Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70special

Cisco 300-430 Implementing Cisco Enterprise Wireless Networks (300-430 ENWLSI) Exam Practice Test

Page: 1 / 28
Total 277 questions

Implementing Cisco Enterprise Wireless Networks (300-430 ENWLSI) Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$42  $139.99

PDF Study Guide

  • Product Type: PDF Study Guide
$36  $119.99
Question 1

Which customizable security report on Cisco Prime Infrastructure will show rogue APs detected since a point in time?

Options:

A.

Network Summary

B.

Rogue APs Events

C.

New Rogue APs

D.

Rogue APs Count Summary

Question 2

When configuring a Cisco WLC, which CLI command adds a VLAN with VLAN ID of 30 to a FlexConnect group named BranchA-FCG?

Options:

A.

config flexconnect BranchA-FCG vlan 30 add

B.

config flexconnect BranchA-FCG vlan add 30

C.

config flexconnect group BranchA-FCG vlan 30 add

D.

config flexconnect group BranchA-FCG vlan add 30

Question 3

A Cisco WLC has been added to the network and Cisco ISE as a network device, but authentication is failing. Which configuration within the network device configuration should be verified?

Options:

A.

SNMP RO community

B.

device interface credentials

C.

device ID

D.

shared secret

Question 4

An engineer is in the process of implementing Fastiane on a wireless network with a Mobility Express AP installed and Apple end-user devices. Due to a security concern, the IT department has updated all the iPads to version 14.5.423551943. Which QoS profile must the engineer configure on the user WLAN?

Options:

A.

Platinum

B.

Best Effort

C.

Bronze

D.

Silver

Question 5

A wireless engineer needs to implement client tracking. Which method does the angle of arrival use to determine the location of a wireless device?

Options:

A.

received signal strength

B.

triangulation

C.

time distance of arrival

D.

angle of incidence

Question 6

Refer to the exhibit.

An engineer needs to manage non-802.11 interference. What is observed in the output on PI?

Options:

A.

At least one strong interferer is impacting connectivity at this site.

B.

Several light interferers are collectively impacting connectivity at this site.

C.

The three individual clusters shown indicate poor AP placement.

D.

RF at this site is unable to provide adequate wireless performance.

Question 7

A wireless engineer deployed all remote sites as FlexConnect. The client VLAN assignment on these sites is configured manually mapped by WLAN and using local switching. Dynamic VLAN assignment is provided by the newly deployed Cisco ISE. Which IETF attribute must be configured on the AAA server to send that VLAN ID?

Options:

A.

Tunnel-Medium-Type

B.

Tunnel-Client-Endpoint

C.

Tunnel-Assignment-ID

D.

Tunnel-Private-Group-ID

Question 8

A controller shows that an AP in your environment is detecting interference, but the AP health score in Cisco DNA Center is unaffected. What are two reasons that Cisco DNA Center is ignoring the interference? (Choose two.)

Options:

A.

The interference is less than or equal to 30% on the 2.4 GHz radio.

B.

The interference is less than or equal to 50% on the 2.4 GHz radio.

C.

Cisco DNA Center includes only Cisco CleanAir interferers in the AP health score.

D.

The interference is less than or equal to 30% on the 5 GHz radio.

E.

Cisco DNA Center does not include interference in the AP health score.

Question 9

The security policy mandates that only controller web management traffic is allowed from the IT subnet. In testing, an engineer is trying to connect to a WLAN with Web Authentication for guest users, but the page is timing out on the wireless client browser. What is the cause of the issue?

Options:

A.

The implemented CPU ACL on the controller is blocking HTTP/HTTPS traffic from the guest clients.

B.

Web Authentication Redirect is not supported with CPU ACLs.

C.

The DNS server that is configured on the controller is incorrect.

D.

Web Authentication Redirect is supported only with Internet Explorer, and the client is using Google Chrome.

Question 10

A customer wants to allow employees to easily onboard their personal devices to the wireless network. The visitors also must be able to connect to the same network without the need to engage with anyone from the reception desk. Which process must be configured on Cisco ISE to support this requirement?

Options:

A.

MAC authentication bypass

B.

native supplicant provisioning

C.

local web auth

D.

self-registration guest portal

Question 11

A network is set up to support wired and wireless clients. Both types must authenticate using 802.1X before connecting to the network. Different types of client authentication must be separated on a Cisco ISE deployment. Which two configuration items achieve this task? (Choose two.)

Options:

A.

device profiles

B.

policy sets

C.

separate networks

D.

policy groups

E.

policy results

Question 12

CMX Facebook Wi-Fi allows access to the network before authentication. Which two elements are available? (Choose two.)

Options:

A.

Allow HTTP traffic only before authentication and block all the traffic.

B.

Allow all the traffic before authentication and intercept HTTPS only.

C.

Allow HTTPs traffic only before authentication and block all other traffic.

D.

Allow all the traffic before authentication and intercept HTTP only.

E.

Allow SNMP traffic only before authentication and block all the traffic.

Question 13

An engineer is performing a Cisco Hyperlocation accuracy test and executes the cmxloc start command on Cisco CMX. Which two parameters are

relevant? (Choose two.)

Options:

A.

X, Y real location

B.

client description

C.

AP name

D.

client MAC address

E.

WLC IP address

Question 14

An engineer must configure MSE to provide guests access using social media authentication. Which service does the engineer configure so that guests use Facebook credentials to authenticate?

Options:

A.

Social Connect

B.

Client Connect

C.

Visitor Connect

D.

Guest Connect

Question 15

A customer managing a large network has implemented location services. Due to heavy load, it is needed to load balance the data coming through NMSP from the WLCs. Load must be spread between multiple CMX servers to help optimize the data flow for APs. Which configuration in CMX meets this requirement?

Options:

A.

cmxctl config feature flags nmsplb.cmx-ap-grouping true

B.

cmxctl config feature flags nmsplb.cmxgrouping true

C.

cmxctl config feature flags nmsplb.cmx-loadbalance true

D.

cmxctl config feature flags nmsplb.cmx-rssi-distribute true

Question 16

Refer to the exhibit.

An engineer has deployed the Cisco CMX solution to track and detect the number of users who visit the office each day. The CMX dashboard is not showing any data. Which action resolves this issue?

Options:

A.

Configure Single Sign-On authentication.

B.

Add the WLCs to CMX.

C.

Copy the exported Maps from CMX server to PI using SCP.

D.

Install an evaluation license to CMX server.

Question 17

Which three properties are used for client profiling of wireless clients? (Choose three.)

Options:

A.

HTTP user agent

B.

DHCP

C.

MAC OUI

D.

hostname

E.

OS version

F.

IP address

Question 18

An engineer is deploying a virtual MSE. The network has 3000 APs and needs 7000 IPS licenses.

To which size server does the engineer scale it?

Options:

A.

virtual

B.

standard

C.

high end

D.

low end

Question 19

An engineer completed the basic installation for two Cisco CMX servers and is in the process of configuring high availability, but it fails. Which two statements about the root of the issue are true? (Choose two.)

Options:

A.

The Cisco CMX instances are installed in the same subnet.

B.

The types of the primary and secondary Cisco CMX installations differ.

C.

The delay between the primary and secondary instance is 200 ms.

D.

The sizes of the primary and secondary Cisco CMX installations differ.

E.

Both Cisco CMX installations are virtual.

Question 20

An engineer must create an account to log in to the CLI of an access point for troubleshooting. Which configuration on the WLC will accomplish this?

Options:

A.

Allow New Telnet Sessions

B.

ReadWrite User Access Mode

C.

SNMP V3 User

D.

Global Configuration Enable Password

Question 21

An engineer just added a new MSE to Cisco Prime Infrastructure and wants to synchronize the MSE with the Cisco 5520 WLC, located behind a firewall in a DMZ. It is noticed that NMSP messages are failing between the two devices. Which traffic must be allowed on the firewall to ensure that the MSE and WLC are able to communicate using NMSP?

Options:

A.

TCP 1613

B.

UDP 16113

C.

UDP 1613

D.

TCP 16113

Question 22

A wireless engineer must implement a corporate wireless network for a large company in the most efficient way possible. The wireless network must support 32 VLANs for 300 employees in different departments. Which solution must the engineer choose?

Options:

A.

Configure a second WLC to support half of the APs in the deployment.

B.

Configure one single SSID and implement Cisco ISE for VLAN assignment according to different user roles.

C.

Configure different AP groups to support different VLANs, so that all of the WLANs can be broadcast on both radios.

D.

Configure 16 WLANs to be broadcast on the 2.4-GHz band and 16 WLANs to be broadcast on the 5.0-GHz band.

Question 23

On a branch office deployment, it has been noted that if the FlexConnect AP is in standalone mode and loses connection to the WLC, all clients are disconnected, and the SSID is no longer advertised. Considering that FlexConnect local switching is enabled, which setting is causing this behavior?

Options:

A.

ISE NAC is enabled

B.

802.11r Fast Transition is enabled

C.

Client Exclusion is enabled

D.

FlexConnect Local Auth is disabled

Question 24

What must be configured on the Global Configuration page of the WLC for an AP to use 802.1x to authenticate to the wired infrastructure?

Options:

A.

local access point credentials

B.

RADIUS shared secret

C.

TACACS server IP address

D.

supplicant credentials

Question 25

All APs are receiving multicast traffic, instead of only the APs that need it. What is the cause of this problem?

Options:

A.

The multicast group includes all APs

B.

The wrong multicast address was used

C.

The multicast group is assigned the wrong VLAN

D.

Multicast IGMP snooping is not enabled

Question 26

What must be configured on ISE version 2.1 BYOD when using Single SSID?

Options:

A.

open authentication

B.

802.1x

C.

no authentication

D.

WPA2

Question 27

What are two considerations when deploying a Cisco Hyperlocation? (Choose two.)

Options:

A.

NTP configuration is available, but not recommended.

B.

The Cisco Hyperlocation feature must be enabled only on the wireless LAN controller.

C.

After enabling Cisco Hyperlocation on Cisco CMX, the APs and the wireless LAN controller must be restarted.

D.

The Cisco Hyperlocation feature must be enabled on the wireless LAN controller and Cisco CMX.

E.

If the Cisco CMX server is a VM, a high-end VM is needed for Cisco Hyperlocation deployments.

Question 28

An engineer completes the setup of a two-node Cisco ISE deployment for a guest portal. When testing the portal, the engineer notices that sometimes there is a certificate CN mismatch. Which certificate type helps resolve this issue?

Options:

A.

Public-Signed Root

B.

Public-Signed SAN

C.

Self-Signed Wildcard

D.

Self-Signed Standard

Question 29

An engineer is implementing a FlexConnect group for access points at a remote location using local switching but central DHCP. Which client feature becomes available only if this configuration is changed?

Options:

A.

multicast

B.

static IP

C.

fast roaming

D.

mDNS

Question 30

An IT team is growing quickly and needs a solution for management device access. The solution must authenticate users from an external repository instead of the current local on the WLC, and it must also identify the user and determine what level of access users should have. Which protocol do you recommend to achieve these goals?

Options:

A.

network policy server

B.

RADIUS

C.

TACACS+

D.

LDAP

Question 31

Which three characteristics of a rogue AP pose a high security risk? (Choose three.)

Options:

A.

open authentication

B.

high RSSI

C.

foreign SSID

D.

accepts clients

E.

low RSSI

F.

distant location

Question 32

A network engineer wants to implement QoS across the network that supports multiple VLANs. All the APs are connected to switch ports and are configured in local mode. Which trust model must be configured on the switch ports to which the APs are connected?

Options:

A.

CoS

B.

WMM UP

C.

DSCP

D.

IPP

Question 33

A network engineer is implementing BYOD on a wireless network. Based on the customer requirements, a dual SSID approach must be taken. Which two advanced WLAN configurations must be performed? (Choose two.)

Options:

A.

Set NAC State to Radius NAC.

B.

Set Allow AAA Override to Enabled.

C.

Set DHCP Addr. Assignment to Required.

D.

Select DHCP Profiling.

E.

Select Enable Session Timeout.

Question 34

A customer requires wireless traffic from the branch to be routed through the firewall at corporate headquarters. A RADIUS server is in each branch location. Which Cisco FlexConnect configuration must be used?

Options:

A.

central authentication and local switching

B.

central authentication and central switching

C.

local authentication and local switching

D.

local authentication and central switching

Question 35

An engineer must configure MSE to provide guests access using social media authentication. Which service does the engineer configure so that guests use Facebook credentials to authenticate?

Options:

A.

Social Connect

B.

Client Connect

C.

Visitor Connect

D.

Guest Connect

Question 36

The security learn is concerned about the access to all network devices, including the Cisco WLC. To permit only the admin subnet to have access to management, a CPU ACL is created and applied. However, guest users cannot get to the web portal. What must be configured to permit only admins to have access?

Options:

A.

The guest portal must be configured on the CPU ACLs on the Cisco WLC.

B.

Access to Cisco ISE must be allowed on the pre authentication ACL.

C.

Management traffic from the guest network must be configured on the ACL rules. D. Traffic toward the virtual interface must be permitted.

Question 37

What is an important consideration when implementing a dual SSID design for BYOD?

Options:

A.

After using the provisioning SSID, an ACL that used to make the client switch SSIDs forces the user to associate and traverse the network by MAC filtering.

B.

If multiple WLCs are used, the WLAN IDs must be exact for the clients to be provisioned and traverse the network correctly.

C.

SSIDs for this setup must be configured with NAC State-RADIUS NAC for the clients to authenticate with Cisco ISE, or with NAC State-ISE NAC for Cisco ISE to associate the client.

D.

One SSID is for provisioning and the other SSID is for gaining access to the network. The use of an ACL should not be enforced to make the client connect to the REAL SSID after provisioning.

Question 38

Which QoS level is recommended for guest services?

Options:

A.

gold

B.

bronze

C.

platinum

D.

silver

Question 39

An IT team is growing quickly and needs a solution for management device access. The solution must authenticate users from an external repository instead of the current local on the WLC, and it must also identify the user and determine what level of access users should have. Which protocol do you recommend to achieve these goals?

Options:

A.

network policy server

B.

RADIUS

C.

TACACS+

D.

LDAP

Question 40

You plan to implement Cisco Identity Based Networking Services on a Cisco Catalyst 3850 Series Switch. Which switch command is required when configuring downloadable ACLs?

Options:

A.

authentication display new-style

B.

ip device tracking

C.

dot1x system-auth-control

D.

aaa session-id common

Question 41

What must be configured on ISE version 2.1 BYOD when using Single SSID?

Options:

A.

open authentication

B.

802.1x

C.

no authentication

D.

WPA2

Question 42

An engineer set up a VoWLAN with QoS on the WLC and a class map on the switch, but the markings are not being preserved correctly in the end-to- end traffic flow. Which two configurations on the wired network ensure end-to-end QoS? (Choose two.)

Options:

A.

trust boundaries

B.

access lists

C.

policy maps

D.

QoS licenses

E.

NetFlow

Question 43

A Cisco 8540 WLC manages Cisco Aironet 4800 Series Aps and sends AoA data to a Cisco CMX 3375 Appliance for Hyperlocation. The load from the WLC is distributed to another virtual CMX server using CMX grouping. The virtual CMX server shows location RSSI data and not Hyperlocation. No AoA metrics are shown on the metrics page of the CMX virtual appliance under System > Metrics > Location Metrics. How must the network administrator resolve this issue?

Options:

A.

Enable Wireless > Access Points > Global Configuration> Enable Hyperlocation on the WLC.

B.

Enable the HALO module on the CMX appliance for the data collection.

C.

Allow port 2003 for AoA packets to flow through between the CMX appliances.

D.

Use one Hyperlocation-enabled WLC and CMX for AoA data.

Question 44

An engineer configures the wireless LAN controller to perform 802.1x user authentication. Which configuration must be enabled to ensure that client devices can connect to the wireless, even when WLC cannot communicate with the RADIUS?

Options:

A.

pre-authentication

B.

local EAP

C.

authentication caching

D.

Cisco Centralized Key Management

Question 45

A network administrator managing a Cisco Catalyst 9800 WLC must place all iOS-connected devices to the guest SSID on VLAN 101. The rest of the clients must connect on VLAN 102 to distribute load across subnets. To achieve this configuration, the administrator configures a local policy on the WLC. Which two configurations are required? (Choose two.)

Options:

A.

Assign a policy map under global security policy settings.

B.

Add local profiling policy under global security policy settings.

C.

Create a service template.

D.

Allow HTTP and DHCP profiling under policy map.

E.

Enable device classification on global wireless settings.

Question 46

An engineer is following the proper upgrade path to upgrade a Cisco AireOS WLC from version 7.3 to 8.9. Which two ACLs for Cisco CWA must be configured when upgrading from the specified codes? (Choose two.)

Options:

A.

Permit 0.0.0.0 0.0.0.0 any DNS any

B.

Permit 0.0.0.0 0.0.0.0 UDP DNS any

C.

Permit 0.0.0.0 0.0.0.0 UDP any DNS

D.

Permit any any any

E.

Permit 0.0.0.0 0.0.0.0 UDP any any

Question 47

A corporation has a wireless network where all access points are configured in FlexConnect. The WLC has a Data WLAN and a VoWiFi WLAN implemented where centrally-switched SSID is configured for the APs. Which QoS configuration must be implemented for the wireless packets to maintain the marking across the wired and wireless network?

Options:

A.

Set QoS to Platinum.

B.

Enable CAC.

C.

Allow WMM.

D.

Trust DSCP.

Question 48

A network engineer observes a spike in controller CPU overhead and overall network utilization after multicast is enabled on a controller with 500 APs. Which feature corrects the issue?

Options:

A.

controller IGMP snooping

B.

multicast AP multicast mode

C.

broadcast forwarding

D.

unicast AP multicast mode

Question 49

An IT administrator is managing a wireless network in which most devices are Apple iOS. A QoS issue must be addressed on the WLANs. Which configuration must be performed?

Options:

A.

Enable Fastlane globally under Wireless > Access Points > Global Configuration.

B.

Create a new AVC Profile named AUTOQOS-AVC-PROFILE and apply to all WLANs.

C.

Enable Fastlane under each WLAN setting.

D.

Enable WMM TSPEC/TCLAS negotiation under Wireless > Advanced.

Question 50

An engineer is implementing a FlexConnect group for access points at a remote location using local switching but central DHCP. Which client feature becomes available only if this configuration is changed?

Options:

A.

multicast

B.

static IP

C.

fast roaming

D.

mDNS

Question 51

An engineer is configuring multicast for two WLCs. The controllers are in different physical locations and each handles around 500 wireless clients. How should the CAPWAP multicast group address be assigned during configuration?

Options:

A.

Each WLC must be assigned a unique multicast group address.

B.

Each WLC management address must be in the same multicast group.

C.

Both WLCs must be assigned the same multicast group address.

D.

Each WLC management address must be in a different multicast group.

Question 52

An engineer has configured Media Stream on the WLC and must guarantee at least 2 Mbps stream per user. Which RRC template should the engineer use?

Options:

A.

coarse

B.

medium

C.

low

D.

ordinary

Question 53

The network management team in a large shopping center has detected numerous rogue APs from local coffee shops that are broadcasting SSIDs. All of these SSIDs have names starting with ATC (for example, ATC302, ATC011, and ATC566). A wireless network engineer must appropriately classify these SSIDs using the Rogue Rules feature. Drag and drop the options from the left onto the categories in which they must be used on the right. Not all options are used.

Options:

Question 54

An engineer must create an account to log in to the CLI of an access point for troubleshooting. Which configuration on the WLC will accomplish this?

Options:

A.

Allow New Telnet Sessions

B.

ReadWrite User Access Mode

C.

SNMP V3 User

D.

Global Configuration Enable Password

Question 55

A Cisco 8540 WLC manages Cisco Aironet 4800 Series Aps and sends AoA data to a Cisco CMX 3375 Appliance for Hyperlocation. The load from the WLC is distributed to another virtual CMX server using CMX grouping. The virtual CMX server shows location RSSI data and not Hyperlocation. No AoA metrics are shown on the metrics page of the CMX virtual appliance under System > Metrics > Location Metrics. How must the network administrator resolve this issue?

Options:

A.

Enable Wireless > Access Points > Global Configuration> Enable Hyperlocation on the WLC.

B.

Enable the HALO module on the CMX appliance for the data collection.

C.

Allow port 2003 for AoA packets to flow through between the CMX appliances.

D.

Use one Hyperlocation-enabled WLC and CMX for AoA data.

Question 56

Refer to the exhibit.

An engineer tries to manage the rogues on the Cisco WLC. Based on the configuration, which AP is marked as malicious by the controller?

Options:

A.

rogue AP with SSID admin seen for 4000 seconds and heard at -70dBm

B.

rogue AP with SSID admin seen for 3000 seconds and heard at -60dBm

C.

rogue AP with SSID admin seen for 4000 seconds and heard at -60dBm

D.

rogue AP with SSID admin seen for 3000 seconds and heard at -70dBm

Question 57

An engineer must provide a graphical report with summary grouped data of the total number of wireless clients on the network. Which Cisco Prime Infrastructure report provides the required data?

Options:

A.

Client Traffic Stream Metrics

B.

Client Summary

C.

Posture Status Count

D.

Mobility Client Summary

Question 58

An engineer needs to provision certificates on a Cisco Catalyst 9800 Series Wireless Controller. The customer uses a third-party CA server. Which protocol must be used between the controller and CA server to request and install certificates?

Options:

A.

SCEP

B.

TLS

C.

LDAP

D.

SSL

Question 59

A network engineer must segregate all IPads on the guest WLAN to a separate VLAN. How does the engineer accomplish this task without using Cisco

ISE?

Options:

A.

Create a local policy on the WLC.

B.

Use 802.1x authentication to profile the devices.

C.

Use an mDNS profile for the iPad device.

D.

Enable RADIUS DHCP profiling on the WLAN.

Question 60

A user is trying to connect to a wireless network that is configured for WPA2-Enterprise security using a corporate laptop. The CA certificate for the authentication server has been installed on the Trusted Root Certification Authorities store on the laptop. The user has been prompted to enter the credentials multiple times, but the authentication has not succeeded. What is causing the issue?

Options:

A.

There is an IEEE invalid 802.1X authentication policy on the authentication server.

B.

The user Active Directory account is locked out after several failed attempts.

C.

There is an invalid 802.1X authentication policy on the authenticator.

D.

The laptop has not received a valid IP address from the wireless controller.

Question 61

A company is concerned about unauthorized APs on their wired and wireless networks. The company implements a Cisco Catalyst Center (formerly DNA Center) solution. Which feature must be enabled?

Options:

A.

Rogue Management application package

B.

Neighbor Assisted Roaming

C.

Sniffer package

D.

Monitor Mode package

Question 62

Where is a Cisco OEAP enabled on a Cisco Catalyst 9800 Series Wireless Controller?

Options:

A.

RF Profile

B.

Flex Profile

C.

Policy Profile

D.

AP Join Profile

Question 63

The CTO of an organization wants to ensure that all Android devices are placed into a separate VLAN on their wireless network. However, the CTO does not want to deploy ISE. Which feature must be implemented on the Cisco WLC?

Options:

A.

WLAN local policy

B.

RADIUS server overwrite interface

C.

AAA override

D.

custom AVC profile

Question 64

Which statement about the VideoStream/Multicast Direct feature is true?

Options:

A.

IP multicast traffic is reliable over WLAN by default as defined by the IEEE 802.11 wireless multicast delivery mechanism.

B.

Each VideoStream client acknowledges receiving a video IP multicast stream.

C.

It converts the unicast frame to a multicast frame over the air.

D.

It makes the delivery of the IP multicast stream less reliable over the air, but reliable over Ethernet.

Question 65

An organization is supporting remote workers in different locations. In order to provide wireless network connectivity and services, OfficeExtend has been implemented. The wireless connectivity is working, but users report losing connectivity to their local network printers. Which solution must be used to address this issue?

Options:

A.

OEAP gateway override

B.

OEAP split tunnel

C.

WLAN static IP tunneling

D.

FlexConnect local switching

Question 66

A wireless administrator must assess the different client types connected to Cisco Catalyst 9800 Series Wireless Controller without using any external servers. Which configuration must be added to the controller to achieve this assessment?

Options:

A.

native profile

B.

MAC classification

C.

local profile

D.

device classification

Question 67

A customer is concerned that their wireless network is detecting spurious threats from channels that are not being used by their wireless infrastructure. Which two technologies must they deploy? (Choose two.)

Options:

A.

FlexConnect mode

B.

monitor mode

C.

sniffer mode with no submode

D.

local mode with WIPS submode

E.

rogue detector mode

Question 68

An IT administrator deployed an OEAP to the home of a remote user, but the OEAP cannot reach the WLC. Which two configuration settings must be completed before an OEAP is deployed successfully? (Choose two.)

Options:

A.

Configure Secondary Controller Name and Management IP address in the High Availability tab.

B.

Configure LSC to authorize the OEAP.

C.

Configure the AP mode to FlexConnect and check the box for Office Extend AP.

D.

Configure the WLC with an external IP address on the virtual interface.

E.

Configure Primary Controller Name and Management IP address in the High Availability tab.

Question 69

An administrator receives reports of many interferers in the wireless network and wants to get the location of these interferers from the maps in Cisco Prime Infrastructure.

When looking at the floor plans/maps, the administrator does not see any interferers, but can see all wireless clients located successfully.

Which two statements define the cause of the issue? (Choose two.)

Options:

A.

MSE is not added to Cisco Prime infrastructure and synchronized.

B.

Interferer tracking is not enabled on the MSE.

C.

SNMP between Cisco Prime Infrastructure and the WLC is failing.

D.

Context Aware Service tracking limit has already been reached with tracking other elements.

E.

NSMP communication is inactive with the WLC.

Question 70

Refer to the exhibit.

A network administrator deploys the DHCP profiler service in two ISE servers: 10.3.10.101 and 10.3.10.102. All BYOD devices connecting to WLAN on VLAN63 have been incorrectly profiled and are assigned as unknown profiled endpoints. Which action efficiently rectifies the issue according to Cisco recommendations?

Options:

A.

Nothing needed to be added on the Cisco WLC or VLAN interface. The ISE configuration must be fixed.

B.

Disable DHCP proxy on the Cisco WLC.

C.

Disable DHCP proxy on the Cisco WLC and run the ip helper-address command under the VLAN interface to point to DHCP and the two ISE servers.

D.

Keep DHCP proxy enabled on the Cisco WLC and define helper-address under the VLAN interface to point to the two ISE servers.

Question 71

An engineer must achieve the highest level of location accuracy possible for a new mobile application. Which technology must be implemented for this use case?

Options:

A.

Time Difference of Arrival

B.

Bluetooth Low Energy

C.

RSS lateration

D.

ToA lateration

Question 72

Which CLI command do you use to shut down the 2.4 GHz radio of the Floor1_AP1 AP on a Cisco 3850 Switch?

Options:

A.

ap name Floor1_AP1 dot11 shutdown 24ghz

B.

ap name Floor1_AP1 dot11 5ghz shutdown

C.

ap name Floor1 AP1 dot11 24ghz shutdown

D.

ap name Floor1_AP1 shutdown dot11 24ghz

Question 73

An engineer is following the proper upgrade path to upgrade a Cisco AireOS WLC from version 7.3 to 8.9. Which two ACLs for Cisco CWA must be configured when upgrading from the specified codes? (Choose two.)

Options:

A.

Permit 0.0.0.0 0.0.0.0 any DNS any

B.

Permit 0.0.0.0 0.0.0.0 UDP DNS any

C.

Permit 0.0.0.0 0.0.0.0 UDP any DNS

D.

Permit any any any

E.

Permit 0.0.0.0 0.0.0.0 UDP any any

Question 74

An IT administrator deploys Cisco 2802i APs in all office locations, including main campus and branch offices. The WLC that manages the APs is located at the data center on the main campus. The APs on the main campus are configured to use Local mode and the APs in the branches use FlexConnect mode. Which configuration must be applied to the APs for corporate devices on the main campus to be mapped to the local LAN switch on different VLANs according to the VLAN tag ID and WLAN?

Options:

A.

Enable Central DHCP Processing.

B.

Disable FlexConnect Local Auth

C.

Enable FlexConnect Local Switching.

D.

Disable VLAN-based Central Switching.

Question 75

After looking in the logs, an engineer notices that RRM keeps changing the channels for non-IEEE 802.11 interferers. After surveying the area, it has been decided that RRM should not change the channel. Which feature must be enabled to ignore non-802.11 interference?

Options:

A.

Avoid Cisco AP Load

B.

Avoid Non-802.11 Noise

C.

Avoid Persistent Non-WiFi Interference

D.

Avoid Foreign AP Interference

Question 76

An engineer must enable LSS for the AppleTV mDNS service only when ORIGIN is set to Wired. Which action meets this requirement?

Options:

A.

Set ORIGIN to Wired. Enable LSS by using the config mdns service Iss All command.

B.

Set ORIGIN to Wired. Enable LSS by using the config mdns service Iss AppleTV command.

C.

Set ORIGIN to either Wireless or All. Enable LSS by using the config mdns service Iss All command.

D.

Set ORIGIN to either Wireless or All. Enable LSS by using the config mdns service Iss enable AppleTV command.

Question 77

A customer is experiencing performance issues with its wireless network and asks a wireless engineer to provide information about all sources of interference and their impacts to the wireless network over the past few days. Where can the requested information be accessed?

Options:

A.

CleanAir reports on Cisco Prime Infrastructure

B.

Performance reports on Cisco Prime Infrastructure

C.

Interference Devices reports on Cisco Wireless LAN Controller

D.

Air Quality reports on Cisco Wireless LAN Controller

Question 78

An SSID is set up with central web authentication using Cisco ISE The new SSID uses guest tunneling from the foreign controller to the anchor controller. Which device must be configured ISE as the one performing the RADIUS authentication requests for the web authentication method?

Options:

A.

APs

B.

authentication server

C.

anchor controller

D.

foreign controller

Question 79

An engineer is setting up a new unique NAD on a Cisco ISE.

Which two parameters must be configured? (Choose two.)

Options:

A.

device host name

B.

device password

C.

RADIUS fallback

D.

device IP address

E.

RADIUS shared secret

Question 80

A network engineer must get an autonomous AP to authenticate to the upstream switch via IEEE 802.1 X. Drag and drop the commands from the left onto the right to complete the configuration.

Options:

Question 81

An engineer is planning an image upgrade of the WLC, and hundreds of APs are spread across remote sites with limited WAN bandwidth. The engineer must minimize the WAN utilization for this upgrade. Which approach must be used for the AP image upgrade?

Options:

A.

Predownload the new code to the APs.

B.

Use the Smart AP image upgrade feature.

C.

Allow the APs to download their code after WLC reboot.

D.

Execute parallel TFTP code upgrade on the APs via SSH.

Question 82

An engineer is configuring location services within Cisco Spaces (formerly Cisco DNA Spaces). The solution must track interfering devices. Which component of Cisco Spaces must be configured?

Options:

A.

Proximity Reporting

B.

Detect and Locate

C.

Cisco DNA Spaces SDK

D.

Location Analytics

Question 83

A WLC must be configured to allow multiple mDNS profiles based on a user authentication profile configured in Cisco ISE. Which WLAN setting must be configured?

Options:

A.

mDNS policy

B.

mDNS Snooping

C.

AAA Override

D.

service advertisement

Page: 1 / 28
Total 277 questions