Cisco (300-430-ENWLSI) Exam Questions And Answers page 8
What are two considerations for deploying Cisco Hyperlocation?
Multiple Choice
What are two considerations when deploying a Cisco Hyperlocation? (Choose two.)
The Cisco Hyperlocation feature must be enabled only on the wireless LAN controller.
After enabling Cisco Hyperlocation on Cisco CMX, the APs and the wireless LAN controller must be restarted.
The Cisco Hyperlocation feature must be enabled on the wireless LAN controller and Cisco CMX.
If the Cisco CMX server is a VM, a high-end VM is needed for Cisco Hyperlocation deployments.
Wireless Infrastructure
Wireless Network Management
An engineer is following the proper upgrade path to upgrade a Cisco AireOS WLC from version 7.3 to 8.9. Which two ACLs for Cisco CWA must be configured when upgrading from the specified codes? (Choose two.)
Permit 0.0.0.0 0.0.0.0 UDP any any
Permit 0.0.0.0 0.0.0.0 any DNS any
Permit 0.0.0.0 0.0.0.0 UDP DNS any
Permit 0.0.0.0 0.0.0.0 UDP any DNS
Permit any any any
WLAN Security and Identity Management
Wireless Network Management
A corporation has recently implemented a BYOD policy at their HQ. Which two risks should the security director be concerned about? (Choose two.)
network analyzers
malware
lost and stolen devices
keyloggers
unauthorized users
Wireless Infrastructure
WLAN Security and Identity Management
An engineer has implemented 802.1x authentication on the wireless network utilizing the internal database of a RADIUS server. Some clients reported that they are unable to connect. After troubleshooting, it is found that PEAP authentication is failing. A debug showed the server is sending an Access-Reject message. Which action must be taken to resolve authentication?
Use the user password that is configured on the server.
Disable the server certificate to be validated on the client.
Update the client certificate to match the user account.
Replace the client certificates from the CA with the server certificate.
WLAN Security and Identity Management
Wireless Network Management
An engineer wants the wireless voice traffic class of service to be used to determine the queue order for packets received, and then have the differentiated services code point set to match when it is resent to another port on the switch. Which configuration is required in the network?
Platinum QoS configured on the WLAN
WMM set to required on the WLAN
msl qos trust dscp configured on the controller switch port
msl qos trust cos configured on the controller switch port
Wireless Network Management
A Cisco WLC has been added to the network and Cisco ISE as a network device, but authentication is failing. Which configuration within the network device configuration should be verified?
SNMP RO community
device interface credentials
device ID
shared secret
WLAN Security and Identity Management
Wireless Network Management
An engineer must track guest traffic flow using the WLAN infrastructure. Which Cisco CMX feature must be configured and used to accomplish this tracking?
analytics
connect and engage
presence
detect and locate
Wireless Infrastructure
Wireless Network Management
An engineer must implement Cisco Identity-Based Networking Services at a remote site using ISE to dynamically assign groups of users to specific IP subnets. If the subnet assigned to a client is available at the remote site, then traffic must be offloaded locally, and subnets are unavailable at the remote site must be tunneled back to the WLC. Which feature meets these requirements?
learn client IP address
FlexConnect local authentication
VLAN-based central switching
central DHCP processing
WLAN Security and Identity Management
Wireless Network Management
What is the difference between PIM sparse mode and PIM dense mode?
Sparse mode supports only one switch. Dense mode supports multiswitch networks.
Sparse mode floods. Dense mode uses distribution trees.
Sparse mode uses distribution trees. Dense mode floods.
Sparse mode supports multiswitch networks. Dense mode supports only one switch.
WLAN Security and Identity Management
Wireless Network Management
What are the two outcomes of a successful RF jamming attack?
Multiple Choice
Which two events are outcomes of a successful RF jamming attack? (Choose two.)
disruption of WLAN services
unauthentication association
deauthentication broadcast
deauthentication multicast
physical damage to AP hardware
Wireless Infrastructure
WLAN Security and Identity Management
Comments