Weekend Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

300-430 Questions and Answers

Question # 6

An engineer must implement a CPU ACL that blocks web management traffic to the controller, but they also must allow guests to reach a Web Authentication Redirect page. To which IP address is guest client HTTPS traffic allowed for this to work?

A.

DNS server IP

B.

controller management IP

C.

virtual interface IP

D.

client interface IP

Full Access
Question # 7

A WLAN is being configured for guest access using the portal on the Cisco CMX. Which Layer 3 security setting must be selected?

A.

Web-Policy-Conditional Redirect

B.

Web-Policy-Authentication

C.

Web-Policy-Splash Page Redirect

D.

Web-Policy-Passthrough

Full Access
Question # 8

Refer to the exhibit. A network administrator must automate notifications for Security Advisories Data reports on the Cisco Catalyst Center v2.3.7 using the Report notification feature. Preferring a programmable approach over UI/CLI, the administrator decides to create a webhook via the Cisco DNA Center API to send real-time HTTP notifications to an external application. The webhook URL https://example.com/webhook uses HTTPS with a self-signed certificate, which requires a specific configuration in the payload to ensure the webhook functions correctly. Which code snippet must be placed onto the box in the code to complete the Python script that configures the webhook to use the self-signed certificate to extract the Security Advisories Data report?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 9

A wireless engineer must implement a corporate wireless network for a large company in the most efficient way possible. The wireless network must support 32 VLANs for 300 employees in different departments. Which solution must the engineer choose?

A.

Configure a second WLC to support half of the APs in the deployment.

B.

Configure one single SSID and implement Cisco ISE for VLAN assignment according to different user roles.

C.

Configure different AP groups to support different VLANs, so that all of the WLANs can be broadcast on both radios.

D.

Configure 16 WLANs to be broadcast on the 2.4-GHz band and 16 WLANs to be broadcast on the 5.0-GHz band.

Full Access
Question # 10

An engineer needs to provision certificates on a Cisco Catalyst 9800 Series Wireless Controller. The customer uses a third-party CA server. Which protocol must be used between the controller and CA server to request and install certificates?

A.

SCEP

B.

TLS

C.

LDAP

D.

SSL

Full Access
Question # 11

An engineer is implementing profiling for BYOD devices using Cisco ISE. When using a distributed model, which persona must the engineer configure with the profiling service?

A.

Device Admin Node

B.

Primary Admin Node

C.

Monitor Node

D.

Policy Services Node

Full Access
Question # 12

Refer to the exhibit.

An ACL is configured to restrict access for BYOD clients. The ACL must redirect devices to the guest portal. To which two devices on the local network must the ACL allow access other than the DHCP server? (Choose two.)

A.

RADIUS server

B.

DNS server

C.

Cisco ISE

D.

SNMP server

E.

WLC

Full Access
Question # 13

Refer to the exhibit.

An engineer tries to manage the rogues on the Cisco WLC. Based on the configuration, which AP is marked as malicious by the controller?

A.

rogue AP with SSID admin seen for 4000 seconds and heard at -70dBm

B.

rogue AP with SSID admin seen for 3000 seconds and heard at -60dBm

C.

rogue AP with SSID admin seen for 4000 seconds and heard at -60dBm

D.

rogue AP with SSID admin seen for 3000 seconds and heard at -70dBm

Full Access
Question # 14

A company has a Cisco wireless network with Cisco ISE. The company wants to allow employees to use their personal mobile devices on the wireless network. The company wants to allow access to the network only if the devices meet certain criteria. To meet the requirement, the company asked a network engineer to create a native supplicant profile. Which two fields must be configured when the profile is created? (Choose two.)

A.

Allowed Protocol (PEAP/TLS)

B.

Allowed Protocol (Ms-CHAPv2/ EAP-FAST)

C.

SSID Name

D.

WLC Name

E.

Allowed Protocol (LEAP/ EAP-TTLS)

Full Access
Question # 15

A wireless network has two RF groups where Cisco WLCs are joined. APs are associated with different controllers using the round-robin approach. Rogue containment must be deployed v\ all controllers, but the network must not be affected by any RRM neighbor packets sent by friendly APs. Which AP authentication protection type must be enabled?

A.

AP Security

B.

AP Authentication

C.

AP Wireless Protection Rules

D.

AP Access Control

Full Access
Question # 16

An IT department receives a report of a stolen laptop and has information on the MAC address of the laptop. Which two settings must be set on the wireless infrastructure to determine its location? (Choose two.)

A.

Location History for Clients must be enabled on the MSE.

B.

Client location tracking must be enabled on the MSE.

C.

Location History for Visitors must be enabled on the MSE.

D.

Location History for Rogue APs & Rogue Clients must be enabled on the MSE.

E.

Tracking optimization must be enabled on the WLC.

Full Access
Question # 17

An engineer is following the proper upgrade path to upgrade a Cisco AireOS WLC from version 7.3 to 8.9. Which two ACLs for Cisco CWA must be configured when upgrading from the specified codes? (Choose two.)

A.

Permit 0.0.0.0 0.0.0.0 any DNS any

B.

Permit 0.0.0.0 0.0.0.0 UDP DNS any

C.

Permit 0.0.0.0 0.0.0.0 UDP any DNS

D.

Permit any any any

E.

Permit 0.0.0.0 0.0.0.0 UDP any any

Full Access
Question # 18

An engineer must configure a Cisco WLC to support Cisco Aironet 600 Series OfficeExtend APs. Which two Layer 2 security options are supported in this environment? (Choose two.)

A.

Static WEP + 802.1X

B.

WPA+WPA2

C.

Static WEP

D.

CKIP

E.

802.1X

Full Access
Question # 19

Which condition introduce security risk to a BYOD policy?

A.

enterprise-managed MDM platform used for personal devices

B.

access to LAN without implementing MDM solution

C.

enforcement of BYOD access to internet only network

D.

enterprise life-cycle enforcement of personal device refresh

Full Access
Question # 20

A network administrator of a school district must implement a DNS-based ACL to block students from accessing certain teacher URLs where test papers are hosted. The infrastructure contains a Cisco Catalyst 9800 WLC with 25 9136 APs. The administrator configured the URL Filter List called urllist_flex_pre, applied the URL Filter List to the default Flex Profile, and defined Preauth called urllist_local_preauth and Postauth called urllist_local_postaut URL Filter List. Which configuration must the administrator apply to implement the ACL on the default policy profile?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 21

An engineer is implementing a FlexConnect group for access points at a remote location using local switching but central DHCP. Which client feature becomes available only if this configuration is changed?

A.

multicast

B.

static IP

C.

fast roaming

D.

mDNS

Full Access
Question # 22

An engineer must create an account to log in to the CLI of an access point for troubleshooting. Which configuration on the WLC will accomplish this?

A.

Allow New Telnet Sessions

B.

ReadWrite User Access Mode

C.

SNMP V3 User

D.

Global Configuration Enable Password

Full Access
Question # 23

An engineer is troubleshooting a Cisco CMX high-availability deployment and notices that the primary and backup Cisco CMX servers are both considered primary. Which command must the engineer run on the backup server?

A.

cmxha convert backup

B.

cmxha backup convert

C.

cmxha secondary convert

D.

cmxha convert secondary

Full Access
Question # 24

Which two restrictions are in place with regards to configuring mDNS? (Choose two.)

A.

mDNS uses only UDP port 5436 as a destination port.

B.

mDNS cannot use UDP port 5353 as the destination port.

C.

mDNS is not supported on FlexConnect APs with a locally switched WLAN.

D.

Controller software must be newer than 7.0.6+.

E.

mDNS is not supported over IPv6.

Full Access
Question # 25

An engineer is responsible for a wireless network for an enterprise. The enterprise has distributed offices around the globe, and all APs are configured in FlexConnect mode. The network must be configured to support 802.11r and CCKM. What needs to be implemented to accomplish this goal?

A.

Enable VLAN-based central switching.

B.

Enable FlexConnect local authentication.

C.

Enable FlexConnect local switching.

D.

Create FlexConnect groups.

Full Access
Question # 26

WPA2 Enterprise with 802.1X is being used for clients to authenticate to a wireless network through a Cisco ISE server. For security reasons, the network engineer wants to ensure that only PEAP authentication is used. The engineer sent instructions to clients on how to configure the supplicants, but the ISE logs still show users authenticating using EAP-FAST. Which action ensures that access to the network is restricted for these users unless the correct authentication mechanism is configured?

A.

Enable AAA override on the SSID, gather the usernames of these users, and disable the RADIUS accounts until the devices are correctly configured.

B.

Enable AAA override on the SSID and configure an ACL on the WLC that allows access to users with IP addresses from a specific subnet.

C.

Enable AAA override on the SSID and configure an access policy in Cisco ISE that denies access to the list of MACs that have used EAP-FAST.

D.

Enable AAA override on the SSID and configure an access policy in Cisco ISE that allows access only when the EAP authentication method is PEAP.

Full Access
Question # 27

What must be configured on ISE version 2.1 BYOD when using Single SSID?

A.

open authentication

B.

802.1x

C.

no authentication

D.

WPA2

Full Access
Question # 28

An engineer is configuring an autonomous AP to allow 802.1X authentication for users. The policy on the RADIUS server only allows for EAP-TLS authentication. Which authentication method must the engineer select under the Client Authentication Settings for the SSID on the AP?

A.

Open

B.

Shared

C.

Web

D.

Network EAP

Full Access
Question # 29

Which command set configures a Cisco Catalyst 9800 Series Wireless Controller so that the client traffic enters the network at the AP switch port?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 30

A wireless engineer deployed all remote sites as FlexConnect. The client VLAN assignment on these sites is configured manually mapped by WLAN and using local switching. Dynamic VLAN assignment is provided by the newly deployed Cisco ISE. Which IETF attribute must be configured on the AAA server to send that VLAN ID?

A.

Tunnel-Medium-Type

B.

Tunnel-Client-Endpoint

C.

Tunnel-Assignment-ID

D.

Tunnel-Private-Group-ID

Full Access
Question # 31

A network engineer is implementing BYOD on a wireless network. Based on the customer requirements, a dual SSID approach must be taken. Which two advanced WLAN configurations must be performed? (Choose two.)

A.

Set NAC State to Radius NAC.

B.

Set Allow AAA Override to Enabled.

C.

Set DHCP Addr. Assignment to Required.

D.

Select DHCP Profiling.

E.

Select Enable Session Timeout.

Full Access
Question # 32

A Cisco CMX 3375 appliance on the 10.6.1 version code counts duplicate client entries, which creates wrong location analytics. The issue is primarily from iOS clients with the private MAC address feature enabled. Enabling this feature requires an upgrade of the Cisco CMX 3375 appliance in a high availability pair to version 10.6.3. SCP transfers the Cisco CMX image, but the upgrade script run fails. Which configuration change resolves this issue?

A.

Upgrade the high availability pair to version 10.6.2 image first and then upgrade to version 10.6.3.

B.

Save configuration and use the upgrade script to upgrade the high availability pair without breaking the high availability.

C.

Break the high availability using the cmxha config disable command and upgrade the primary and secondary individuality.

D.

Run root patch to first upgrade to version 10.6.2 and then migrate to version 10.6.3.

Full Access
Question # 33

When implementing self-registration for guest/BYOD devices, what happens when an employee tries to connect four devices to the network at the same time?

A.

The last device is removed and the newly added device is updated as active device.

B.

The registration is allowed, but only one device is connected at any given time.

C.

All devices are allowed on the network simultaneously.

D.

Purge time dictates how long a device is registered to the portal.

Full Access
Question # 34

What is configured to use more than one port on the OEAP to extend the wired network?

A.

remote LAN ACL

B.

AAA override

C.

client load balancing

D.

remote LAN

Full Access
Question # 35

After receiving an alert about a rogue AP, a network engineer logs into Cisco Prime Infrastructure and looks at the floor map where the AP that detected the rogue is located. The map is synchronized with a mobility services engine that determines that the rogue device is actually inside the campus. The engineer determines that the rogue is a security threat and decides to stop if from broadcasting inside the enterprise wireless network. What is the fastest way to disable the rogue?

A.

Go to the location where the rogue device is indicated to be and disable the power.

B.

Create an SSID similar to the rogue to disable clients from connecting to it.

C.

Update the status of the rogue in Cisco Prime Infrastructure to contained.

D.

Classify the rogue as malicious in Cisco Prime Infrastructure.

Full Access
Question # 36

An engineer is adding APs to an existing VolMLAN to allow for location based services. Which option will the primary change be to the network?

A.

increased transmit power on all APs

B.

moving to a bridging model

C.

AP footprint

D.

cell overlap would decrease

E.

triangulation of devices

Full Access
Question # 37

An engineer must configure Cisco OEAPs for three executives. As soon as the NAT address is configured on the management interface, it is noticed that the WLC is not responding for APs that are trying to associate to the internal IP management address. Which command should be used to reconcile this?

A.

config flexconnect office-extend nat-ip-only disable

B.

config network ap-discovery nap-ip-only enable

C.

config flexconnect office-extend nat-ip-only enable

D.

config network ap-discovery nat-ip-only disable

Full Access
Question # 38

Refer to the exhibit.

A customer has implemented Cisco FlexConnect deployments with different WLANs around the globe and is opening a new branch in a different location. The engineer’s task is to execute all the wireless configuration and to suggest how to configure the switch ports for new APs. Which configuration must the switching team use on the switch port?

A.

trunk mode

B.

access mode

C.

single VLAN

D.

multiple VLAN

Full Access
Question # 39

An IT administrator is managing a wireless network in which most devices are Apple iOS. A QoS issue must be addressed on the WLANs. Which configuration must be performed?

A.

Enable Fastlane globally under Wireless > Access Points > Global Configuration.

B.

Create a new AVC Profile named AUTOQOS-AVC-PROFILE and apply to all WLANs.

C.

Enable Fastlane under each WLAN setting.

D.

Enable WMM TSPEC/TCLAS negotiation under Wireless > Advanced.

Full Access
Question # 40

An administrator receives reports of many interferers in the wireless network and wants to get the location of these interferers from the maps in Cisco Prime Infrastructure.

When looking at the floor plans/maps, the administrator does not see any interferers, but can see all wireless clients located successfully.

Which two statements define the cause of the issue? (Choose two.)

A.

MSE is not added to Cisco Prime infrastructure and synchronized.

B.

Interferer tracking is not enabled on the MSE.

C.

SNMP between Cisco Prime Infrastructure and the WLC is failing.

D.

Context Aware Service tracking limit has already been reached with tracking other elements.

E.

NSMP communication is inactive with the WLC.

Full Access
Question # 41

A company is concerned about unauthorized APs on their wired and wireless networks. The company implements a Cisco Catalyst Center (formerly DNA Center) solution. Which feature must be enabled?

A.

Rogue Management application package

B.

Neighbor Assisted Roaming

C.

Sniffer package

D.

Monitor Mode package

Full Access
Question # 42

An engineer is adding APs to an existing VolMLAN to allow for location based services. Which option will the primary change be to the network?

A.

increased transmit power on all APs

B.

moving to a bridging model

C.

AP footprint

D.

cell overlap would decrease

E.

triangulation of devices

Full Access
Question # 43

A network administrator managing a Cisco Catalyst 9800-80 WLC must place all iOS connected devices to the guest SSID on VLAN 101. The rest of the clients must connect on VLAN 102 distribute load across subnets. To achieve this configuration, the administrator configures a local policy on the WLC. Which two configurations are required? (Choose two.)

A.

Assign a policy map under global security policy settings.

B.

Add local profiling policy under global security policy settings.

C.

Create a service template.

D.

Allow HTTP and DHCP profiling under policy map.

E.

Enable device classification on global wireless settings.

Full Access
Question # 44

A customer has a distributed wireless deployment model where the WLCs are located in the data centers. Because the file servers are located in the data center, the traffic from the corporate WLAN “Corp-401266017” must go through the controllers, where the guest WLAN “Guest-19283746” traffic must use the local Internet line installed in each office. Which configuration will accomplish this task?

A.

Disable Local Switching for the corporate and guest WLAN.

B.

Disable Local Switching for the corporate WLAN and enable it for the guest WLAN.

C.

Enable Local Switching for the corporate and guest WLAN.

D.

Enable Local Switching for the corporate WLAN and disable it for the guest WLAN.

Full Access
Question # 45

An engineer has many different WLANs on a WLC but does not want to broadcast them to every AP in the building. Which group must be configured on the WLC to allow different WLANs on the different APs without creating new interfaces?

A.

ACL

B.

interface group

C.

mobility group

D.

AP group

Full Access
Question # 46

An engineer must control administrative access to the WLC using their Active Directory without being concerned about RBAC after the admin user is authenticated. Which two features does the engineer configure to accomplish this task? (Choose two.)

A.

Device Admin Policy Set

B.

User Access Mode: ReadWrite

C.

ACL

D.

RADIUS server

E.

TACACS server

Full Access
Question # 47

Refer to the exhibit.

An engineer deployed a Cisco WLC using local EAP. Users who are configured for EAP-PEAP cannot connect to the network. Based on the local EAP debug on the controller provided, why is the client unable to connect?

A.

The client is failing to accept certificate.

B.

The Cisco WLC is configured for the incorrect date.

C.

The Cisco WLC local EAP profile is misconfigured.

D.

The user is using invalid credentials.

Full Access
Question # 48

An engineer is planning an image upgrade of the WLC, and hundreds of APs are spread across remote sites with limited WAN bandwidth. The engineer must minimize the WAN utilization for this upgrade. Which approach must be used for the AP image upgrade?

A.

Predownload the new code to the APs.

B.

Use the Smart AP image upgrade feature.

C.

Allow the APs to download their code after WLC reboot.

D.

Execute parallel TFTP code upgrade on the APs via SSH.

Full Access
Question # 49

A network administrator just completed the basic implementation of Cisco CMX and tries to implement location tracking. The administrator is having trouble establishing connectivity between one of the WLCs through NMSP. What must be configured to establish this connectivity? (Choose two.)

A.

Add permanent licenses on the Cisco CMX server.

B.

Allow on the firewall port 16113 between Cisco CMX and the WLC.

C.

Enable NMSP on the WLC.

D.

Reboot Cisco CMX after adding the WLC for the first time.

E.

Add to the WLC the MAC address and SSC key for the Cisco CMX server.

Full Access
Question # 50

An engineer needs read/write access to rename access points and add them to the correct AP groups on a wireless controller. Using Cisco ISE TACACS, which custom attributes is the minimum required?

A.

role1=WLAN

B.

role1=WLAN role2=SECURITY

C.

role1=WLAN role2=WIRELESS

D.

role1=WIRELESS

Full Access
Question # 51

Refer to the exhibit.

The security team has implemented ISE as an AAA solution for the wireless network. The wireless engineer notices that though clients are able to authenticate successfully, the ISE policies that are designed to place them on different interfaces are not working. Which configuration must be applied in the RADIUS Authentication Settings section from the ISE Network Device page?

A.

Disable KeyWrap.

B.

Use ASCII for the key input format.

C.

Change the CoA Port.

D.

Correct the shared secret.

Full Access
Question # 52

An engineer is configuring wireless guests using Cisco CWA. When a device connects, it must be redirected to the WebAuth, but this was failing. What must be configured for the device to be redirected correctly?

A.

Configure the ACL name on the anchor controller

B.

Enabled DHCP option 7.

C.

Remove the CN entry from the SAN

D.

Allow ICMP toward the portal

Full Access
Question # 53

A company is deploying wireless PCs on forklifts within its new 10,000-square-foot(3048-square-rneter) facility.

The clients are configured for PEAP-MS-CHAPv2 with WPA TKIP. Users report that applications frequently drop when the clients roam between access points on the floor. A professional site survey was completed.

Which configuration change is recommended to improve the speed of client roaming?

A.

EAP-FAST

B.

EAP-TLS

C.

WPAAES

D.

WPA2AES

Full Access
Question # 54

An engineer set up identity-based networking with ISE and configured AAA override on the WLAN. Which two attributes must be used to change the client behavior from the default settings? (Choose two.)

A.

DHCP timeout

B.

DNS server

C.

IPv6 ACL

D.

DSCP value

E.

multicast address

Full Access
Question # 55

The IT manager is asking the wireless team to get a report for all guest user associations during the past two weeks. In which two formats can Cisco Prime save this report? (Choose two.)

A.

CSV

B.

PDF

C.

XLS

D.

DOC

E.

plain text

Full Access
Question # 56

Which three characteristics of a rogue AP pose a high security risk? (Choose three.)

A.

open authentication

B.

high RSSI

C.

foreign SSID

D.

accepts clients

E.

low RSSI

F.

distant location

Full Access
Question # 57

The marketing department creates a promotion video for the branch store. Only interested hosts must receive the video over wireless multicast. What allows this feature?

A.

TPC

B.

DCA

C.

WMM

D.

WMF

Full Access
Question # 58

Refer to the exhibit.

An engineer must connect a fork lift via a WGB to a wireless network and must authenticate the WGB certificate against the RADIUS server. Which three steps are required for this configuration? (Choose three.)

A.

Configure the certificate, WLAN, and radio interface on WGB.

B.

Configure the certificate on the WLC.

C.

Configure WLAN to authenticate using ISE.

D.

Configure the access point with the root certificate from ISE.

E.

Configure WGB as a network device in ISE.

F.

Configure a policy on ISE to allow devices to connect that validate the certificate.

Full Access
Question # 59

What is the default NMSP echo interval between Cisco MSE and a Wireless LAN Controller?

A.

10 seconds

B.

15 seconds

C.

30 seconds

D.

60 seconds

Full Access
Question # 60

A network engineer needs to configure multicast in the network. The implementation will use multiple multicast groups and PIM routers. Which address provides automatic discovery of the best RP for each multicast group?

A.

224.0.0.13

B.

224.0.0.14

C.

224.0.1.39

D.

224.0.1.40

Full Access
Question # 61

An engineer just added a new MSE to Cisco Prime Infrastructure and wants to synchronize the MSE with the Cisco 5520 WLC, located behind a firewall in a DMZ. It is noticed that NMSP messages are failing between the two devices. Which traffic must be allowed on the firewall to ensure that the MSE and WLC are able to communicate using NMSP?

A.

TCP 1613

B.

UDP 16113

C.

UDP 1613

D.

TCP 16113

Full Access
Question # 62

What is the Cisco recommended configuration for a Cisco switch port connected to an AP in local mode for optimal voice over WLAN performance with an 8821 wireless phone?

A.

switchport encapsulation dot1q

switchport mode trunk

mls qos trust device cisco-phone

B.

switchport mode access

mls qos trust device cisco-phone

C.

switchport mode access mls qos trust cos

D.

switchport mode access mls qos trust dscp

Full Access
Question # 63

A company is concerned about unauthorized APs on their wired and wireless networks. The company implements a Cisco Catalyst Center (formerly DNA Center) solution. Which feature must be enabled?

A.

Rogue Management application package

B.

Neighbor Assisted Roaming

C.

Sniffer package

D.

Monitor Mode package

Full Access
Question # 64

An engineer must implement intrusion protection on the WLAN. The AP coverage is adequate and on-channel attacks are the primary concern. The building is historic, which makes adding APs difficult. Which AP mode and submode must be implemented?

A.

AP mode: local, AP submode: none

B.

AP mode: monitor, AP submode: WIPS

C.

AP mode: monitor, AP submode: none

D.

AP mode: local, AP submode: WIPS

Full Access
Question # 65

A FlexConnect remote office deployment is using five 2702i APs indoors and two 1532i APs outdoors. When a code upgrade is performed and FlexConnect Smart AP Image Upgrade is leveraged, but no FlexConnect Master AP has been configured, how many image transfers between the WLC and APs will occur?

A.

1

B.

2

C.

5

D.

7

Full Access
Question # 66

Which two steps are needed to complete integration of the MSE to Cisco Prime Infrastructure to track the location of clients/rogues on maps? (Choose two.)

A.

Synchronize access points with the MSE.

B.

Add the MSE to Cisco Prime Infrastructure using the CLI credentials.

C.

Add the MSE to Cisco Prime Infrastructure using the Cisco Prime Infrastructure communication credentials.

D.

Apply a valid license for Wireless Intrusion Prevention System.

E.

Apply a valid license for location tracking.

Full Access
Question # 67

An engineer must configure MSE to provide guests access using social media authentication. Which service does the engineer configure so that guests use Facebook credentials to authenticate?

A.

Social Connect

B.

Client Connect

C.

Visitor Connect

D.

Guest Connect

Full Access
Question # 68

A controller shows that an AP in your environment is detecting interference, but the AP health score in Cisco DNA Center is unaffected. What are two reasons that Cisco DNA Center is ignoring the interference? (Choose two.)

A.

The interference is less than or equal to 30% on the 2.4 GHz radio.

B.

The interference is less than or equal to 50% on the 2.4 GHz radio.

C.

Cisco DNA Center includes only Cisco CleanAir interferers in the AP health score.

D.

The interference is less than or equal to 30% on the 5 GHz radio.

E.

Cisco DNA Center does not include interference in the AP health score.

Full Access
Question # 69

A network engineer created a new wireless network that will be used for guest access. The corporate network must utilize all rates. The guest network must use only lower rates instead of 802.11n data rates. To what must the WMM policy of the WLAN be set to accomplish this task?

A.

required

B.

allowed

C.

disabled

D.

mandatory

Full Access
Question # 70

A hospital wants to offer indoor directions to patient rooms utilizing its existing wireless infrastructure. The wireless network has been using location services specifications. Which two components must be installed to support this requirement? (Choose two.)

A.

WIPS

B.

Cisco MSE

C.

Cisco CMX Visitor Connect

D.

Cisco CMX AppEngage

E.

Cisco CMX Analytics

Full Access
Question # 71

An engineer must use Cisco AVC on a Cisco WLC to prioritize Cisco IP cameras that use the wireless network. Which element do you configure in a rule?

A.

permit-ACL

B.

WMM required

C.

mark

D.

rate-limit

Full Access
Question # 72

A customer wants the APs in the CEO’s office to have different usernames and passwords for administrative support than the other APs deployed throughout the facility. Which feature must be enabled on the WLC and APs to achieve this goal?

A.

local management users

B.

HTTPS access

C.

802.1X supplicant credentials

D.

override global credentials

Full Access
Question # 73

An engineer has implemented 802.1x authentication on the wireless network utilizing the internal database of a RADIUS server. Some clients reported that they are unable to connect. After troubleshooting, it is found that PEAP authentication is failing. A debug showed the server is sending an Access- Reject message. Which action must be taken to resolve authentication?

A.

Use the user password that is configured on the server.

B.

Disable the server certificate to be validated on the client.

C.

Update the client certificate to match the user account.

D.

Replace the client certificates from the CA with the server certificate.

Full Access
Question # 74

A company has a single WLAN configured for 802.1x authentication with the QoS set to Silver. This WLAN supports all corporate and BYOD access. A decision has been made to allow users to install Cisco Jabber on their personal mobile devices. Users report poor voice quality when using Jabber. QoS is being applied only as best effort. What must be configured to ensure that the WLAN remains on the Silver class and to ensure Platinum class for Jabber?

A.

Configure QoS on the mobile devices that have Jabber installed.

B.

Enable Cisco Centralized Key Management on the WLAN so that the Jabber-enabled devices will connect.

C.

Configure the WLAN to broadcast on 5 GHz radios only and allow Jabber users to connect.

D.

Configure an AVC profile for the Jabber traffic and apply it to the WLAN.

Full Access
Question # 75

Which devices can be tracked with the Cisco Context Aware Services?

A.

wired and wireless devices

B.

wireless devices

C.

wired devices

D.

Cisco certified wireless devices

Full Access
Question # 76

A company is collecting the requirements for an on-premises event. During the event, a wireless client connected to a dedicated WLAN will run a video application that will need on average 391595179 bits per second to function properly. What is the QoS marking that needs to be applied to that WLAN?

A.

Platinum

B.

Gold

C.

Silver

D.

Bronze

Full Access
Question # 77

An engineer has implemented advanced location services for a retail wireless deployment. The marketing department wants to collect user demographic information in exchange for guest WLAN access and to have a customized portal per location hosted by the provider. Which social connector must be tied into Cisco CMX to provide this service?

A.

Gmail

B.

Google+

C.

Facebook

D.

MySpace

Full Access
Question # 78

Refer to the exhibit.

A network administrator deploys the DHCP profiler service in two ISE servers: 10.3.10.101 and 10.3.10.102. All BYOD devices connecting to WLAN on VLAN63 have been incorrectly profiled and are assigned as unknown profiled endpoints. Which action efficiently rectifies the issue according to Cisco recommendations?

A.

Nothing needed to be added on the Cisco WLC or VLAN interface. The ISE configuration must be fixed.

B.

Disable DHCP proxy on the Cisco WLC.

C.

Disable DHCP proxy on the Cisco WLC and run the ip helper-address command under the VLAN interface to point to DHCP and the two ISE servers.

D.

Keep DHCP proxy enabled on the Cisco WLC and define helper-address under the VLAN interface to point to the two ISE servers.

Full Access
Question # 79

A Cisco 8540 WLC manages Cisco Aironet 4800 Series Aps and sends AoA data to a Cisco CMX 3375 Appliance for Hyperlocation. The load from the WLC is distributed to another virtual CMX server using CMX grouping. The virtual CMX server shows location RSSI data and not Hyperlocation. No AoA metrics are shown on the metrics page of the CMX virtual appliance under System > Metrics > Location Metrics. How must the network administrator resolve this issue?

A.

Enable Wireless > Access Points > Global Configuration> Enable Hyperlocation on the WLC.

B.

Enable the HALO module on the CMX appliance for the data collection.

C.

Allow port 2003 for AoA packets to flow through between the CMX appliances.

D.

Use one Hyperlocation-enabled WLC and CMX for AoA data.

Full Access
Question # 80

You enter the command or a Cisco Catalyst 3850 Series Switch that runs Cisco ISO XE. What does the command do?

A.

It defines the user identity or the device identity to be validated by the RADIUS server.

B.

It captures information on the length of the authorized session, as well as the bandwidth usage of the client.

C.

It defines the RADIUS server used to track which sessions are still active.

D.

It defines the level of access of the user or the device.

Full Access
Question # 81

A network engineer must segregate all IPads on the guest WLAN to a separate VLAN. How does the engineer accomplish this task without using Cisco

ISE?

A.

Create a local policy on the WLC.

B.

Use 802.1x authentication to profile the devices.

C.

Use an mDNS profile for the iPad device.

D.

Enable RADIUS DHCP profiling on the WLAN.

Full Access
Question # 82

An engineer needs to provision certificates on a Cisco Catalyst 9800 Series Wireless Controller. The customer uses a third-party CA server. Which protocol must be used between the controller and CA server to request and install certificates?

A.

SCEP

B.

TLS

C.

LDAP

D.

SSL

Full Access
Question # 83

A company wants to utilize the wireless network to push videos to wireless clients. An engineer has been hired to configure a Cisco WLC to notify users when it cannot provide a video stream while using the Multicast Direct Feature. Which settings must be enabled for this functionality?

A.

Session Announcement State

B.

Message of the Day

C.

SNMP Trap log

D.

Northbound Notification

Full Access