initial 802.11 state machine authentication. For an open or PSK network, this is a simple two-frame exchange. The client sends an Authentication Request, and the AP replies with an Authentication Response. After this, the client sends an Association Request to the AP. The AP replies with an Association Response, which includes an Association ID (AID). At this point, the client is associated with the AP and is officially part of the wireless LAN, ready to proceed with higher-level authentication like 802.1X if required.
To truly understand and troubleshoot Wi-Fi networks, one must look beyond the GUI and understand the language of the airwaves: the 802.11 frames themselves. The 200-355 Exam required familiarity with the three main categories of 802.11 frames. The first and most common type are Management frames. These frames are used to establish and maintain the connection between clients and access points. They are the backbone of the connection process. As discussed, Beacons, Probe Requests, Probe Responses, Authentication, Association, and Deauthentication frames all fall into this category. They are essential for the basic operation of the network.
The second category is Control frames. These frames help to manage the orderly flow of data on the shared wireless medium and prevent collisions. The most important control frames are Request to Send (RTS) and Clear to Send (CTS). An RTS/CTS exchange can be used by a device to reserve the wireless medium before transmitting a large data frame, telling all other devices in the area to wait their turn. Another critical control frame is the Acknowledgement (ACK) frame. Because the wireless medium is unreliable, every time a unicast data frame is sent, the sender expects to receive an ACK from the receiver to confirm it was received successfully. If no ACK is received, the sender will retransmit the frame.
The third and final category is Data frames. As the name suggests, these are the frames that carry the actual user payload, such as web traffic, email, or video streams. Data frames contain the encapsulated upper-layer information, like IP packets. In a secure network, the payload of these frames is encrypted to ensure confidentiality. Understanding the purpose of these different frame types and being able to identify them in a wireless packet capture is an invaluable skill for advanced troubleshooting, allowing an engineer to see precisely what is happening at the most granular level of the network.
Go to testing centre with ease on our mind when you use Cisco CCNA Wireless 200-355 vce exam dumps, practice test questions and answers. Cisco 200-355 CCNA Wireless Implementing Cisco Wireless Network Fundamentals certification practice test questions and answers, study guide, exam dumps and video training course in vce format to help you study with ease. Prepare with confidence and study using Cisco CCNA Wireless 200-355 exam dumps & practice test questions and answers vce from ExamCollection.
Cisco 200-355 Video Course
Top Cisco Certification Exams
Site Search:
SPECIAL OFFER: GET 10% OFF
Pass your Exam with ExamCollection's PREMIUM files!
SPECIAL OFFER: GET 10% OFF
Use Discount Code:
MIN10OFF
A confirmation link was sent to your e-mail.
Please check your mailbox for a message from support@examcollection.com and follow the directions.
Download Free Demo of VCE Exam Simulator
Experience Avanset VCE Exam Simulator for yourself.
Simply submit your e-mail address below to get started with our interactive software demo of your free trial.
Do you have valid 200-355 wireless ccna dumps
Do u have valid dumps ?
still valid? how many questions ?
very good Exam Dumps keep up the good work
is valid the dumps?
Please share dumps for 200-355 exam
Kindly share study material for 200-355
Excelent files.
i want to buy dumps
I want to buy dumps
This is very good material for preparing for certification exams.