Cisco (300-430-ENWLSI) Exam Questions And Answers page 14
An engineer must use Cisco AVC on a Cisco WLC to prioritize Cisco IP cameras that use the wireless network. Which element do you configure in a rule?
permit-ACL
WMM required
mark
Wireless Network Management
A shopping center uses AireOS controllers with Cisco Wave 2 APs. A separate WLAN named Guest-012345678-WLAN is used for guest wireless clients. Management needs location analytics to determine popular areas. CMX must track only associated clients. What must be selected on the CMX server settings?
Exclude probing clients
Duty Cycle Cutoff
Enable Locally Administered MAC Filtering
Enable Location MAC Filtering
Location Services
An engineer is setting up a WLAN to work with a Cisco ISE as the AAA server. The company policy requires that all users be denied access to any resources until they pass the validation. Which component must be configured to achieve this stipulation?
WPA2 passkey
AAA override
CPU ACL
preauthentication ACL
WLAN Security and Identity Management
An engineer is using Cisco Prime Infrastructure reporting to monitor the state of security on the WLAN. Which output is produced when the Adaptive wIPS Top 10 AP report is run?
last 10 wIPS events from monitor mode APs
last 10 wIPS events from sniffer mode APs
last of 10 sniffer mode APs with the most wIPS events
last of 10 monitor mode APs with the most wIPS events
WLAN Security and Identity Management
A network engineer needs to configure multicast in the network. The implementation will use multiple multicast groups and PIM routers. Which address provides automatic discovery of the best RP for each multicast group?
224.0.0.13
224.0.0.14
224.0.1.39
224.0.1.40
Wireless Infrastructure
Wireless Network Management
Which component must be integrated with Cisco DNA Center to display the location of a client that is experiencing connectivity issues?
Cisco Hyperlocation Module
Wireless Intrusion Prevention System
Cisco Connected Mobile Experiences
Cisco Mobility Services Engine
Location Services
The CTO of an organization wants to ensure that all Android devices are placed into a separate VLAN on their wireless network. However, the CTO does not want to deploy ISE. Which feature must be implemented on the Cisco WLC?
WLAN local policy
RADIUS server overwrite interface
AAA override
custom AVC profile
Wireless Network Management
Refer to the exhibit.
An engineer must restrict some subnets to have access to the WLC. When the CPU ACL function is enabled, no ACLs in the drop-down list are seen. What is the cause of the problem?
An engineer must restrict some subnets to have access to the WLC. When the CPU ACL function is enabled, no ACLs in the drop-down list are seen. What is the cause of the problem?
The ACL does not have a rule that is specified to the Management interface.
No ACLs have been created under the Access Control List tab.
When the ACL is created, it must be specified that it is a CPU ACL.
This configuration must be performed through the CLI and not though the web GUI.
WLAN Security and Identity Management
Wireless Network Management
A user is trying to connect to a wireless network that is configured for WPA2-Enterprise security using a corporate laptop. The CA certificate for the authentication server has been installed on the Trusted Root Certification Authorities store on the laptop. The user has been prompted to enter the credentials multiple times, but the authentication has not succeeded. What is causing the issue?
There is an IEEE invalid 802.1X authentication policy on the authentication server.
The user Active Directory account is locked out after several failed attempts.
There is an invalid 802.1X authentication policy on the authenticator.
The laptop has not received a valid IP address from the wireless controller.
WLAN Security and Identity Management
Wireless Network Management
An enterprise has recently deployed a voice and video solution available to all employees using AireOS controllers. The employees must use this service over their laptops, but users report poor service when connected to the wireless network. The programs that consume bandwidth must be identified and restricted. Which configuration on the WLAN aids in recognizing the traffic?
NetFlow Monitor
AVC Profile
QoS Profile
Application Visibility
WLAN Security and Identity Management
Wireless Network Management
Comments