New Year Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Free and Premium Cisco 300-430 Dumps Questions Answers

Page: 1 / 21
Total 277 questions

Implementing Cisco Enterprise Wireless Networks (300-430 ENWLSI) Questions and Answers

Question 1

A customer managing a large network has implemented location services. Due to heavy load, it is needed to load balance the data coming through NMSP from the WLCs. Load must be spread between multiple CMX servers to help optimize the data flow for APs. Which configuration in CMX meets this requirement?

Options:

A.

cmxctl config feature flags nmsplb.cmx-ap-grouping true

B.

cmxctl config feature flags nmsplb.cmxgrouping true

C.

cmxctl config feature flags nmsplb.cmx-loadbalance true

D.

cmxctl config feature flags nmsplb.cmx-rssi-distribute true

Buy Now
Question 2

An engineer is configuring location services within Cisco Spaces (formerly Cisco DNA Spaces). The solution must track interfering devices. Which component of Cisco Spaces must be configured?

Options:

A.

Proximity Reporting

B.

Detect and Locate

C.

Cisco DNA Spaces SDK

D.

Location Analytics

Question 3

An engineer is configuring wireless guests using Cisco CWA. When a device connects, it must be redirected to the WebAuth, but this was failing. What must be configured for the device to be redirected correctly?

Options:

A.

Configure the ACL name on the anchor controller

B.

Enabled DHCP option 7.

C.

Remove the CN entry from the SAN

D.

Allow ICMP toward the portal

Question 4

A wireless engineer must implement a corporate wireless network for a large company in the most efficient way possible. The wireless network must support 32 VLANs for 300 employees in different departments. Which solution must the engineer choose?

Options:

A.

Configure a second WLC to support half of the APs in the deployment.

B.

Configure one single SSID and implement Cisco ISE for VLAN assignment according to different user roles.

C.

Configure different AP groups to support different VLANs, so that all of the WLANs can be broadcast on both radios.

D.

Configure 16 WLANs to be broadcast on the 2.4-GHz band and 16 WLANs to be broadcast on the 5.0-GHz band.

Question 5

An engineer must implement rogue containment for an SSID. What is the maximum number of APs that should be used for containment?

Options:

A.

1

B.

2

C.

3

D.

4

Question 6

A network engineer must segregate all IPads on the guest WLAN to a separate VLAN. How does the engineer accomplish this task without using Cisco

ISE?

Options:

A.

Create a local policy on the WLC.

B.

Use 802.1x authentication to profile the devices.

C.

Use an mDNS profile for the iPad device.

D.

Enable RADIUS DHCP profiling on the WLAN.

Question 7

An enterprise has recently deployed a voice and video solution available to all employees using AireOS controllers. The employees must use this service over their laptops, but users report poor service when connected to the wireless network. The programs that consume bandwidth must be identified and restricted. Which configuration on the WLAN aids in recognizing the traffic?

Options:

A.

NetFlow Monitor

B.

AVC Profile

C.

QoS Profile

D.

Application Visibility

Question 8

Refer to the exhibit.

An engineer tries to manage the rogues on the Cisco WLC. Based on the configuration, which AP is marked as malicious by the controller?

Options:

A.

rogue AP with SSID admin seen for 4000 seconds and heard at -70dBm

B.

rogue AP with SSID admin seen for 3000 seconds and heard at -60dBm

C.

rogue AP with SSID admin seen for 4000 seconds and heard at -60dBm

D.

rogue AP with SSID admin seen for 3000 seconds and heard at -70dBm

Question 9

An engineer is considering an MDM integration with Cisco ISE to assist with security for lost devices.

Which two functions of MDM increase security for lost devices that access data from the network? (Choose two.)

Options:

A.

PIN enforcement

B.

Jailbreak/root detection

C.

data wipe

D.

data encryption

E.

data loss prevention

Question 10

A network engineer is configuring a Cisco AireOS WLC environment for central web authentication using Cisco ISE.

The controllers are configured using auto-anchor for the guest network.

Which three components must be implemented for the foreign WLC?(Choose three.)

Options:

A.

DHCP RADIUS profiling enabled.

B.

HTTP RADIUS profiling enabled.

C.

UDP/1812-1813 open to ISE

D.

downloadable preauth ACL on ISE

E.

local preauth ACL on WLC

F.

WLAN Layer 2 security

Question 11

Refer to the exhibit.

An administrator notices slower location updates from the controller to Cisco CMX. Which command must be configured to get an update every 5 seconds for rogues?

Options:

A.

config location notification interval rssi rogues 5

B.

config nmsp notification interval rssi rogues 5

C.

config subscription notification interval rssi rogues 5

D.

config cmx notification interval rssi rogues 5

Question 12

Refer to the exhibit.

An engineer implemented the CPU ACL on your Cisco 5520 Series Wireless LAN Controller, and the controller is no longer manageable via the network. What must be changes on this CPU ACL to enable it to manage the controller again?

Options:

A.

Permit statements must be added to the top of the ACL in both directions, which specify the network to be managed from and the virtual interface of the controller.

B.

Line 1 must be set to a destination port of HTTP.

C.

Permit statements must be added to the top of the ACL, which specify the network to be managed from.

D.

Line 1 must be set to the inbound direction.

Question 13

All APs are receiving multicast traffic, instead of only the APs that need it. What is the cause of this problem?

Options:

A.

The multicast group includes all APs

B.

The wrong multicast address was used

C.

The multicast group is assigned the wrong VLAN

D.

Multicast IGMP snooping is not enabled

Question 14

An engineer must configure MSE to provide guests access using social media authentication. Which service does the engineer configure so that guests use Facebook credentials to authenticate?

Options:

A.

Social Connect

B.

Client Connect

C.

Visitor Connect

D.

Guest Connect

Question 15

What is characteristic of Multicast mode that affects the wireless network when configured on a Cisco WLC?

Options:

A.

Packet replication is performed on the controller

B.

The controller sends every multicast packet associated APs

C.

Packet replication is performed on the network

D.

The controller sends multicast packets to a user group.

Question 16

What is the maximum time range that can be viewed on the Cisco DNA Center issues and alarms page?

Options:

A.

3 hours

B.

24 hours

C.

3 days

D.

7 days

Question 17

Refer to the exhibit.

Which area indicates the greatest impact on the wireless network when viewing the Cisco CleanAir Zone of Impact map of interferers?

Options:

A.

A

B.

B

C.

C

D.

D

Question 18

An engineer is configuring an autonomous AP to allow 802.1X authentication for users. The policy on the RADIUS server only allows for EAP-TLS authentication. Which authentication method must the engineer select under the Client Authentication Settings for the SSID on the AP?

Options:

A.

Open

B.

Shared

C.

Web

D.

Network EAP

Question 19

Where is a Cisco OEAP enabled on a Cisco Catalyst 9800 Series Wireless Controller?

Options:

A.

RF Profile

B.

Flex Profile

C.

Policy Profile

D.

AP Join Profile

Question 20

Refer to the exhibit.

An engineer needs to manage non-802.11 interference. What is observed in the output on PI?

Options:

A.

At least one strong interferer is impacting connectivity at this site.

B.

Several light interferers are collectively impacting connectivity at this site.

C.

The three individual clusters shown indicate poor AP placement.

D.

RF at this site is unable to provide adequate wireless performance.

Question 21

Refer to the exhibit. A network administrator must automate notifications for Security Advisories Data reports on the Cisco Catalyst Center v2.3.7 using the Report notification feature. Preferring a programmable approach over UI/CLI, the administrator decides to create a webhook via the Cisco DNA Center API to send real-time HTTP notifications to an external application. The webhook URL https://example.com/webhook uses HTTPS with a self-signed certificate, which requires a specific configuration in the payload to ensure the webhook functions correctly. Which code snippet must be placed onto the box in the code to complete the Python script that configures the webhook to use the self-signed certificate to extract the Security Advisories Data report?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 22

A FlexConnect remote office deployment is using five 2702i APs indoors and two 1532i APs outdoors. When a code upgrade is performed and FlexConnect Smart AP Image Upgrade is leveraged, but no FlexConnect Master AP has been configured, how many image transfers between the WLC and APs will occur?

Options:

A.

1

B.

2

C.

5

D.

7

Question 23

An engineer completes the setup of a two-node Cisco ISE deployment for a guest portal. When testing the portal, the engineer notices that sometimes there is a certificate CN mismatch. Which certificate type helps resolve this issue?

Options:

A.

Public-Signed Root

B.

Public-Signed SAN

C.

Self-Signed Wildcard

D.

Self-Signed Standard

Question 24

Which QoS level is recommended for guest services?

Options:

A.

gold

B.

bronze

C.

platinum

D.

silver

Question 25

Which two restrictions are in place with regards to configuring mDNS? (Choose two.)

Options:

A.

mDNS uses only UDP port 5436 as a destination port.

B.

mDNS cannot use UDP port 5353 as the destination port.

C.

mDNS is not supported on FlexConnect APs with a locally switched WLAN.

D.

Controller software must be newer than 7.0.6+.

E.

mDNS is not supported over IPv6.

Question 26

What is the difference between PIM sparse mode and PIM dense mode?

Options:

A.

Sparse mode supports only one switch. Dense mode supports multiswitch networks.

B.

Sparse mode floods. Dense mode uses distribution trees.

C.

Sparse mode uses distribution trees. Dense mode floods.

D.

Sparse mode supports multiswitch networks. Dense mode supports only one switch.

Question 27

Refer to the exhibit.

What is the reason that the wireless client cannot get the RUN state?

Options:

A.

It has no communication with Cisco ISE.

B.

An authentication error has occurred.

C.

It is not getting the IP address.

D.

Because of central switching, the AP must reach the Cisco ISE directly.

Question 28

An engineer has configured passive fallback mode for RADIUS with default timer settings. What will occur when the primary RADIUS fails then recovers?

Options:

A.

RADIUS requests will be sent to the secondary RADIUS server until the secondary fails to respond.

B.

The controller will immediately revert back after it receives a RADIUS probe from the primary server.

C.

After the inactive time expires the controller will send RADIUS to the primary.

D.

Once RADIUS probe messages determine the primary controller is active the controller will revert back to the primary RADIUS.

Question 29

An engineer must use Cisco AVC on a Cisco WLC to prioritize Cisco IP cameras that use the wireless network. Which element do you configure in a rule?

Options:

A.

permit-ACL

B.

WMM required

C.

mark

D.

rate-limit

Question 30

Which feature on the Cisco Wireless LAN Controller must be present to support dynamic VLAN mapping?

Options:

A.

FlexConnect ACL

B.

VLAN name override

C.

CCKM/OKC

D.

AAA override

Question 31

In a Cisco WLAN deployment, it is required that all Aps from branch1 remain operational even if the control plane CAPWAP tunnel is down because of a WAN failure to headquarters. Which operational mode must be configured on the APs?

Options:

A.

disconnected

B.

standalone

C.

lightweight

D.

connected

Question 32

Refer to the exhibit.

An engineer implemented the CPU ACL on your Cisco 5520 Series Wireless LAN Controller, and the controller is no longer manageable via the network. What must be changes on this CPU ACL to enable it to manage the controller again?

Options:

A.

Permit statements must be added to the top of the ACL in both directions, which specify the network to be managed from and the virtual interface of the controller.

B.

Line 1 must be set to a destination port of HTTP.

C.

Permit statements must be added to the top of the ACL, which specify the network to be managed from.

D.

Line 1 must be set to the inbound direction.

Question 33

A wireless engineer has performed a Wireshark ccapture on an 802.1x authentication process to troubleshoot a connectivity issue.

Which two types of packet does the EAP contain? (Choose two.)

Options:

A.

EAP complete

B.

EAP response

C.

EAP failure

D.

EAP request

E.

EAP reply

Question 34

An engineer set up a VoWLAN with QoS on the WLC and a class map on the switch, but the markings are not being preserved correctly in the end-to- end traffic flow. Which two configurations on the wired network ensure end-to-end QoS? (Choose two.)

Options:

A.

trust boundaries

B.

access lists

C.

policy maps

D.

QoS licenses

E.

NetFlow

Question 35

A network engineer must get an autonomous AP to authenticate to the upstream switch via IEEE 802.1 X. Drag and drop the commands from the left onto the right to complete the configuration.

Options:

Question 36

After receiving an alert about a rogue AP, a network engineer logs into Cisco Prime Infrastructure and looks at the floor map where the AP that detected the rogue is located. The map is synchronized with a mobility services engine that determines that the rogue device is actually inside the campus. The engineer determines that the rogue is a security threat and decides to stop if from broadcasting inside the enterprise wireless network. What is the fastest way to disable the rogue?

Options:

A.

Go to the location where the rogue device is indicated to be and disable the power.

B.

Create an SSID similar to the rogue to disable clients from connecting to it.

C.

Update the status of the rogue in Cisco Prime Infrastructure to contained.

D.

Classify the rogue as malicious in Cisco Prime Infrastructure.

Question 37

The security policy mandates that only controller web management traffic is allowed from the IT subnet. In testing, an engineer is trying to connect to a WLAN with Web Authentication for guest users, but the page is timing out on the wireless client browser. What is the cause of the issue?

Options:

A.

The implemented CPU ACL on the controller is blocking HTTP/HTTPS traffic from the guest clients.

B.

Web Authentication Redirect is not supported with CPU ACLs.

C.

The DNS server that is configured on the controller is incorrect.

D.

Web Authentication Redirect is supported only with Internet Explorer, and the client is using Google Chrome.

Question 38

An engineer has configured Media Stream on the WLC and must guarantee at least 2 Mbps stream per user. Which RRC template should the engineer use?

Options:

A.

coarse

B.

medium

C.

low

D.

ordinary

Question 39

An engineer is troubleshooting rogue access points that are showing up in Cisco Prime Infrastructure.

What is maximum number of APS the engineer can use to contain an identified rogue access point in the WLC?

Options:

A.

3

B.

4

C.

6

D.

5

Question 40

On a branch office deployment, it has been noted that if the FlexConnect AP is in standalone mode and loses connection to the WLC, all clients are disconnected, and the SSID is no longer advertised. Considering that FlexConnect local switching is enabled, which setting is causing this behavior?

Options:

A.

ISE NAC is enabled

B.

802.11r Fast Transition is enabled

C.

Client Exclusion is enabled

D.

FlexConnect Local Auth is disabled

Question 41

An engineer must achieve the highest level of location accuracy possible for a new mobile application. Which technology must be implemented for this use case?

Options:

A.

Time Difference of Arrival

B.

Bluetooth Low Energy

C.

RSS lateration

D.

ToA lateration

Question 42

Branch wireless users report that they can no longer access services from head office but can access services locally at the site. New wireless users can associate to the wireless while the WAN is down. Which three elements (Cisco FlexConnect state, operation mode, and authentication method) are seen in this scenario? (Choose three.)

Options:

A.

authentication-local/switch-local

B.

WPA2 personal

C.

authentication-central/switch-central

D.

lightweight mode

E.

standalone mode

F.

WEB authentication

Question 43

A network engineer is deploying 8865 IP phones with wireless clients connected to them. In order to apply the appropriate QoS, the IP voice traffic needs to be distinguished from client data traffic. Which switch configuration feature must be enabled?

Options:

A.

Voice VLAN

B.

QBSS

C.

WME

D.

QoS routing

Question 44

An engineer has successfully implemented 10 active RFID tags in an office environment. The tags are not visible when the location accuracy is tested on the Cisco CMX Detect and Locate window. Which setting on Cisco CMX allows the engineer to view the tags?

Options:

A.

Enable RFID tags in tracking options.

B.

Enable probing clients for active tags.

C.

Define an RFID group globally and add the tags.

D.

Enable hyperlocation services for RFID.

Question 45

A wireless engineer deployed all remote sites as FlexConnect. The client VLAN assignment on these sites is configured manually mapped by WLAN and using local switching. Dynamic VLAN assignment is provided by the newly deployed Cisco ISE. Which IETF attribute must be configured on the AAA server to send that VLAN ID?

Options:

A.

Tunnel-Medium-Type

B.

Tunnel-Client-Endpoint

C.

Tunnel-Assignment-ID

D.

Tunnel-Private-Group-ID

Question 46

An engineer configures a deployment to support:

Cisco CMX

licenses for at least 3000 APs

6000 wIPS licenses

The Cisco vMSE appliance must be sized for this deployment. Which Cisco vMSE Release 8 option must the engineer deploy?

Options:

A.

Large vMSE

B.

Low-End vMSE

C.

Standard vMSE

D.

High-End vMSE

Question 47

A customer wants the APs in the CEO’s office to have different usernames and passwords for administrative support than the other APs deployed throughout the facility. Which feature must be enabled on the WLC and APs to achieve this goal?

Options:

A.

local management users

B.

HTTPS access

C.

802.1X supplicant credentials

D.

override global credentials

Question 48

A wireless network has been implemented to enable multicast video to be streamed reliably over the wireless link to the wireless users. After a client reports that the video is unable to stream, the administrator determines that the client is connecting at a data rate of 12 Mbps and is trying to stream to a valid multicast address on the network. Which two actions must be applied? (Choose two.)

Options:

A.

Turn off IGMP snooping for all the configured WLANs on the controller.

B.

Implement video-stream for the multicast video on the controller.

C.

Allow multicast-direct to work correctly and multicast-direct to be enabled globally.

D.

Change the WLAN QoS value to Bronze for the WLAN that multicast will be enabled.

E.

Allow RTSP to stream the video due to wireless multicast not using acknowledgements.

Question 49

A shopping center uses AireOS controllers with Cisco Wave 2 APs. A separate WLAN named Guest-012345678-WLAN is used for guest wireless clients. Management needs location analytics to determine popular areas. CMX must track only associated clients. What must be selected on the CMX server settings?

Options:

A.

Exclude probing clients

B.

Duty Cycle Cutoff

C.

Enable Locally Administered MAC Filtering

D.

Enable Location MAC Filtering

Question 50

Which EAP method can an AP use to authenticate to the wired network?

Options:

A.

EAP-GTC

B.

EAP-MD5

C.

EAP-TLS

D.

EAP-FAST

Question 51

What must be configured on ISE version 2.1 BYOD when using Single SSID?

Options:

A.

open authentication

B.

802.1x

C.

no authentication

D.

WPA2

Question 52

A WLC must be configured to allow multiple mDNS profiles based on a user authentication profile configured in Cisco ISE. Which WLAN setting must be configured?

Options:

A.

mDNS policy

B.

mDNS Snooping

C.

AAA Override

D.

service advertisement

Question 53

Which devices can be tracked with the Cisco Context Aware Services?

Options:

A.

wired and wireless devices

B.

wireless devices

C.

wired devices

D.

Cisco certified wireless devices

Question 54

Which three characteristics of a rogue AP pose a high security risk? (Choose three.)

Options:

A.

open authentication

B.

high RSSI

C.

foreign SSID

D.

accepts clients

E.

low RSSI

F.

distant location

Question 55

An engineer must configure Cisco OEAPs for three executives. As soon as the NAT address is configured on the management interface, it is noticed that the WLC is not responding for APs that are trying to associate to the internal IP management address. Which command should be used to reconcile this?

Options:

A.

config flexconnect office-extend nat-ip-only disable

B.

config network ap-discovery nap-ip-only enable

C.

config flexconnect office-extend nat-ip-only enable

D.

config network ap-discovery nat-ip-only disable

Question 56

Refer to the exhibit.

An engineer has deployed the Cisco CMX solution to track and detect the number of users who visit the office each day. The CMX dashboard is not showing any data. Which action resolves this issue?

Options:

A.

Configure Single Sign-On authentication.

B.

Add the WLCs to CMX.

C.

Copy the exported Maps from CMX server to PI using SCP.

D.

Install an evaluation license to CMX server.

Question 57

When implementing self-registration for guest/BYOD devices, what happens when an employee tries to connect four devices to the network at the same time?

Options:

A.

The last device is removed and the newly added device is updated as active device.

B.

The registration is allowed, but only one device is connected at any given time.

C.

All devices are allowed on the network simultaneously.

D.

Purge time dictates how long a device is registered to the portal.

Question 58

Refer to the exhibit.

An engineer is creating an ACL to restrict some traffic to the WLC CPU. Which selection must be made from the direction drop- down list?

Options:

A.

It must be Inbound because traffic goes to the WLC.

B.

Packet direction has no significance; it is always Any.

C.

It must be Outbound because it is traffic that is generated from the WLC.

D.

To have the complete list of options, the CPU ACL must be created only by the CLI.

Question 59

The network management team in a large shopping center has detected numerous rogue APs from local coffee shops that are broadcasting SSIDs. All of these SSIDs have names starting with ATC (for example, ATC302, ATC011, and ATC566). A wireless network engineer must appropriately classify these SSIDs using the Rogue Rules feature. Drag and drop the options from the left onto the categories in which they must be used on the right. Not all options are used.

Options:

Question 60

Refer to the exhibit.

An engineer configured a BYOD policy that allows for printing on the WLAN using Bonjour services. However, the engineer cannot get printing to work. The WLC firmware is 8.x. What must be implemented on the controller?

Options:

A.

Enable mDNS and IGMP snooping.

B.

Activate location-specific services.

C.

Configure Secure Web Mode Cipher-Option SSLv2.

D.

Increase the IGMP Query Interval value

Question 61

Refer to the exhibit.

An engineer is troubleshooting a client connectivity issue. The client is in the RUN state, and no traffic is passed after authenticating by using Cisco ISE. Which action resolves the problem?

Options:

A.

Configure a different client VLAN after authentication.

B.

Disable the ACL that prevents traffic from being allowed.

C.

Apply a lower WMM QoS.

D.

Enable rate-limiting to the client.

Question 62

A Cisco CMX 3375 appliance on the 10.6.1 version code counts duplicate client entries, which creates wrong location analytics. The issue is primarily from iOS clients with the private MAC address feature enabled. Enabling this feature requires an upgrade of the Cisco CMX 3375 appliance in a high availability pair to version 10.6.3. SCP transfers the Cisco CMX image, but the upgrade script run fails. Which configuration change resolves this issue?

Options:

A.

Upgrade the high availability pair to version 10.6.2 image first and then upgrade to version 10.6.3.

B.

Save configuration and use the upgrade script to upgrade the high availability pair without breaking the high availability.

C.

Break the high availability using the cmxha config disable command and upgrade the primary and secondary individuality.

D.

Run root patch to first upgrade to version 10.6.2 and then migrate to version 10.6.3.

Question 63

Where is Cisco Hyperlocation enabled on a Cisco Catalyst 9800 Series Wireless Controller web interface?

Options:

A.

Policy Profile

B.

AP Join Profile

C.

Flex Profile

D.

RF Profile

Question 64

Which component must be integrated with Cisco DNA Center to display the location of a client that is experiencing connectivity issues?

Options:

A.

Cisco Hyperlocation Module

B.

Wireless Intrusion Prevention System

C.

Cisco Connected Mobile Experiences

D.

Cisco Mobility Services Engine

Question 65

An engineer must create an account to log in to the CLI of an access point for troubleshooting. Which configuration on the WLC will accomplish this?

Options:

A.

Allow New Telnet Sessions

B.

ReadWrite User Access Mode

C.

SNMP V3 User

D.

Global Configuration Enable Password

Question 66

Refer to the exhibit.

The image shows a packet capture that was taken at the CLI of the Cisco CMX server. It shows UDP traffic from the WLC coming into the server. What does the capture prove?

Options:

A.

The Cisco CMX server receives NetFlow data from the WLC.

B.

The Cisco CMX server receives NMSP traffic from the WLC.

C.

The Cisco CMX server receives SNMP traffic from the WLC.

D.

The Cisco CMX server receives Angle-of-Arrival data from the WLC.

Question 67

A corporation has a wireless network where all access points are configured in FlexConnect. The WLC has a Data WLAN and a VoWiFi WLAN implemented where centrally-switched SSID is configured for the APs. Which QoS configuration must be implemented for the wireless packets to maintain the marking across the wired and wireless network?

Options:

A.

Set QoS to Platinum.

B.

Enable CAC.

C.

Allow WMM.

D.

Trust DSCP.

Question 68

An engineer wants the wireless voice traffic class of service to be used to determine the queue order for packets received, and then have the differentiated services code point set to match when it is resent to another port on the switch. Which configuration is required in the network?

Options:

A.

Platinum QoS configured on the WLAN

B.

WMM set to required on the WLAN

C.

msl qos trust dscp configured on the controller switch port

D.

msl qos trust cos configured on the controller switch port

Question 69

Where is Cisco Hyperlocation enabled on a Cisco Catalyst 9800 Series Wireless Controller web interface?

Options:

A.

Policy Profile

B.

AP Join Profile

C.

Flex Profile

D.

RF Profile

Question 70

Refer to the exhibit.

The security team has implemented ISE as an AAA solution for the wireless network. The wireless engineer notices that though clients are able to authenticate successfully, the ISE policies that are designed to place them on different interfaces are not working. Which configuration must be applied in the RADIUS Authentication Settings section from the ISE Network Device page?

Options:

A.

Disable KeyWrap.

B.

Use ASCII for the key input format.

C.

Change the CoA Port.

D.

Correct the shared secret.

Question 71

During the EAP process and specifically related to the client authentication session, which encrypted key is sent from the RADIUS server to the access point?

Options:

A.

WPA key

B.

session key

C.

encryption key

D.

shared-secret key

Question 72

You are configuring the social login for a guest network. Which three options are configurable social connectors in Cisco CMX Visitor Connect? (Chose three)

Options:

A.

Linkedn

B.

Pinterest

C.

Medium

D.

Google+

E.

Facebook

F.

Myspace

Question 73

Which two protocols are used to communicate between the Cisco MSE and the Cisco Prime Infrastructure network management software? (Choose two.)

Options:

A.

HTTPS

B.

Telnet

C.

SOAP

D.

SSH

E.

NMSP

Question 74

Refer to the exhibit.

An ACL is configured to restrict access for BYOD clients. The ACL must redirect devices to the guest portal. To which two devices on the local network must the ACL allow access other than the DHCP server? (Choose two.)

Options:

A.

RADIUS server

B.

DNS server

C.

Cisco ISE

D.

SNMP server

E.

WLC

Question 75

Which AP model of the Cisco Aironet Active Sensor is used with Cisco DNA Center?

Options:

A.

1800s

B.

3600e

C.

3800s

D.

4800i

Question 76

A hospital wants to offer indoor directions to patient rooms utilizing its existing wireless infrastructure. The wireless network has been using location services specifications. Which two components must be installed to support this requirement? (Choose two.)

Options:

A.

WIPS

B.

Cisco MSE

C.

Cisco CMX Visitor Connect

D.

Cisco CMX AppEngage

E.

Cisco CMX Analytics

Question 77

A Cisco WLC has been added to the network and Cisco ISE as a network device, but authentication is failing. Which configuration within the network device configuration should be verified?

Options:

A.

SNMP RO community

B.

device interface credentials

C.

device ID

D.

shared secret

Question 78

An engineer is setting up a new unique NAD on a Cisco ISE.

Which two parameters must be configured? (Choose two.)

Options:

A.

device host name

B.

device password

C.

RADIUS fallback

D.

device IP address

E.

RADIUS shared secret

Question 79

An SSID is set up with central web authentication using Cisco ISE The new SSID uses guest tunneling from the foreign controller to the anchor controller. Which device must be configured ISE as the one performing the RADIUS authentication requests for the web authentication method?

Options:

A.

APs

B.

authentication server

C.

anchor controller

D.

foreign controller

Question 80

An engineer set up identity-based networking with ISE and configured AAA override on the WLAN. Which two attributes must be used to change the client behavior from the default settings? (Choose two.)

Options:

A.

DHCP timeout

B.

DNS server

C.

IPv6 ACL

D.

DSCP value

E.

multicast address

Question 81

An engineer is configuring a new wireless network for guest access. The Facebook page of the company must be viewed by the guest users before they get access to the network. A Cisco MSE is used as a wireless component. Which URL must be used in the configuration as the external redirection URL?

Options:

A.

http:// :8083/visitor/login.do

B.

http:// :8083/fbwifi/forward

C.

http:// :8084/visitor/login.do

D.

http:// :8084/fbwifi/forward

Question 82

What two actions must be taken by an engineer configuring wireless Identity-Based Networking for a WLAN to enable VLAN tagging? (Choose two.)

Options:

A.

enable AAA override on the WLAN

B.

create and apply the appropriate ACL to the WLAN

C.

update the RADIUS server attributes for tunnel type 64, medium type 65, and tunnel private group type 81

D.

configure RADIUS server with WLAN subnet and VLAN ID E. enable VLAN Select on the wireless LAN controller and the WLAN

Question 83

Which command set configures a Cisco Catalyst 9800 Series Wireless Controller so that the client traffic enters the network at the AP switch port?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Page: 1 / 21
Total 277 questions