Home Wireless Client

Wireless Client

Here you will find answers to Wireless Client Questions

Question 1

When creating new configuration profiles in Cisco Secure Services Client, in what format are the files saved?



Answer: D


The Cisco Secure Services Client (Cisco SSC) generates an XML file that can be easily deployed network-wide to all client machines. This process is very secure and scalable, and still flexible enough to let users create their own personal connection profiles for private use.

Below is an example of the structure of a XML file. Notice that this configuration is only used for demonstration and is not created by the Cisco Secure Services Client software.


To learn more about how to configure Cisco Secure Services Client, you can visit


Question 2

How are application-specific devices differentiated from laptop computers in the way they support Cisco Compatible Extensions?

A. ASDs are required to support only CCXv1 and v2 features. Laptops must support all CCX features.
B. ASDs are required to support only CCXv5 management features, while laptops are optional features.
C. Several features that are required for laptops are not required for ASDs.
D. There is no differentiation. ASDs and laptops must both support the same CCX features.


Answer: C


Several features that are required for laptops are not required for application-specific devices (ASDs) that are used either exclusively or primarily for data applications. Data ASDs include data capture devices, PDAs, and printers. Voice ASDs include single mode, dual mode and smart phones. Every feature that is optional for an ASD is represented in the ASD field as Optional.

Question 3

Which open standard defines the combination of Extensible Authentication Protocol with Advanced Encryption Standard for providing strong wireless LAN client security?

A. IEEE 802.1X
B. IEEE 802.11i


Answer: B


The full standard IEEE 802.11i (also known as WPA2 or RSN)) is designed to provide secured communication of wireless LAN as defined by all the IEEE 802.11 specifications. IEEE 802.11i enhances the WEP (Wireline Equivalent Privacy), a technologies used for many years for the WLAN security, in the areas of encryption, authentication and key management. IEEE 802.11i is based on the Wi-Fi Protected Access (WPA), which is a quick fix of the WEB weaknesses.

The aim of 802.11i was to produce a specification for a robust security network (RSN) designed to enhance:
* Authentication
* Key management
* Confidentiality and integrity

The IEEE 802.11i has the following key components:

1. Temporal Key Integrity Protocol (TKIP): session key establishment and re-negotiation
2. Counter-Mode/CBC-MAC Protocol (CCMP):
an AES-based protocol to provide confidentiality, integrity and origin authentication
3. IEEE 802.1x
for authentication (entailing the use of EAP and an authentication server)

Advanced Encryption Standard (AES) is the cipher system used by WPA2. It is the equivalent of the RC4 algorithm used by WPA. However the encryption mechanism is much more complex and does not suffer from the problems associated with WEP. AES is a block cipher, operating on blocks of data 128bits long.

Note: WPA only implemented a subset of a draft of 802.11i. It is not the full standard of IEEE 802.11i.

Question 4

Which client application utility allows wireless configuration on Linux platforms?

A. Airport Extreme
B. CiscoAironet Desktop Utility
C. Cisco Secure Services Client
D. NetworkManager
E. Windows ZeroConfig


Answer: D


NetworkManager is a GUI that communicates directly with the hardware for Linux. It is distribution- and desktop environment-agnostic (that is, it works on distributions Ubuntu as well as on Fedora, and on KDE, as well as on Gnome and many others).

Comments (6) Comments
  1. Brian
    May 9th, 2012

    Question 3: WEP (802.1x) > 802.1i > WPA > WPA2

  2. Mwanamisi
    September 2nd, 2012

    $125 per test, no courses as of yet, but I’ll be wnkriog on something either online, e-book, or study guide, or all three! Not sure yet…Thank you for writing!

  3. ugg boots sale
    November 9th, 2013

    End of discussion..
    ugg boots sale http://www.luckydogacademy.com/node/7

  4. discount north face jackets
    November 10th, 2013

    S} and many in the world continue to legally identify this Assad united states government..
    discount north face jackets http://www.brandonmanbeck.com/node/7

  5. portigalconsulting.com/monster_beats_18
    November 10th, 2013

    “An Old Flame” morphs at a brooding range of furtive guitar comments and guitar chords, as well as material drum drums perfectly into a clashing, ramming, shambling variety of synthesizer shards plus undulatingly modern orchestral tonalities.
    portigalconsulting.com/monster_beats_18 http://www.portigalconsulting.com/monster_beats_18

  6. celine bags
    November 11th, 2013

    Arugungu Day fishing Festival is widely known found in February not to mention April within Matan Fada Riv associated with Kebbi Think.
    celine bags http://www.curiousitivity.com

Reload Image