Exam Logo

Cisco (300-430-ENWLSI) Exam Questions And Answers page 8

What are two considerations when deploying a Cisco Hyperlocation? (Choose two.)
Wireless Infrastructure Wireless Network Management
An engineer is following the proper upgrade path to upgrade a Cisco AireOS WLC from version 7.3 to 8.9. Which two ACLs for Cisco CWA must be configured when upgrading from the specified codes? (Choose two.)
WLAN Security and Identity Management Wireless Network Management
A corporation has recently implemented a BYOD policy at their HQ. Which two risks should the security director be concerned about? (Choose two.)
Wireless Infrastructure WLAN Security and Identity Management
An engineer has implemented 802.1x authentication on the wireless network utilizing the internal database of a RADIUS server. Some clients reported that they are unable to connect. After troubleshooting, it is found that PEAP authentication is failing. A debug showed the server is sending an Access-Reject message. Which action must be taken to resolve authentication?
WLAN Security and Identity Management Wireless Network Management
An engineer wants the wireless voice traffic class of service to be used to determine the queue order for packets received, and then have the differentiated services code point set to match when it is resent to another port on the switch. Which configuration is required in the network?
Wireless Network Management
A Cisco WLC has been added to the network and Cisco ISE as a network device, but authentication is failing. Which configuration within the network device configuration should be verified?
WLAN Security and Identity Management Wireless Network Management
An engineer must track guest traffic flow using the WLAN infrastructure. Which Cisco CMX feature must be configured and used to accomplish this tracking?
Wireless Infrastructure Wireless Network Management
An engineer must implement Cisco Identity-Based Networking Services at a remote site using ISE to dynamically assign groups of users to specific IP subnets. If the subnet assigned to a client is available at the remote site, then traffic must be offloaded locally, and subnets are unavailable at the remote site must be tunneled back to the WLC. Which feature meets these requirements?
WLAN Security and Identity Management Wireless Network Management
What is the difference between PIM sparse mode and PIM dense mode?
WLAN Security and Identity Management Wireless Network Management
Which two events are outcomes of a successful RF jamming attack? (Choose two.)
Wireless Infrastructure WLAN Security and Identity Management