Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Free and Premium Cisco 350-101 Dumps Questions Answers

Page: 1 / 8
Total 102 questions

Implementing and Operating Cisco Wireless Core Technologies (350-101 WLCOR)v1.0 Questions and Answers

Question 1

Refer to the exhibit.

A wireless controller is deployed at a branch location to facilitate guest client connectivity. A network engineer configures one WLAN using Web authentication and activates web-based method to align with company security policies. Which configuration enables client authentication for this WLAN?

Options:

A.

security web-auth

B.

wlan webauth 2 webauth

C.

no security wpa wpa2

D.

no security wpa akm dot1x

Buy Now
Question 2

Refer to the exhibit.

The Catalyst 9800 WLC logs show when a client with MAC address 9C:4E:36:8A:2B:F1 fails to connect to a WLAN configured for Wi-Fi Protected Access 3-Enterprise with 802.1X. Which action must the engineer take to resolve the issue?

Options:

A.

Ensure that the AP is using the appropriate credentials.

B.

Change the WLAN to Wi-Fi Protected Access 2-Personal and configure a preshared key.

C.

Verify the client's Active Directory credentials and ensure that the RADIUS server is reachable.

D.

Disable RADIUS NAC on the policy profile assigned to the WLAN.

Question 3

A network administrator at a retail company recently deployed a Cisco Catalyst 9800 WLC. The NOC was unaware of wireless issues until it received reports from users. The network administrator must configure Cisco Catalyst Center to enable effective client issue alerts via email to prevent this happening again. Which action must the network administrator take in Cisco Catalyst Center to meet the requirements?

Options:

A.

Configure a new event alert by navigating to Use Assurance > Platforms > Notifications.

B.

Configure a new notification by navigating to Platform > Developer Toolkit > Event Notifications.

C.

Add the NOC email address by navigating to Use Assurance > Issue Settings > Email.

D.

Add the NOC email address by navigating to Platform > Event Notifications > Email.

Question 4

What is the main benefit of using AI Enhanced RRM on the Cisco Catalyst 9800 wireless controller?

Options:

A.

It is an automatic tuning tool that is used to adjust RF parameters based on static thresholds.

B.

It focuses on increasing the transmit power of access points to maximize coverage regardless of interference.

C.

It disables dynamic channel assignment and power control to maintain a fixed wireless environment for stability.

D.

It uses machine learning and cloud analytics to proactively optimize RF parameters.

Question 5

An engineer must troubleshoot complex wireless performance issues in a large office which is using a Cisco 9176 AP. The engineer must analyze traffic patterns and identify potential sources of interference. The AP must capture all wireless frames in the air and send them to a remote protocol analyzer for detailed inspection. Client connectivity is not required from the AP during the troubleshooting window. Which CLI command must the engineer use on the WLC to enable the required AP mode for this purpose?

Options:

A.

ap name office1st mode monitor

B.

ap name office1st mode sniffer

C.

ap name office1st mode local

D.

ap name office1st mode rogue-detector

Question 6

An organization must manage ongoing firmware updates for redundant controllers in the network. They will use Cisco Catalyst Center for deployment and visibility. The current environment uses centralized and distributed management approaches. Automation and reporting are critical to minimize operational workload. Which method must be used to manage structured update processes and monitor progress throughout the update cycle?

Options:

A.

inventory snapshots from hardware report

B.

software templates

C.

software image management workflows

D.

lifecycle workflow

Question 7

Refer to the exhibit.

A network administrator is working on a WLC to enable user access for contractor desktops using WPA2-Enterprise using EAP-TTLS. The administrator verified the external authentication configuration and now must test network connectivity. Which code snippet must be added to the box in the code to complete the configuration on the WLC that supports authentication with an external server?

Options:

A.

aaa group server radius RADIUS-GRP

B.

aaa group server aaa RADIUS-GRP

C.

aaa server group server radius RADIUS-GRP

D.

aaa server group server radius RADIUS-GRP

Question 8

Which new attribute does IEEE 802.11ax introduce when used in wireless local area networks?

Options:

A.

60 GHz utilization

B.

Wi-Fi multimedia

C.

OFDMA

D.

MIMO

Question 9

Refer to the exhibit.

import requests

import json

API_ENDPOINT =

AUTH_TOKEN = "YOUR_SECRET_API_TOKEN"

headers = {

"Accept": "application/json",

"Authorization": f"Bearer {AUTH_TOKEN}"

}

print("Fetching wireless inventory from the API...")

try:

response = requests.get(API_ENDPOINT, headers=headers, timeout=10)

response.raise_for_status()

wireless_inventory_list = response.json()

print("Successfully retrieved and parsed device data.\n")

print("--- Wireless Device Summary ---")

if isinstance(wireless_inventory_list, list) and wireless_inventory_list:

for device in wireless_inventory_list:

mac = device.get("macAddress", "N/A")

ip = device.get("ipAddress", "N/A")

print(f"Device Found - > MAC: {mac}, IP: {ip}")

else:

print("No wireless devices were found in the inventory.")

except requests.exceptions.RequestException as e:

print(f"Error during API request: {e}")

except json.JSONDecodeError:

print("Error: Failed to parse the response from the API. It is not valid JSON.")

A Cisco engineer is analyzing how a dictionary interacts with key-value pairs in a Python script that processes device records collected from a wireless controller. The engineer reviews the construction of the script to interpret the sequence used for data extraction. Which element performs the interaction within the script?

Options:

A.

pop operation

B.

import function

C.

get() method

D.

format expression

Question 10

An IT team is deploying Meraki APs at a remote branch and must ensure that they are automatically assigned to the correct network in the Meraki dashboard. The branch is scheduled to receive 20 new APs, and site connectivity to headquarters was set up. Before shipping the APs, the team must make sure that each one is claimed by the intended network for management and monitoring. Which deployment action must they take before physically connecting the APs?

Options:

A.

Activate mesh networking mode for all the new APs before installation.

B.

Add the AP serial numbers to the required network within the Meraki dashboard.

C.

Preconfigure SSID names and VLAN tags on the local page of each AP in the Meraki dashboard.

D.

Create a separate DHCP scope for all the new APs on the local server.

Question 11

Refer to the exhibit. A startup company has recently moved to new offices and performed a full network refresh. The application development team requested a high-speed reliable wireless network to use for testing real-time applications. Although, the wireless network is Wi-Fi 7 enabled, the wireless clients are connecting using lower speeds. Which configuration must be applied on the WLC to increase throughput?

Options:

A.

security wpa3 akm sae ext-key

B.

security wpa wpa2 wpa3 aes512

C.

security wpa wpa2 wpa3 tkip512

D.

security wpa wpa2 ciphers gcmp256

Question 12

Refer to the exhibit.

An engineer must configure wireless guest networking for a deployment at site A, which requires support for guest VLAN assignment and assignment for wlan guest-network 20. The controller will provide network segregation and restrict access to internal resources. Based on the configuration commands, which action meets the requirements?

Options:

A.

Establish a mesh bridge connection for the guest VLAN and assign logical interface for isolation.

B.

Create a policy profile for the guest VLAN and a policy tag to map the WLAN to the policy profile.

C.

Assign a policy tag to map the to WLAN and assign a physical interface for isolation.

D.

Implement the Spanning Tree Protocol and assign an AP group name.

Question 13

Which Cisco technology leverages machine learning methods and a cloud learning platform that helps to identify critical issues?

Options:

A.

Catalyst Center Assurance

B.

Network Services

C.

Catalyst Center LLM Insights

D.

AI Network Analytics

Question 14

A network engineer has been tasked with migrating the management mode of a Cisco 9176 AP named "Cisco-AP053540555" in a large enterprise wireless deployment. The AP is currently managed by a Cisco Catalyst 9800 Series WLC, but the organization is transitioning to Meraki cloud management for centralized control and monitoring. To complete this migration, the engineer needs to change the AP's management mode to Meraki with force and noprompt to skip validations using the CLI on the wireless controller. What command must the engineer use?

Options:

A.

management meraki force noprompt mode

B.

ap management mode meraki force noprompt

C.

ap management meraki force noprompt mode

D.

management-mode meraki force noprompt

Question 15

Which hierarchy in a YANG data modeling approach describes a relationship in the context of NETCONF device configuration?

Options:

A.

object and attribute model

B.

child and parent structure

C.

hub and spoke model

D.

tree and leaf-based structure

Question 16

Which feature does bridge mode provide in a Cisco wireless mesh architecture?

Options:

A.

It enables point-to-point communication between network segments.

B.

It switches all traffic passing through the AP to 2.4 GHz by default.

C.

It adjusts RF transmit power on any neighbor nodes.

D.

It communicates with WAN edge by default.

Question 17

An organization must manage ongoing firmware updates for redundant controllers in the network. They will use Cisco Catalyst Center for deployment and visibility. The current environment uses centralized and distributed management approaches. Automation and reporting are critical to minimize operational workload. Which method must be used to manage structured update processes and monitor progress throughout the update cycle?

Options:

A.

inventory snapshots from hardware report

B.

software templates

C.

software image management workflows

D.

lifecycle workflow

Question 18

Which solution enables a seamless user experience when roaming in a wireless network?

Options:

A.

static VLAN policy

B.

optimized roaming

C.

redundant RF profile

D.

fast transition

Question 19

What is the main benefit of using AI Enhanced RRM on the Cisco Catalyst 9800 wireless controller?

Options:

A.

It is an automatic tuning tool that is used to adjust RF parameters based on static thresholds.

B.

It focuses on increasing the transmit power of access points to maximize coverage regardless of interference.

C.

It disables dynamic channel assignment and power control to maintain a fixed wireless environment for stability.

D.

It uses machine learning and cloud analytics to proactively optimize RF parameters.

Question 20

Refer to the exhibit. A network engineer must create a PSK WLAN that will be anchored to the DMZ. After this WLAN is created, users cannot connect to it. Based on the output from the RA trace, which action must the engineer take to resolve the issue?

Options:

A.

Disable fast transition 802.11r on the WLAN.

B.

Configure matching passwords on the client and the WLAN.

C.

Remove the anchor WLC from the mobility group.

D.

Configure matching WLANs on the foreign and the anchor.

Question 21

What is a characteristic of gain in wireless antenna design?

Options:

A.

Scale used for calculating system loss

B.

Checksum figure appended to signal blocks

C.

Amount of increased energy sent toward a specific direction

D.

Standard temperature tolerance during wireless operation

Question 22

What defines device sensitivity in a wireless environment?

Options:

A.

capability to process the signal

B.

detection of redundant gateways

C.

synchronization of beacon intervals

D.

implementation of key refresh schedules

Question 23

Which Cisco Ultra-Reliable Wireless Backhaul process enables devices to establish a reliable connection with the next AP along their path before losing connectivity to the current one in a wireless network during roaming?

Options:

A.

Open roaming

B.

Fast client handoff

C.

802.11v high speed roaming

D.

Make-before-break handover logic

Question 24

A network administrator at a marketing company manages a Cisco Catalyst 9800 Series Wireless Controller running Cisco IOS XE 17.x. The WLAN named XYZ-Guest is set up for visitors, and the administrator wants to implement a web authentication (WebAuth) portal using an external server to manage guest access. To ensure seamless and secure guest authentication, the controller must be configured to use an external WebAuth server for the WLAN. The administrator must configure the XYZ-Guest WLAN to use an external WebAuth server with a parameter map named webauth-ext. Which set of Cisco IOS XE commands must be used?

Options:

A.

wireless wlan XYZ-Guestsecurity web-auth external webauth-ext

B.

wireless wlan XYZ-Guest 2 XYZ-Guestparameter-map webauth-ext

C.

wlan XYZ-Guest 2parameter external security-map webauth-ext

D.

wlan XYZ-Guest 2 XYZ-Guestsecurity web-auth parameter-map webauth-ext

Question 25

Which process enables seamless Layer 2 handoff in a wireless network during roaming?

Options:

A.

increased beacon interval setting

B.

optimized roaming

C.

fast BSS transition protocol

D.

deferred probe response technique

Question 26

What happens when a radio wave bends around objects?

Options:

A.

absorption

B.

diffusion

C.

reflection

D.

diffraction

Question 27

Exhibit:

Refer to the exhibit. An organization wants to use Cisco Spaces for location analytics, and an engineer is setting up the Cisco Catalyst 9800 WLC to send location data. The Spaces connector has already been configured and is operational on the WLC. The engineer must now configure the controller to forward telemetry data to the correct Spaces cloud endpoint using TLS to complete the integration. Which CLI command must be added to the box in the code?

Options:

A.

profile spaces-profile ip address 198.51.100.10 receiver tls-native

B.

receiver protocol tls-native profile spaces-profile ip address 198.51.100.10 57555

C.

receiver ip address 198.51.100.10 57555 protocol tls-native profile spaces-profile

D.

profile spaces-profile receiver 198.51.100.10 57555 protocol tls-native

Question 28

Which feature does a high-gain patch antenna impart to a wireless signal?

Options:

A.

single narrow frequency use

B.

partial overlap of frequency bands

C.

focused beam in a flat area

D.

alternating direction with elevation

Question 29

Refer to the exhibit.]

An engineer is setting up a new WLC in a branch office. The IT security policy states that all management access must use encrypted protocols, administrators will connect remotely, and network scans will be run to check for any noncompliant management protocol exposure. Which action must the engineer take to achieve the required management access policy?

Options:

A.

Permit only HTTP, Telnet, and SSH across all VLANs for 10.10.1.0/24.

B.

Enable Telnet, SSH, and HTTPS across the management and guest interfaces.

C.

Permit console access for 10.10.1.0/24 only with HTTP disabled.

D.

Enable HTTPS and SSH, and disable HTTP and Telnet on the WLC.

Question 30

What is a benefit of applying TACACS authentication for device access?

Options:

A.

static user grouping without role differentiation

B.

fragmented statistics across controllers and devices

C.

streamlined administrator access across platforms

D.

single user for device and network access

Page: 1 / 8
Total 102 questions