Cisco (300-430-ENWLSI) Exam Questions And Answers page 4
Refer to the exhibit.
Which area indicates the greatest impact on the wireless network when viewing the Cisco CleanAir Zone of Impact map of interferers?
Which area indicates the greatest impact on the wireless network when viewing the Cisco CleanAir Zone of Impact map of interferers?
B
C
D
Wireless Infrastructure
WLAN Security and Identity Management
Which AP model of the Cisco Aironet Active Sensor is used with Cisco DNA Center?
1800s
3600e
3800s
4800i
Wireless Infrastructure
An engineer must implement intrusion protection on the WLAN. The AP coverage is adequate and on-channel attacks are the primary concern. The building is historic, which makes adding APs difficult. Which AP mode and submode must be implemented?
AP mode: local, AP submode: none
AP mode: monitor, AP submode: WIPS
AP mode: monitor, AP submode: none
AP mode: local, AP submode: WIPS
WLAN Security and Identity Management
A network engineer has been hired to perform a new MSE implementation on an existing network. The MSE must be installed in a different network than the Cisco WLC. Which configuration allows the devices to communicate over NMSP?
Allow UDP/16113 port on the central switch.
Allow TCP/16113 port on the firewall.
Allow UDP/16666 port on the VPN router.
Allow TCP/16666 port on the router.
Wireless Infrastructure
Wireless Network Management
A Cisco CMX 3375 appliance on the 10.6.1 version code counts duplicate client entries, which creates wrong location analytics. The issue is primarily from iOS clients with the private MAC address feature enabled. Enabling this feature requires an upgrade of the Cisco CMX 3375 appliance in a high availability pair to version 10.6.3. SCP transfers the Cisco CMX image, but the upgrade script run fails. Which configuration change resolves this issue?
Upgrade the high availability pair to version 10.6.2 image first and then upgrade to version 10.6.3.
Save configuration and use the upgrade script to upgrade the high availability pair without breaking the high availability.
Break the high availability using the cmxha config disable command and upgrade the primary and secondary individuality.
Run root patch to first upgrade to version 10.6.2 and then migrate to version 10.6.3.
Wireless Infrastructure
WLAN Security and Identity Management
During the EAP process and specifically related to the client authentication session, which encrypted key is sent from the RADIUS server to the access point?
WPA key
session key
encryption key
shared-secret key
WLAN Security and Identity Management
Wireless Network Management
A corporation has employees working from their homes. A wireless engineer must connect 1810 OEAP at remote teleworker locations. All configuration has been completed on the controller side, but the network readiness is pending. Which two configurations must be performed on the firewall to allow the AP to join the controller? (Choose two.)
Block UDP ports 1812 and 1813 on the firewall.
Enable NAT Address on the 5520 with an Internet-routable IP address.
Configure a static IP on the OEAP 1810.
Allow UDP ports 5246 and UDP port 5247 on the firewall.
Allow UDP ports 12222 and 12223 on the firewall.
WLAN Security and Identity Management
Wireless Network Management
A customer is experiencing performance issues with its wireless network and asks a wireless engineer to provide information about all sources of interference and their impacts to the wireless network over the past few days. Where can the requested information be accessed?
CleanAir reports on Cisco Prime Infrastructure
Performance reports on Cisco Prime Infrastructure
Interference Devices reports on Cisco Wireless LAN Controller
Air Quality reports on Cisco Wireless LAN Controller
WLAN Security and Identity Management
Wireless Network Management
A wireless network engineer must present a list of all rogue APs with a high severity score to senior management. Which report must be created in Cisco Prime Infrastructure to provide this information?
Rogue AP Count Summary
New Rogue APs
Rogue AP Events
Rogue APs
WLAN Security and Identity Management
Refer to the exhibit. Which two items must be supported on the VoWLAN phones to take full advantage of this WLAN configuration? (Choose two.)
TSPEC
SIFS
802.11e
WMM
APSD
WLAN Security and Identity Management
Wireless Network Management
Comments