Summer Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpt65

300-430 Questions and Answers

Question # 6

The network management team in a large shopping center has detected numerous rogue APs from local coffee shops that are broadcasting SSIDs. All of these SSIDs have names starting with ATC (for example, ATC302, ATC011, and ATC566). A wireless network engineer must appropriately classify these SSIDs using the Rogue Rules feature. Drag and drop the options from the left onto the categories in which they must be used on the right. Not all options are used.

Full Access
Question # 7

Refer to the exhibit.

An engineer implemented the CPU ACL on your Cisco 5520 Series Wireless LAN Controller, and the controller is no longer manageable via the network. What must be changes on this CPU ACL to enable it to manage the controller again?

A.

Permit statements must be added to the top of the ACL in both directions, which specify the network to be managed from and the virtual interface of the controller.

B.

Line 1 must be set to a destination port of HTTP.

C.

Permit statements must be added to the top of the ACL, which specify the network to be managed from.

D.

Line 1 must be set to the inbound direction.

Full Access
Question # 8

An IT administrator deploys Cisco 2802i APs in all office locations, including main campus and branch offices. The WLC that manages the APs is located at the data center on the main campus. The APs on the main campus are configured to use Local mode and the APs in the branches use FlexConnect mode. Which configuration must be applied to the APs for corporate devices on the main campus to be mapped to the local LAN switch on different VLANs according to the VLAN tag ID and WLAN?

A.

Enable Central DHCP Processing.

B.

Disable FlexConnect Local Auth

C.

Enable FlexConnect Local Switching.

D.

Disable VLAN-based Central Switching.

Full Access
Question # 9

When configuring a Cisco WLC, which CLI command adds a VLAN with VLAN ID of 30 to a FlexConnect group named BranchA-FCG?

A.

config flexconnect BranchA-FCG vlan 30 add

B.

config flexconnect BranchA-FCG vlan add 30

C.

config flexconnect group BranchA-FCG vlan 30 add

D.

config flexconnect group BranchA-FCG vlan add 30

Full Access
Question # 10

An engineer is in the process of implementing Fastlane on a wireless network with a Mobility Express AP installed. The network must support voice and video applications for Apple devices. Due to a security concern, all iPhones are updated to version 14.5.432302546. Which QoS profile must the engineer configure on the user WLAN?

A.

Bronze

B.

Best Effort

C.

Silver

D.

Platinum

Full Access
Question # 11

A customer is deploying local web authentication. Which software application must be implemented on Cisco ISE to utilize as a directory service?

A.

Solaris Directory Service

B.

LDAP

C.

SAML

D.

Novell eDirectory

Full Access
Question # 12

A wireless network has been implemented to enable multicast video to be streamed reliably over the wireless link to the wireless users. After a client reports that the video is unable to stream, the administrator determines that the client is connecting at a data rate of 12 Mbps and is trying to stream to a valid multicast address on the network. Which two actions must be applied? (Choose two.)

A.

Turn off IGMP snooping for all the configured WLANs on the controller.

B.

Implement video-stream for the multicast video on the controller.

C.

Allow multicast-direct to work correctly and multicast-direct to be enabled globally.

D.

Change the WLAN QoS value to Bronze for the WLAN that multicast will be enabled.

E.

Allow RTSP to stream the video due to wireless multicast not using acknowledgements.

Full Access
Question # 13

An engineer must run a Client Traffic Stream Metrics report in Cisco Prime Infrastructure. Which task must be run before the report?

A.

scheduled report

B.

radio performance

C.

client status

D.

software

Full Access
Question # 14

A customer is concerned that their wireless network is detecting spurious threats from channels that are not being used by their wireless infrastructure. Which two technologies must they deploy? (Choose two.)

A.

FlexConnect mode

B.

monitor mode

C.

sniffer mode with no submode

D.

local mode with WIPS submode

E.

rogue detector mode

Full Access
Question # 15

An engineer must configure MSE to provide guests access using social media authentication. Which service does the engineer configure so that guests use Facebook credentials to authenticate?

A.

Social Connect

B.

Client Connect

C.

Visitor Connect

D.

Guest Connect

Full Access
Question # 16

A wireless engineer is configuring LWA using ISE. The customer is a startup company and requested the wireless users to authenticate against a directory, but LDAP is unavailable. Which solution should be proposed in order to have the same security and user experience?

A.

Use SAML.

B.

Use the internal database of the RADIUS server.

C.

Use a preshared key on the corporate WLAN.

D.

Use Novell eDirectory.

Full Access
Question # 17

An engineer is considering an MDM integration with Cisco ISE to assist with security for lost devices.

Which two functions of MDM increase security for lost devices that access data from the network? (Choose two.)

A.

PIN enforcement

B.

Jailbreak/root detection

C.

data wipe

D.

data encryption

E.

data loss prevention

Full Access
Question # 18

A wireless administrator must assess the different client types connected to Cisco Catalyst 9800 Series Wireless Controller without using any external servers. Which configuration must be added to the controller to achieve this assessment?

A.

native profile

B.

MAC classification

C.

local profile

D.

device classification

Full Access
Question # 19

Refer to the exhibit.

An engineer configured a BYOD policy that allows for printing on the WLAN using Bonjour services. However, the engineer cannot get printing to work. The WLC firmware is 8.x. What must be implemented on the controller?

A.

Enable mDNS and IGMP snooping.

B.

Activate location-specific services.

C.

Configure Secure Web Mode Cipher-Option SSLv2.

D.

Increase the IGMP Query Interval value

Full Access
Question # 20

An engineer is troubleshooting a Cisco CMX high-availability deployment and notices that the primary and backup Cisco CMX servers are both considered primary. Which command must the engineer run on the backup server?

A.

cmxha convert backup

B.

cmxha backup convert

C.

cmxha secondary convert

D.

cmxha convert secondary

Full Access
Question # 21

An engineer has configured passive fallback mode for RADIUS with default timer settings. What will occur when the primary RADIUS fails then recovers?

A.

RADIUS requests will be sent to the secondary RADIUS server until the secondary fails to respond.

B.

The controller will immediately revert back after it receives a RADIUS probe from the primary server.

C.

After the inactive time expires the controller will send RADIUS to the primary.

D.

Once RADIUS probe messages determine the primary controller is active the controller will revert back to the primary RADIUS.

Full Access
Question # 22

A network administrator just completed the basic implementation of Cisco CMX and tries to implement location tracking. The administrator is having trouble establishing connectivity between one of the WLCs through NMSP. What must be configured to establish this connectivity? (Choose two.)

A.

Add permanent licenses on the Cisco CMX server.

B.

Allow on the firewall port 16113 between Cisco CMX and the WLC.

C.

Enable NMSP on the WLC.

D.

Reboot Cisco CMX after adding the WLC for the first time.

E.

Add to the WLC the MAC address and SSC key for the Cisco CMX server.

Full Access
Question # 23

A network engineer needs to configure multicast in the network. The implementation will use multiple multicast groups and PIM routers. Which address provides automatic discovery of the best RP for each multicast group?

A.

224.0.0.13

B.

224.0.0.14

C.

224.0.1.39

D.

224.0.1.40

Full Access
Question # 24

Refer to the exhibit.

An engineer deployed a Cisco WLC using local EAP. Users who are configured for EAP-PEAP cannot connect to the network. Based on the local EAP debug on the controller provided, why is the client unable to connect?

A.

The client is failing to accept certificate.

B.

The Cisco WLC is configured for the incorrect date.

C.

The Cisco WLC local EAP profile is misconfigured.

D.

The user is using invalid credentials.

Full Access
Question # 25

An engineer set up identity-based networking with ISE and configured AAA override on the WLAN. Which two attributes must be used to change the client behavior from the default settings? (Choose two.)

A.

DHCP timeout

B.

DNS server

C.

IPv6 ACL

D.

DSCP value

E.

multicast address

Full Access
Question # 26

An engineer must perform a Layer 2 survey for a mining facility. Which type of antenna does the

engineer use in the mine shaft?

A.

dipole

B.

omnidirectional

C.

patch

D.

internal

Full Access
Question # 27

The IT manager is asking the wireless team to get a report for all guest user associations during the past two weeks. In which two formats can Cisco Prime save this report? (Choose two.)

A.

CSV

B.

PDF

C.

XLS

D.

DOC

E.

plain text

Full Access
Question # 28

An engineer is setting up a WLAN to work with a Cisco ISE as the AAA server. The company policy requires that all users be denied access to any resources until they pass the validation. Which component must be configured to achieve this stipulation?

A.

WPA2 passkey

B.

AAA override

C.

CPU ACL

D.

preauthentication ACL

Full Access
Question # 29

During the EAP process and specifically related to the client authentication session, which encrypted key is sent from the RADIUS server to the access point?

A.

WPA key

B.

session key

C.

encryption key

D.

shared-secret key

Full Access
Question # 30

A Cisco WLC has been added to the network and Cisco ISE as a network device, but authentication is failing. Which configuration within the network device configuration should be verified?

A.

SNMP RO community

B.

device interface credentials

C.

device ID

D.

shared secret

Full Access
Question # 31

An engineer is configuring a BYOD deploymernt strategy and prefers a single SSID model.

Which technology is required to accomplish this configuration?

A.

mobility service engine

B.

wireless control system

C.

identify service engine

D.

Prime Infrastructure

Full Access
Question # 32

An engineer is setting up a new unique NAD on a Cisco ISE.

Which two parameters must be configured? (Choose two.)

A.

device host name

B.

device password

C.

RADIUS fallback

D.

device IP address

E.

RADIUS shared secret

Full Access