Winter Special Discount 60% Offer - Ends in 0d 00h 00m 00s - Coupon code: brite60

ExamsBrite Dumps

Implementing Cisco Enterprise Wireless Networks (300-430 ENWLSI) Question and Answers

Implementing Cisco Enterprise Wireless Networks (300-430 ENWLSI)

Last Update Mar 25, 2025
Total Questions : 216

We are offering FREE 300-430 Cisco exam questions. All you do is to just go and sign up. Give your details, prepare 300-430 free exam questions and then go for complete pool of Implementing Cisco Enterprise Wireless Networks (300-430 ENWLSI) test questions that will help you more.

300-430 pdf

300-430 PDF

$46  $114.99
300-430 Engine

300-430 Testing Engine

$54  $134.99
300-430 PDF + Engine

300-430 PDF + Testing Engine

$70  $174.99
Questions 1

An IT team is growing quickly and needs a solution for management device access. The solution must authenticate users from an external repository instead of the current local on the WLC, and it must also identify the user and determine what level of access users should have. Which protocol do you recommend to achieve these goals?

Options:

A.  

network policy server

B.  

RADIUS

C.  

TACACS+

D.  

LDAP

Discussion 0
Questions 2

A shopping center uses AireOS controllers with Cisco Wave 2 APs. A separate WLAN named Guest-012345678-WLAN is used for guest wireless clients. Management needs location analytics to determine popular areas. CMX must track only associated clients. What must be selected on the CMX server settings?

Options:

A.  

Exclude probing clients

B.  

Duty Cycle Cutoff

C.  

Enable Locally Administered MAC Filtering

D.  

Enable Location MAC Filtering

Discussion 0
Questions 3

A network engineer is implementing a wireless network and is considering deploying a single SSID for device onboarding.

Which option is a benefit of using dual SSIDs with a captive portal on the onboard SSID compared to a single SSID solution?

Options:

A.  

limit of a single device per user

B.  

restrict allowed devices types

C.  

allow multiple devices per user

D.  

minimize client configuration errors

Discussion 0
Questions 4

An engineer set up identity-based networking with ISE and configured AAA override on the WLAN. Which two attributes must be used to change the client behavior from the default settings? (Choose two.)

Options:

A.  

DHCP timeout

B.  

DNS server

C.  

IPv6 ACL

D.  

DSCP value

E.  

multicast address

Discussion 0
Questions 5

An engineer is implementing a FlexConnect group for access points at a remote location using local switching but central DHCP. Which client feature becomes available only if this configuration is changed?

Options:

A.  

multicast

B.  

static IP

C.  

fast roaming

D.  

mDNS

Discussion 0
Questions 6

An engineer must track guest traffic flow using the WLAN infrastructure. Which Cisco CMX feature must be configured and used to accomplish this tracking?

Options:

A.  

analytics

B.  

connect and engage

C.  

presence

D.  

detect and locate

Discussion 0
Questions 7

A network is set up to support wired and wireless clients. Both types must authenticate using 802.1X before connecting to the network. Different types of client authentication must be separated on a Cisco ISE deployment. Which two configuration items achieve this task? (Choose two.)

Options:

A.  

device profiles

B.  

policy sets

C.  

separate networks

D.  

policy groups

E.  

policy results

Discussion 0
Questions 8

An engineer is performing a Cisco Hyperlocation accuracy test and executes the cmxloc start command on Cisco CMX. Which two parameters are

relevant? (Choose two.)

Options:

A.  

X, Y real location

B.  

client description

C.  

AP name

D.  

client MAC address

E.  

WLC IP address

Discussion 0
Questions 9

A hospital wants to offer indoor directions to patient rooms utilizing its existing wireless infrastructure. The wireless network has been using location services specifications. Which two components must be installed to support this requirement? (Choose two.)

Options:

A.  

WIPS

B.  

Cisco MSE

C.  

Cisco CMX Visitor Connect

D.  

Cisco CMX AppEngage

E.  

Cisco CMX Analytics

Discussion 0
Questions 10

When configuring a Cisco WLC, which CLI command adds a VLAN with VLAN ID of 30 to a FlexConnect group named BranchA-FCG?

Options:

A.  

config flexconnect BranchA-FCG vlan 30 add

B.  

config flexconnect BranchA-FCG vlan add 30

C.  

config flexconnect group BranchA-FCG vlan 30 add

D.  

config flexconnect group BranchA-FCG vlan add 30

Discussion 0
Questions 11

A FlexConnect remote office deployment is using five 2702i APs indoors and two 1532i APs outdoors. When a code upgrade is performed and FlexConnect Smart AP Image Upgrade is leveraged, but no FlexConnect Master AP has been configured, how many image transfers between the WLC and APs will occur?

Options:

A.  

1

B.  

2

C.  

5

D.  

7

Discussion 0
Questions 12

After receiving an alert about a rogue AP, a network engineer logs into Cisco Prime Infrastructure and looks at the floor map where the AP that detected the rogue is located. The map is synchronized with a mobility services engine that determines that the rogue device is actually inside the campus. The engineer determines that the rogue is a security threat and decides to stop if from broadcasting inside the enterprise wireless network. What is the fastest way to disable the rogue?

Options:

A.  

Go to the location where the rogue device is indicated to be and disable the power.

B.  

Create an SSID similar to the rogue to disable clients from connecting to it.

C.  

Update the status of the rogue in Cisco Prime Infrastructure to contained.

D.  

Classify the rogue as malicious in Cisco Prime Infrastructure.

Discussion 0
Questions 13

You are configuring the social login for a guest network. Which three options are configurable social connectors in Cisco CMX Visitor Connect? (Chose three)

Options:

A.  

Linkedn

B.  

Pinterest

C.  

Medium

D.  

Google+

E.  

Facebook

F.  

Myspace

Discussion 0
Questions 14

The network management team in a large shopping center has detected numerous rogue APs from local coffee shops that are broadcasting SSIDs. All of these SSIDs have names starting with ATC (for example, ATC302, ATC011, and ATC566). A wireless network engineer must appropriately classify these SSIDs using the Rogue Rules feature. Drag and drop the options from the left onto the categories in which they must be used on the right. Not all options are used.

Options:

Discussion 0
Questions 15

Company XYZ recently migrated from AireOS to IOS XE 9800 WLCs. The Internet bandwidth must be limited to 5 Mbps for each guest client as per the global standard. In which configuration on the Cisco Catalyst 9800 WLC must the QoS requirement be added?

Options:

A.  

table map

B.  

policy map

C.  

service policy

D.  

class map

Discussion 0
Questions 16

An engineer completed the basic installation for two Cisco CMX servers and is in the process of configuring high availability, but it fails. Which two statements about the root of the issue are true? (Choose two.)

Options:

A.  

The Cisco CMX instances are installed in the same subnet.

B.  

The types of the primary and secondary Cisco CMX installations differ.

C.  

The delay between the primary and secondary instance is 200 ms.

D.  

The sizes of the primary and secondary Cisco CMX installations differ.

E.  

Both Cisco CMX installations are virtual.

Discussion 0
Questions 17

What must be configured on the Global Configuration page of the WLC for an AP to use 802.1x to authenticate to the wired infrastructure?

Options:

A.  

local access point credentials

B.  

RADIUS shared secret

C.  

TACACS server IP address

D.  

supplicant credentials

Discussion 0
Questions 18

A wireless engineer must configure access control on a WLC using a TACACS+ server for a company that is implementing centralized authentication on network devices. Which role value must be configured under the shell profile on the TACACS+ server for a user with read-only permissions?

Options:

A.  

ADMIN

B.  

MANAGEMENT

C.  

MONITOR

D.  

READ

Discussion 0
Questions 19

An administrator receives reports of many interferers in the wireless network and wants to get the location of these interferers from the maps in Cisco Prime Infrastructure.

When looking at the floor plans/maps, the administrator does not see any interferers, but can see all wireless clients located successfully.

Which two statements define the cause of the issue? (Choose two.)

Options:

A.  

MSE is not added to Cisco Prime infrastructure and synchronized.

B.  

Interferer tracking is not enabled on the MSE.

C.  

SNMP between Cisco Prime Infrastructure and the WLC is failing.

D.  

Context Aware Service tracking limit has already been reached with tracking other elements.

E.  

NSMP communication is inactive with the WLC.

Discussion 0
Questions 20

An engineer is configuring a new wireless network for guest access. The Facebook page of the company must be viewed by the guest users before they get access to the network. A Cisco MSE is used as a wireless component. Which URL must be used in the configuration as the external redirection URL?

Options:

A.  

http:// :8083/visitor/login.do

B.  

http:// :8083/fbwifi/forward

C.  

http:// :8084/visitor/login.do

D.  

http:// :8084/fbwifi/forward

Discussion 0
Questions 21

Which two steps are needed to complete integration of the MSE to Cisco Prime Infrastructure to track the location of clients/rogues on maps? (Choose two.)

Options:

A.  

Synchronize access points with the MSE.

B.  

Add the MSE to Cisco Prime Infrastructure using the CLI credentials.

C.  

Add the MSE to Cisco Prime Infrastructure using the Cisco Prime Infrastructure communication credentials.

D.  

Apply a valid license for Wireless Intrusion Prevention System.

E.  

Apply a valid license for location tracking.

Discussion 0
Questions 22

An engineer is considering an MDM integration with Cisco ISE to assist with security for lost devices.

Which two functions of MDM increase security for lost devices that access data from the network? (Choose two.)

Options:

A.  

PIN enforcement

B.  

Jailbreak/root detection

C.  

data wipe

D.  

data encryption

E.  

data loss prevention

Discussion 0
Questions 23

An engineer wants to configure WebEx to adjust the precedence and override the QoS profile on the WLAN. Which configuration is needed to complete this task?

Options:

A.  

Change the WLAN reserved bandwidth for WebEx

B.  

Create an AVC profile for WebEx

C.  

Create an ACL for WebEx

D.  

Change the AVC application WebEx-app-sharing to mark

Discussion 0
Questions 24

A corporation has a wireless network where all access points are configured in FlexConnect. The WLC has a Data WLAN and a VoWiFi WLAN implemented where centrally-switched SSID is configured for the APs. Which QoS configuration must be implemented for the wireless packets to maintain the marking across the wired and wireless network?

Options:

A.  

Set QoS to Platinum.

B.  

Enable CAC.

C.  

Allow WMM.

D.  

Trust DSCP.

Discussion 0
Questions 25

Refer to the exhibit.

An engineer must restrict some subnets to have access to the WLC. When the CPU ACL function is enabled, no ACLs in the drop-down list are seen. What is the cause of the problem?

Options:

A.  

The ACL does not have a rule that is specified to the Management interface.

B.  

No ACLs have been created under the Access Control List tab.

C.  

When the ACL is created, it must be specified that it is a CPU ACL.

D.  

This configuration must be performed through the CLI and not though the web GUI.

Discussion 0
Questions 26

An engineer must configure Cisco OEAPs for three executives. As soon as the NAT address is configured on the management interface, it is noticed that the WLC is not responding for APs that are trying to associate to the internal IP management address. Which command should be used to reconcile this?

Options:

A.  

config flexconnect office-extend nat-ip-only disable

B.  

config network ap-discovery nap-ip-only enable

C.  

config flexconnect office-extend nat-ip-only enable

D.  

config network ap-discovery nat-ip-only disable

Discussion 0
Questions 27

A corporation has employees working from their homes. A wireless engineer must connect 1810 OEAP at remote teleworker locations. All configuration has been completed on the controller side, but the network readiness is pending. Which two configurations must be performed on the firewall to allow the AP to join the controller? (Choose two.)

Options:

A.  

Block UDP ports 1812 and 1813 on the firewall.

B.  

Enable NAT Address on the 5520 with an Internet-routable IP address.

C.  

Configure a static IP on the OEAP 1810.

D.  

Allow UDP ports 5246 and UDP port 5247 on the firewall.

E.  

Allow UDP ports 12222 and 12223 on the firewall.

Discussion 0
Questions 28

An engineer must implement Cisco Identity-Based Networking Services at a remote site using ISE to dynamically assign groups of users to specific IP subnets. If the subnet assigned to a client is available at the remote site, then traffic must be offloaded locally, and subnets are unavailable at the remote site must be tunneled back to the WLC. Which feature meets these requirements?

Options:

A.  

learn client IP address

B.  

FlexConnect local authentication

C.  

VLAN-based central switching

D.  

central DHCP processing

Discussion 0
Questions 29

An engineer needs read/write access to rename access points and add them to the correct AP groups on a wireless controller. Using Cisco ISE TACACS, which custom attributes is the minimum required?

Options:

A.  

role1=WLAN

B.  

role1=WLAN role2=SECURITY

C.  

role1=WLAN role2=WIRELESS

D.  

role1=WIRELESS

Discussion 0
Questions 30

A network engineer must segregate all IPads on the guest WLAN to a separate VLAN. How does the engineer accomplish this task without using Cisco

ISE?

Options:

A.  

Create a local policy on the WLC.

B.  

Use 802.1x authentication to profile the devices.

C.  

Use an mDNS profile for the iPad device.

D.  

Enable RADIUS DHCP profiling on the WLAN.

Discussion 0
Questions 31

A customer managing a large network has implemented location services. Due to heavy load, it is needed to load balance the data coming through NMSP from the WLCs. Load must be spread between multiple CMX servers to help optimize the data flow for APs. Which configuration in CMX meets this requirement?

Options:

A.  

cmxctl config feature flags nmsplb.cmx-ap-grouping true

B.  

cmxctl config feature flags nmsplb.cmxgrouping true

C.  

cmxctl config feature flags nmsplb.cmx-loadbalance true

D.  

cmxctl config feature flags nmsplb.cmx-rssi-distribute true

Discussion 0
Questions 32

Which three characteristics of a rogue AP pose a high security risk? (Choose three.)

Options:

A.  

open authentication

B.  

high RSSI

C.  

foreign SSID

D.  

accepts clients

E.  

low RSSI

F.  

distant location

Discussion 0
Questions 33

An engineer is designing a high availability wireless network. What mechanism should be the focus for high availability?

Options:

A.  

SNR

B.  

channel reuse

C.  

RSSI

D.  

cell overlap

Discussion 0
Questions 34

Which configuration is applied to prevent the network from a Layer 2 flooding of multicast frames with a seamless transfer of multicast data to the client when roaming from one controller to another?

Options:

A.  

Enable IGMPv3 on the central Layer 3 switch.

B.  

Enable IGMP snooping on the WLC.

C.  

Enable multicast mode on the WL

C.  

D.  

Create multicast groups on the central Layer 3 switch.

Discussion 0
Questions 35

Refer to the exhibit.

An engineer is creating an ACL to restrict some traffic to the WLC CPU. Which selection must be made from the direction drop- down list?

Options:

A.  

It must be Inbound because traffic goes to the WLC.

B.  

Packet direction has no significance; it is always Any.

C.  

It must be Outbound because it is traffic that is generated from the WL

C.  

D.  

To have the complete list of options, the CPU ACL must be created only by the CLI.

Discussion 0
Questions 36

A hospital wants to offer indoor directions to patient rooms utilizing its existing wireless infrastructure. The wireless network has been using location services specifications. Which two components must be installed to support this requirement? (Choose two.)

Options:

A.  

WIPS

B.  

Cisco MSE

C.  

Cisco CMX Visitor Connect

D.  

Cisco CMX AppEngage

E.  

Cisco CMX Analytics

Discussion 0
Questions 37

You enter the command or a Cisco Catalyst 3850 Series Switch that runs Cisco ISO XE. What does the command do?

Options:

A.  

It defines the user identity or the device identity to be validated by the RADIUS server.

B.  

It captures information on the length of the authorized session, as well as the bandwidth usage of the client.

C.  

It defines the RADIUS server used to track which sessions are still active.

D.  

It defines the level of access of the user or the device.

Discussion 0
Questions 38

An engineer is following the proper upgrade path to upgrade a Cisco AireOS WLC from version 7.3 to 8.9. Which two ACLs for Cisco CWA must be configured when upgrading from the specified codes? (Choose two.)

Options:

A.  

Permit 0.0.0.0 0.0.0.0 any DNS any

B.  

Permit 0.0.0.0 0.0.0.0 UDP DNS any

C.  

Permit 0.0.0.0 0.0.0.0 UDP any DNS

D.  

Permit any any any

E.  

Permit 0.0.0.0 0.0.0.0 UDP any any

Discussion 0
Questions 39

A customer wants the APs in the CEO’s office to have different usernames and passwords for administrative support than the other APs deployed throughout the facility. Which feature must be enabled on the WLC and APs to achieve this goal?

Options:

A.  

local management users

B.  

HTTPS access

C.  

802.1X supplicant credentials

D.  

override global credentials

Discussion 0
Questions 40

A network engineer observes a spike in controller CPU overhead and overall network utilization after multicast is enabled on a controller with 500 APs. Which feature corrects the issue?

Options:

A.  

controller IGMP snooping

B.  

multicast AP multicast mode

C.  

broadcast forwarding

D.  

unicast AP multicast mode

Discussion 0
Questions 41

A wireless engineer is configuring LWA using ISE. The customer is a startup company and requested the wireless users to authenticate against a directory, but LDAP is unavailable. Which solution should be proposed in order to have the same security and user experience?

Options:

A.  

Use SAML.

B.  

Use the internal database of the RADIUS server.

C.  

Use a preshared key on the corporate WLAN.

D.  

Use Novell eDirectory.

Discussion 0
Questions 42

Which two configurations are applied on the WLC to enable multicast, check multicast stream subscriptions, and stream content only to subscribed clients? (Choose two)

Options:

A.  

Enable IGMP snooping

B.  

Set the IGMP timeout to 180 seconds

C.  

Enable broadcast forwarding

D.  

Enable 802.3x flow control mode.

E.  

Set the AP multicast to 238.255.255.255

Discussion 0
Questions 43

An engineer configured a Cisco AireOS controller with two TACACS+ servers. The engineer notices that when the primary TACACS+ server fails, the WLC starts using the secondary server as expected, but the WLC does not use the primary server again until the secondary server fails or the controller is rebooted. Which cause of this issue is true?

Options:

A.  

Fallback is enabled

B.  

Fallback is disabled

C.  

DNS query is disabled

D.  

DNS query is enabled

Discussion 0
Questions 44

A customer requires wireless traffic from the branch to be routed through the firewall at corporate headquarters. A RADIUS server is in each branch location. Which Cisco FlexConnect configuration must be used?

Options:

A.  

central authentication and local switching

B.  

central authentication and central switching

C.  

local authentication and local switching

D.  

local authentication and central switching

Discussion 0
Questions 45

What is the Cisco recommended configuration for a Cisco switch port connected to an AP in local mode for optimal voice over WLAN performance with an 8821 wireless phone?

Options:

A.  

switchport encapsulation dot1q

switchport mode trunk

mls qos trust device cisco-phone

B.  

switchport mode access

mls qos trust device cisco-phone

C.  

switchport mode access mls qos trust cos

D.  

switchport mode access mls qos trust dscp

Discussion 0
Questions 46

An engineer needs to provision certificates on a Cisco Catalyst 9800 Series Wireless Controller. The customer uses a third-party CA server. Which protocol must be used between the controller and CA server to request and install certificates?

Options:

A.  

SCEP

B.  

TLS

C.  

LDAP

D.  

SSL

Discussion 0
Questions 47

An engineer is using Cisco Prime Infrastructure reporting to monitor the state of security on the WLAN. Which output is produced when the Adaptive wIPS Top 10 AP report is run?

Options:

A.  

last 10 wIPS events from monitor mode APs

B.  

last 10 wIPS events from sniffer mode APs

C.  

last of 10 sniffer mode APs with the most wIPS events

D.  

last of 10 monitor mode APs with the most wIPS events

Discussion 0
Questions 48

An enterprise has two WLANs configured on WLC. It is reported that when converting APs to FlexConnect mode, WLAN A works but WLAN B does not. When converting APs to local mode, WLAN B works, but WLAN A does not. Which action is needed to complete this configuration?

Options:

A.  

Create a Cisco FlexConnect group with WLAN-VLAN mapping.

B.  

Disable local switching on the WLANs.

C.  

Map the AP group to the WLAN interface.

D.  

Join the APs to a Cisco FlexConnect group.

Discussion 0
Questions 49

After looking in the logs, an engineer notices that RRM keeps changing the channels for non-IEEE 802.11 interferers. After surveying the area, it has been decided that RRM should not change the channel. Which feature must be enabled to ignore non-802.11 interference?

Options:

A.  

Avoid Cisco AP Load

B.  

Avoid Non-802.11 Noise

C.  

Avoid Persistent Non-WiFi Interference

D.  

Avoid Foreign AP Interference

Discussion 0
Questions 50

Which feature on the Cisco Wireless LAN Controller must be present to support dynamic VLAN mapping?

Options:

A.  

FlexConnect ACL

B.  

VLAN name override

C.  

CCKM/OKC

D.  

AAA override

Discussion 0
Questions 51

An engineer must create an account to log in to the CLI of an access point for troubleshooting. Which configuration on the WLC will accomplish this?

Options:

A.  

Allow New Telnet Sessions

B.  

ReadWrite User Access Mode

C.  

SNMP V3 User

D.  

Global Configuration Enable Password

Discussion 0
Questions 52

Which two configurations are applied on the WLC to enable multicast, check multicast stream subscriptions, and stream content only to subscribed clients? (Choose two)

Options:

A.  

Enable IGMP snooping

B.  

Set the IGMP timeout to 180 seconds

C.  

Enable broadcast forwarding

D.  

Enable 802.3x flow control mode.

E.  

Set the AP multicast to 238.255.255.255

Discussion 0
Questions 53

Refer to the exhibit.

Which COS to DSCP map must be modified to ensure that voice traffic is tagged correctly as it traverses the network?

Options:

A.  

COS of 6 to DSCP 46

B.  

COS of 3 to DSCP 26

C.  

COS of 7 to DSCP 48

D.  

COS of 5 to DSCP 46

Discussion 0
Questions 54

Which EAP method can an AP use to authenticate to the wired network?

Options:

A.  

EAP-GTC

B.  

EAP-MD5

C.  

EAP-TLS

D.  

EAP-FAST

Discussion 0
Questions 55

A shopping center uses AireOS controllers with Cisco Wave 2 APs. A separate WLAN named Guest-012345678-WLAN is used for guest wireless clients. Management needs location analytics to determine popular areas. CMX must track only associated clients. What must be selected on the CMX server settings?

Options:

A.  

Exclude probing clients

B.  

Duty Cycle Cutoff

C.  

Enable Locally Administered MAC Filtering

D.  

Enable Location MAC Filtering

Discussion 0
Questions 56

An engineer needs to configure an autonomous AP for 802.1x authentication. To achieve the highest security an authentication server is used for user authentication. During testing, the AP fails to pass the user authentication request to the authentication server. Which two details need to be configured on the AP to allow communication between the server and the AP? (Choose two.)

Options:

A.  

username and password

B.  

PAC encryption key

C.  

RADIUS IP address

D.  

shared secret

E.  

group name

Discussion 0
Questions 57

Which two statements about the requirements for a Cisco Hyperlocation deployment are true? (Choose two.)

Options:

A.  

After enabling Cisco Hyperlocation on Cisco CMX, the APs and the wireless LAN controller must be restarted.

B.  

NTP can be configured, but that is not recommended.

C.  

The Cisco Hyperlocation feature must be enabled on the wireless LAN controller and Cisco CMX.

D.  

The Cisco Hyperlocation feature must be enabled only on the wireless LAN controller.

E.  

If the Cisco CMX server is a VM, a high-end VM is needed for Cisco Hyperlocation deployments.

Discussion 0
Questions 58

An engineer is implementing RADIUS to restrict administrative control to the network with the WLC management IP address of 192.168.1.10 and an AP subnet of 192.168.2.0/24. Which entry does the engineer define in the RADIUS server?

Options:

A.  

administrative access defined on the WLC and the network range 192.168.2.0/255.255.254.0

B.  

NAS entry of the virtual interface and the network range 192.168.2.0/255.255.255.0

C.  

shared secret defined on the WLC and the network range 192.168.1.0/255.255.254.0

D.  

WLC roles for commands and the network range 192.168.1.0/255.255.255.0

Discussion 0
Questions 59

Which three properties are used for client profiling of wireless clients? (Choose three.)

Options:

A.  

HTTP user agent

B.  

DHCP

C.  

MAC OUI

D.  

hostname

E.  

OS version

F.  

IP address

Discussion 0
Questions 60

A corporation has recently implemented a BYOD policy at their HQ. Which two risks should the security director be concerned about? (Choose two.)

Options:

A.  

network analyzers

B.  

malware

C.  

lost and stolen devices

D.  

keyloggers

E.  

unauthorized users

Discussion 0
Questions 61

Which two steps are needed to complete integration of the MSE to Cisco Prime Infrastructure to track the location of clients/rogues on maps? (Choose two.)

Options:

A.  

Synchronize access points with the MSE.

B.  

Add the MSE to Cisco Prime Infrastructure using the CLI credentials.

C.  

Add the MSE to Cisco Prime Infrastructure using the Cisco Prime Infrastructure communication credentials.

D.  

Apply a valid license for Wireless Intrusion Prevention System.

E.  

Apply a valid license for location tracking.

Discussion 0
Questions 62

A company has a single WLAN configured for 802.1x authentication with the QoS set to Silver. This WLAN supports all corporate and BYOD access. A decision has been made to allow users to install Cisco Jabber on their personal mobile devices. Users report poor voice quality when using Jabber. QoS is being applied only as best effort. What must be configured to ensure that the WLAN remains on the Silver class and to ensure Platinum class for Jabber?

Options:

A.  

Configure QoS on the mobile devices that have Jabber installed.

B.  

Enable Cisco Centralized Key Management on the WLAN so that the Jabber-enabled devices will connect.

C.  

Configure the WLAN to broadcast on 5 GHz radios only and allow Jabber users to connect.

D.  

Configure an AVC profile for the Jabber traffic and apply it to the WLAN.

Discussion 0
Questions 63

An engineer wants the wireless voice traffic class of service to be used to determine the queue order for packets received, and then have the differentiated services code point set to match when it is resent to another port on the switch. Which configuration is required in the network?

Options:

A.  

Platinum QoS configured on the WLAN

B.  

WMM set to required on the WLAN

C.  

msl qos trust dscp configured on the controller switch port

D.  

msl qos trust cos configured on the controller switch port

Discussion 0
Questions 64

Refer to the exhibit.

The image shows a packet capture that was taken at the CLI of the Cisco CMX server. It shows UDP traffic from the WLC coming into the server. What does the capture prove?

Options:

A.  

The Cisco CMX server receives NetFlow data from the WLC.

B.  

The Cisco CMX server receives NMSP traffic from the WLC.

C.  

The Cisco CMX server receives SNMP traffic from the WL

C.  

D.  

The Cisco CMX server receives Angle-of-Arrival data from the WLC.

Discussion 0