New Year Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exams65

ExamsBrite Dumps

Implementing Cisco Enterprise Wireless Networks (300-430 ENWLSI) Question and Answers

Implementing Cisco Enterprise Wireless Networks (300-430 ENWLSI)

Last Update Jan 15, 2026
Total Questions : 277

We are offering FREE 300-430 Cisco exam questions. All you do is to just go and sign up. Give your details, prepare 300-430 free exam questions and then go for complete pool of Implementing Cisco Enterprise Wireless Networks (300-430 ENWLSI) test questions that will help you more.

300-430 pdf

300-430 PDF

$40.25  $114.99
300-430 Engine

300-430 Testing Engine

$47.25  $134.99
300-430 PDF + Engine

300-430 PDF + Testing Engine

$61.25  $174.99
Questions 1

The Cisco Hyperlocation detection threshold is currently set to -50 dBm. After reviewing the wireless user location, discrepancies have been noticed. To improve the Cisco Hyperlocation accuracy, an engineer attempts to change the detection threshold to -100 dBm. However, the Cisco Catalyst 9800 Series Wireless Controller does not allow this change to be applied. What actions should be taken to resolve this issue?

Options:

A.  

Disable Cisco Hyperlocation, change the Cisco Hyperlocation detection threshold, and then enable it.

B.  

Create a new profile on Cisco CMX with the new Cisco Hyperlocation detection range, and apply it on the WLAN.

C.  

Place the APs to monitor mode, shutdown the radios, and then change the Cisco Hyperlocation detection threshold.

D.  

Shutdown all radios on the controller, change the Cisco Hyperlocation detection range, and enable the radios again.

Discussion 0
Questions 2

An engineer is implementing RADIUS to restrict administrative control to the network with the WLC management IP address of 192.168.1.10 and an AP subnet of 192.168.2.0/24. Which entry does the engineer define in the RADIUS server?

Options:

A.  

administrative access defined on the WLC and the network range 192.168.2.0/255.255.254.0

B.  

NAS entry of the virtual interface and the network range 192.168.2.0/255.255.255.0

C.  

shared secret defined on the WLC and the network range 192.168.1.0/255.255.254.0

D.  

WLC roles for commands and the network range 192.168.1.0/255.255.255.0

Discussion 0
Questions 3

Which EAP method can an AP use to authenticate to the wired network?

Options:

A.  

EAP-GTC

B.  

EAP-MD5

C.  

EAP-TLS

D.  

EAP-FAST

Discussion 0
Questions 4

An engineer has successfully implemented 10 active RFID tags in an office environment. The tags are not visible when the location accuracy is tested on the Cisco CMX Detect and Locate window. Which setting on Cisco CMX allows the engineer to view the tags?

Options:

A.  

Enable RFID tags in tracking options.

B.  

Enable probing clients for active tags.

C.  

Define an RFID group globally and add the tags.

D.  

Enable hyperlocation services for RFI

D.  

Discussion 0
Questions 5

A network engineer must get an autonomous AP to authenticate to the upstream switch via IEEE 802.1 X. Drag and drop the commands from the left onto the right to complete the configuration.

Options:

Discussion 0
Questions 6

A wireless engineer has performed a Wireshark ccapture on an 802.1x authentication process to troubleshoot a connectivity issue.

Which two types of packet does the EAP contain? (Choose two.)

Options:

A.  

EAP complete

B.  

EAP response

C.  

EAP failure

D.  

EAP request

E.  

EAP reply

Discussion 0
Questions 7

Refer to the exhibit.

An engineer must provide a position of rogue APs on a floor map using Cisco PI 3.0, but no rogue AP options are showing on the left-hand navigation menu under Maps. What is the reason for this omission?

Options:

A.  

An assurance license is not installed.

B.  

The controller operational status background task is disabled.

C.  

The Show Detected Interferers feature under the AP option is disabled.

D.  

Cisco MSE has not been added to Cisco PI.

Discussion 0
Questions 8

An engineer is implementing a FlexConnect group for access points at a remote location using local switching but central DHCP. Which client feature becomes available only if this configuration is changed?

Options:

A.  

multicast

B.  

static IP

C.  

fast roaming

D.  

mDNS

Discussion 0
Questions 9

The security learn is concerned about the access to all network devices, including the Cisco WLC. To permit only the admin subnet to have access to management, a CPU ACL is created and applied. However, guest users cannot get to the web portal. What must be configured to permit only admins to have access?

Options:

A.  

The guest portal must be configured on the CPU ACLs on the Cisco WLC.

B.  

Access to Cisco ISE must be allowed on the pre authentication ACL.

C.  

Management traffic from the guest network must be configured on the ACL rules. D. Traffic toward the virtual interface must be permitted.

Discussion 0
Questions 10

Company XYZ recently migrated from AireOS to IOS XE 9800 WLCs. The Internet bandwidth must be limited to 5 Mbps for each guest client as per the global standard. In which configuration on the Cisco Catalyst 9800 WLC must the QoS requirement be added?

Options:

A.  

table map

B.  

policy map

C.  

service policy

D.  

class map

Discussion 0
Questions 11

A network administrator managing a Cisco Catalyst 9800 WLC must place all iOS-connected devices to the guest SSID on VLAN 101. The rest of the clients must connect on VLAN 102 to distribute load across subnets. To achieve this configuration, the administrator configures a local policy on the WLC. Which two configurations are required? (Choose two.)

Options:

A.  

Assign a policy map under global security policy settings.

B.  

Add local profiling policy under global security policy settings.

C.  

Create a service template.

D.  

Allow HTTP and DHCP profiling under policy map.

E.  

Enable device classification on global wireless settings.

Discussion 0
Questions 12

An engineer is troubleshooting rogue access points that are showing up in Cisco Prime Infrastructure.

What is maximum number of APS the engineer can use to contain an identified rogue access point in the WLC?

Options:

A.  

3

B.  

4

C.  

6

D.  

5

Discussion 0
Questions 13

A new MSE with wIPS service has been installed and no alarm information appears to be reaching the MSE from controllers. Which protocol must be allowed to reach the MSE from the controllers?

Options:

A.  

SOAP/XML

B.  

NMSP

C.  

CAPWAP

D.  

SNMP

Discussion 0
Questions 14

A Cisco 8540 WLC manages Cisco Aironet 4800 Series Aps and sends AoA data to a Cisco CMX 3375 Appliance for Hyperlocation. The load from the WLC is distributed to another virtual CMX server using CMX grouping. The virtual CMX server shows location RSSI data and not Hyperlocation. No AoA metrics are shown on the metrics page of the CMX virtual appliance under System > Metrics > Location Metrics. How must the network administrator resolve this issue?

Options:

A.  

Enable Wireless > Access Points > Global Configuration> Enable Hyperlocation on the WLC.

B.  

Enable the HALO module on the CMX appliance for the data collection.

C.  

Allow port 2003 for AoA packets to flow through between the CMX appliances.

D.  

Use one Hyperlocation-enabled WLC and CMX for AoA data.

Discussion 0
Questions 15

Which two protocols are used to communicate between the Cisco MSE and the Cisco Prime Infrastructure network management software? (Choose two.)

Options:

A.  

HTTPS

B.  

Telnet

C.  

SOAP

D.  

SSH

E.  

NMSP

Discussion 0
Questions 16

An engineer must achieve the highest level of location accuracy possible for a new mobile application. Which technology must be implemented for this use case?

Options:

A.  

Time Difference of Arrival

B.  

Bluetooth Low Energy

C.  

RSS lateration

D.  

ToA lateration

Discussion 0
Questions 17

Which condition introduce security risk to a BYOD policy?

Options:

A.  

enterprise-managed MDM platform used for personal devices

B.  

access to LAN without implementing MDM solution

C.  

enforcement of BYOD access to internet only network

D.  

enterprise life-cycle enforcement of personal device refresh

Discussion 0
Questions 18

Refer to the exhibit.

Which area indicates the greatest impact on the wireless network when viewing the Cisco CleanAir Zone of Impact map of interferers?

Options:

A.  

A

B.  

B

C.  

C

D.  

D

Discussion 0
Questions 19

A healthcare organization notices many rogue APs and is concerned about a honeypot attack. Which configuration must a wireless network engineer perform in Cisco Prime Infrastructure to prevent these attacks most efficiently upon detection?

Options:

A.  

Set the auto containment level to 0 and select the Using Our SSID containment option.

B.  

Set the manual containment level to 4 and select the Ad Hoc Rogue AP containment option.

C.  

Set the auto containment level to 0 and select the Ad Hoc Rogue AP containment option.

D.  

Set the auto containment level to 4 and select the Using Our SSID containment option.

Discussion 0
Questions 20

A wireless engineer must implement a corporate wireless network for a large company in the most efficient way possible. The wireless network must support 32 VLANs for 300 employees in different departments. Which solution must the engineer choose?

Options:

A.  

Configure a second WLC to support half of the APs in the deployment.

B.  

Configure one single SSID and implement Cisco ISE for VLAN assignment according to different user roles.

C.  

Configure different AP groups to support different VLANs, so that all of the WLANs can be broadcast on both radios.

D.  

Configure 16 WLANs to be broadcast on the 2.4-GHz band and 16 WLANs to be broadcast on the 5.0-GHz band.

Discussion 0
Questions 21

Which three characteristics of a rogue AP pose a high security risk? (Choose three.)

Options:

A.  

open authentication

B.  

high RSSI

C.  

foreign SSID

D.  

accepts clients

E.  

low RSSI

F.  

distant location

Discussion 0
Questions 22

What must be configured on ISE version 2.1 BYOD when using Single SSID?

Options:

A.  

open authentication

B.  

802.1x

C.  

no authentication

D.  

WPA2

Discussion 0
Questions 23

A customer managing a large network has implemented location services. Due to heavy load, it is needed to load balance the data coming through NMSP from the WLCs. Load must be spread between multiple CMX servers to help optimize the data flow for APs. Which configuration in CMX meets this requirement?

Options:

A.  

cmxctl config feature flags nmsplb.cmx-ap-grouping true

B.  

cmxctl config feature flags nmsplb.cmxgrouping true

C.  

cmxctl config feature flags nmsplb.cmx-loadbalance true

D.  

cmxctl config feature flags nmsplb.cmx-rssi-distribute true

Discussion 0
Questions 24

An enterprise has two WLANs configured on WLC. It is reported that when converting APs to FlexConnect mode, WLAN A works but WLAN B does not. When converting APs to local mode, WLAN B works, but WLAN A does not. Which action is needed to complete this configuration?

Options:

A.  

Create a Cisco FlexConnect group with WLAN-VLAN mapping.

B.  

Disable local switching on the WLANs.

C.  

Map the AP group to the WLAN interface.

D.  

Join the APs to a Cisco FlexConnect group.

Discussion 0
Questions 25

In a Cisco WLAN deployment, it is required that all Aps from branch1 remain operational even if the control plane CAPWAP tunnel is down because of a WAN failure to headquarters. Which operational mode must be configured on the APs?

Options:

A.  

disconnected

B.  

standalone

C.  

lightweight

D.  

connected

Discussion 0
Questions 26

An engineer is implementing Cisco Identity-Based Networking on a Cisco AireOS controller. The engineer has two ACLs on the controller. The first ACL, named BASE_ACL, is applied to the corporate_clients interface on the WLC, which is used for all corporate clients. The second ACL, named HR_ACL, is referenced by ISE in the Human Resources group policy. What is the resulting ACL when a Human Resources user connects?

Options:

A.  

HR_ACL appended with BASE_ACL

B.  

HR_ACL only

C.  

BASE_ACL appended with HR_ACL

D.  

BASE_ACL only

Discussion 0
Questions 27

Refer to the exhibit. A network administrator must automate notifications for Security Advisories Data reports on the Cisco Catalyst Center v2.3.7 using the Report notification feature. Preferring a programmable approach over UI/CLI, the administrator decides to create a webhook via the Cisco DNA Center API to send real-time HTTP notifications to an external application. The webhook URL https://example.com/webhook uses HTTPS with a self-signed certificate, which requires a specific configuration in the payload to ensure the webhook functions correctly. Which code snippet must be placed onto the box in the code to complete the Python script that configures the webhook to use the self-signed certificate to extract the Security Advisories Data report?

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

Discussion 0
Questions 28

A corporation has recently implemented a BYOD policy at their HQ. Which two risks should the security director be concerned about? (Choose two.)

Options:

A.  

network analyzers

B.  

malware

C.  

lost and stolen devices

D.  

keyloggers

E.  

unauthorized users

Discussion 0
Questions 29

Refer to the exhibit.

An engineer must restrict some subnets to have access to the WLC. When the CPU ACL function is enabled, no ACLs in the drop-down list are seen. What is the cause of the problem?

Options:

A.  

The ACL does not have a rule that is specified to the Management interface.

B.  

No ACLs have been created under the Access Control List tab.

C.  

When the ACL is created, it must be specified that it is a CPU ACL.

D.  

This configuration must be performed through the CLI and not though the web GUI.

Discussion 0
Questions 30

An SSID is set up with central web authentication using Cisco ISE The new SSID uses guest tunneling from the foreign controller to the anchor controller. Which device must be configured ISE as the one performing the RADIUS authentication requests for the web authentication method?

Options:

A.  

APs

B.  

authentication server

C.  

anchor controller

D.  

foreign controller

Discussion 0
Questions 31

An engineer must configure MSE to provide guests access using social media authentication. Which service does the engineer configure so that guests use Facebook credentials to authenticate?

Options:

A.  

Social Connect

B.  

Client Connect

C.  

Visitor Connect

D.  

Guest Connect

Discussion 0
Questions 32

A wireless administrator receives this information to complete a CMX deployment in high availability by using version 10.6 to gather analytics.

IP address of the primary server

IP address of the secondary server

failover mode to be configured as automatic

root password of the secondary server

email ID for NOC notifications

Enabling high availability fails when these parameters are used. Which action resolves the issue?

Options:

A.  

Insert the cmxadmin password of the secondary server.

B.  

Use IP protocol 4242 for the controller to reach the CMX server.

C.  

Place primary and secondary servers in different subnets.

D.  

Enable the virtual IP address of the primary server.

Discussion 0
Questions 33

Refer to the exhibit.

An engineer must connect a fork lift via a WGB to a wireless network and must authenticate the WGB certificate against the RADIUS server. Which three steps are required for this configuration? (Choose three.)

Options:

A.  

Configure the certificate, WLAN, and radio interface on WGB.

B.  

Configure the certificate on the WLC.

C.  

Configure WLAN to authenticate using ISE.

D.  

Configure the access point with the root certificate from ISE.

E.  

Configure WGB as a network device in IS

E.  

F.  

Configure a policy on ISE to allow devices to connect that validate the certificate.

Discussion 0
Questions 34

An engineer has many different WLANs on a WLC but does not want to broadcast them to every AP in the building. Which group must be configured on the WLC to allow different WLANs on the different APs without creating new interfaces?

Options:

A.  

ACL

B.  

interface group

C.  

mobility group

D.  

AP group

Discussion 0
Questions 35

Refer to the exhibit.

An engineer needs to configure location services in an office. The requirement is to use FastLocate and achieve higher locations refresh rates. Which location-based technique should be implemented?

Options:

A.  

probe-based

B.  

location patterning

C.  

data packet-based

D.  

angulation

Discussion 0
Questions 36

What is the maximum time range that can be viewed on the Cisco DNA Center issues and alarms page?

Options:

A.  

3 hours

B.  

24 hours

C.  

3 days

D.  

7 days

Discussion 0
Questions 37

Which CLI command do you use to shut down the 2.4 GHz radio of the Floor1_AP1 AP on a Cisco 3850 Switch?

Options:

A.  

ap name Floor1_AP1 dot11 shutdown 24ghz

B.  

ap name Floor1_AP1 dot11 5ghz shutdown

C.  

ap name Floor1 AP1 dot11 24ghz shutdown

D.  

ap name Floor1_AP1 shutdown dot11 24ghz

Discussion 0
Questions 38

A customer managing a large network has implemented location services. Due to heavy load, it is needed to load balance the data coming through NMSP from the WLCs. Load must be spread between multiple CMX servers to help optimize the data flow for APs. Which configuration in CMX meets this requirement?

Options:

A.  

cmxctl config feature flags nmsplb.cmx-ap-grouping true

B.  

cmxctl config feature flags nmsplb.cmxgrouping true

C.  

cmxctl config feature flags nmsplb.cmx-loadbalance true

D.  

cmxctl config feature flags nmsplb.cmx-rssi-distribute true

Discussion 0
Questions 39

A network is set up to support wired and wireless clients. Both types must authenticate using 802.1X before connecting to the network. Different types of client authentication must be separated on a Cisco ISE deployment. Which two configuration items achieve this task? (Choose two.)

Options:

A.  

device profiles

B.  

policy sets

C.  

separate networks

D.  

policy groups

E.  

policy results

Discussion 0
Questions 40

The marketing department creates a promotion video for the branch store. Only interested hosts must receive the video over wireless multicast. What allows this feature?

Options:

A.  

TPC

B.  

DCA

C.  

WMM

D.  

WMF

Discussion 0
Questions 41

A customer has a distributed wireless deployment model where the WLCs are located in the data centers. Because the file servers are located in the data center, the traffic from the corporate WLAN “Corp-401266017” must go through the controllers, where the guest WLAN “Guest-19283746” traffic must use the local Internet line installed in each office. Which configuration will accomplish this task?

Options:

A.  

Disable Local Switching for the corporate and guest WLAN.

B.  

Disable Local Switching for the corporate WLAN and enable it for the guest WLAN.

C.  

Enable Local Switching for the corporate and guest WLAN.

D.  

Enable Local Switching for the corporate WLAN and disable it for the guest WLAN.

Discussion 0
Questions 42

CMX Facebook Wi-Fi allows access to the network before authentication. Which two elements are available? (Choose two.)

Options:

A.  

Allow HTTP traffic only before authentication and block all the traffic.

B.  

Allow all the traffic before authentication and intercept HTTPS only.

C.  

Allow HTTPs traffic only before authentication and block all other traffic.

D.  

Allow all the traffic before authentication and intercept HTTP only.

E.  

Allow SNMP traffic only before authentication and block all the traffic.

Discussion 0
Questions 43

A customer wants to allow employees to easily onboard their personal devices to the wireless network. The visitors also must be able to connect to the same network without the need to engage with anyone from the reception desk. Which process must be configured on Cisco ISE to support this requirement?

Options:

A.  

MAC authentication bypass

B.  

native supplicant provisioning

C.  

local web auth

D.  

self-registration guest portal

Discussion 0
Questions 44

A network is set up to support wired and wireless clients. Both types must authenticate using 802.1X before connecting to the network. Different types of client authentication must be separated on a Cisco ISE deployment. Which two configuration items achieve this task? (Choose two.)

Options:

A.  

device profiles

B.  

policy sets

C.  

separate networks

D.  

policy groups

E.  

policy results

Discussion 0
Questions 45

An engineer is deploying a virtual MSE. The network has 3000 APs and needs 7000 IPS licenses.

To which size server does the engineer scale it?

Options:

A.  

virtual

B.  

standard

C.  

high end

D.  

low end

Discussion 0
Questions 46

A network engineer created a new wireless network that will be used for guest access. The corporate network must utilize all rates. The guest network must use only lower rates instead of 802.11n data rates. To what must the WMM policy of the WLAN be set to accomplish this task?

Options:

A.  

required

B.  

allowed

C.  

disabled

D.  

mandatory

Discussion 0
Questions 47

Refer to the exhibit.

An engineer configured a BYOD policy that allows for printing on the WLAN using Bonjour services. However, the engineer cannot get printing to work. The WLC firmware is 8.x. What must be implemented on the controller?

Options:

A.  

Enable mDNS and IGMP snooping.

B.  

Activate location-specific services.

C.  

Configure Secure Web Mode Cipher-Option SSLv2.

D.  

Increase the IGMP Query Interval value

Discussion 0
Questions 48

Refer to the exhibit.

An engineer tries to manage the rogues on the Cisco WLC. Based on the configuration, which AP is marked as malicious by the controller?

Options:

A.  

rogue AP with SSID admin seen for 4000 seconds and heard at -70dBm

B.  

rogue AP with SSID admin seen for 3000 seconds and heard at -60dBm

C.  

rogue AP with SSID admin seen for 4000 seconds and heard at -60dBm

D.  

rogue AP with SSID admin seen for 3000 seconds and heard at -70dBm

Discussion 0
Questions 49

Refer to the exhibit.

Which area indicates the greatest impact on the wireless network when viewing the Cisco CleanAir Zone of Impact map of interferers?

Options:

A.  

A

B.  

B

C.  

C

D.  

D

Discussion 0
Questions 50

A customer requires wireless traffic from the branch to be routed through the firewall at corporate headquarters. A RADIUS server is in each branch location. Which Cisco FlexConnect configuration must be used?

Options:

A.  

central authentication and local switching

B.  

central authentication and central switching

C.  

local authentication and local switching

D.  

local authentication and central switching

Discussion 0
Questions 51

An engineer wants to configure WebEx to adjust the precedence and override the QoS profile on the WLAN. Which configuration is needed to complete this task?

Options:

A.  

Change the WLAN reserved bandwidth for WebEx

B.  

Create an AVC profile for WebEx

C.  

Create an ACL for WebEx

D.  

Change the AVC application WebEx-app-sharing to mark

Discussion 0
Questions 52

An engineer must run a Client Traffic Stream Metrics report in Cisco Prime Infrastructure. Which task must be run before the report?

Options:

A.  

scheduled report

B.  

radio performance

C.  

client status

D.  

software

Discussion 0
Questions 53

A network engineer is implementing BYOD on a wireless network. Based on the customer requirements, a dual SSID approach must be taken. Which two advanced WLAN configurations must be performed? (Choose two.)

Options:

A.  

Set NAC State to Radius NAC.

B.  

Set Allow AAA Override to Enabled.

C.  

Set DHCP Addr. Assignment to Required.

D.  

Select DHCP Profiling.

E.  

Select Enable Session Timeout.

Discussion 0
Questions 54

An engineer configures the wireless LAN controller to perform 802.1x user authentication. Which configuration must be enabled to ensure that client devices can connect to the wireless, even when WLC cannot communicate with the RADIUS?

Options:

A.  

pre-authentication

B.  

local EAP

C.  

authentication caching

D.  

Cisco Centralized Key Management

Discussion 0
Questions 55

Refer to the exhibit.

An engineer must provide a position of rogue APs on a floor map using Cisco PI 3.0, but no rogue AP options are showing on the left-hand navigation menu under Maps. What is the reason for this omission?

Options:

A.  

An assurance license is not installed.

B.  

The controller operational status background task is disabled.

C.  

The Show Detected Interferers feature under the AP option is disabled.

D.  

Cisco MSE has not been added to Cisco PI.

Discussion 0
Questions 56

A customer wants the APs in the CEO’s office to have different usernames and passwords for administrative support than the other APs deployed throughout the facility. Which feature must be enabled on the WLC and APs to achieve this goal?

Options:

A.  

local management users

B.  

HTTPS access

C.  

802.1X supplicant credentials

D.  

override global credentials

Discussion 0
Questions 57

An engineer must implement intrusion protection on the WLAN. The AP coverage is adequate and on-channel attacks are the primary concern. The building is historic, which makes adding APs difficult. Which AP mode and submode must be implemented?

Options:

A.  

AP mode: local, AP submode: none

B.  

AP mode: monitor, AP submode: WIPS

C.  

AP mode: monitor, AP submode: none

D.  

AP mode: local, AP submode: WIPS

Discussion 0
Questions 58

An engineer is planning an image upgrade of the WLC, and hundreds of APs are spread across remote sites with limited WAN bandwidth. The engineer must minimize the WAN utilization for this upgrade. Which approach must be used for the AP image upgrade?

Options:

A.  

Predownload the new code to the APs.

B.  

Use the Smart AP image upgrade feature.

C.  

Allow the APs to download their code after WLC reboot.

D.  

Execute parallel TFTP code upgrade on the APs via SSH.

Discussion 0
Questions 59

Refer to the exhibit.

The image shows a packet capture that was taken at the CLI of the Cisco CMX server. It shows UDP traffic from the WLC coming into the server. What does the capture prove?

Options:

A.  

The Cisco CMX server receives NetFlow data from the WLC.

B.  

The Cisco CMX server receives NMSP traffic from the WLC.

C.  

The Cisco CMX server receives SNMP traffic from the WL

C.  

D.  

The Cisco CMX server receives Angle-of-Arrival data from the WLC.

Discussion 0
Questions 60

An engineer added more APs to newly renovated areas in building. The engineer is now receiving Out-of-Sync alarms on Cisco Prime Infrastructure. Which two actions resolve this issue? (Choose two.)

Options:

A.  

Manually synchronize from Cisco Prime Infrastructure.

B.  

Manually synchronize from MSE.

C.  

Enable automatic synchronization on Cisco Prime Infrastructure.

D.  

Enable automatic synchronization on MSE.

E.  

Add new APs to maps on Cisco Prime Infrastructure.

Discussion 0
Questions 61

An IT team is growing quickly and needs a solution for management device access. The solution must authenticate users from an external repository instead of the current local on the WLC, and it must also identify the user and determine what level of access users should have. Which protocol do you recommend to achieve these goals?

Options:

A.  

network policy server

B.  

RADIUS

C.  

TACACS+

D.  

LDAP

Discussion 0
Questions 62

A network engineer wants to implement QoS across the network that supports multiple VLANs. All the APs are connected to switch ports and are configured in local mode. Which trust model must be configured on the switch ports to which the APs are connected?

Options:

A.  

CoS

B.  

WMM UP

C.  

DSCP

D.  

IPP

Discussion 0
Questions 63

An engineer is configuring multicast for wireless for an all-company video meeting on a network using EIGRP and BGP within a single domain from a single source. Which type of multicast routing should be implemented?

Options:

A.  

Protocol Independent Multicast Dense Mode

B.  

Source Specific Multicast

C.  

Multicast Source Discovery Protocol

D.  

Protocol Independent Multicast Sparse Mode

Discussion 0
Questions 64

A network engineer has been hired to perform a new MSE implementation on an existing network. The MSE must be installed in a different network than the Cisco WLC. Which configuration allows the devices to communicate over NMSP?

Options:

A.  

Allow UDP/16113 port on the central switch.

B.  

Allow TCP/16113 port on the firewall.

C.  

Allow UDP/16666 port on the VPN router.

D.  

Allow TCP/16666 port on the router.

Discussion 0
Questions 65

What must be configured on the Global Configuration page of the WLC for an AP to use 802.1x to authenticate to the wired infrastructure?

Options:

A.  

local access point credentials

B.  

RADIUS shared secret

C.  

TACACS server IP address

D.  

supplicant credentials

Discussion 0
Questions 66

Refer to the exhibit.

An engineer deployed a Cisco WLC using local EAP. Users who are configured for EAP-PEAP cannot connect to the network. Based on the local EAP debug on the controller provided, why is the client unable to connect?

Options:

A.  

The client is failing to accept certificate.

B.  

The Cisco WLC is configured for the incorrect date.

C.  

The Cisco WLC local EAP profile is misconfigured.

D.  

The user is using invalid credentials.

Discussion 0
Questions 67

A wireless network has been implemented to enable multicast video to be streamed reliably over the wireless link to the wireless users. After a client reports that the video is unable to stream, the administrator determines that the client is connecting at a data rate of 12 Mbps and is trying to stream to a valid multicast address on the network. Which two actions must be applied? (Choose two.)

Options:

A.  

Turn off IGMP snooping for all the configured WLANs on the controller.

B.  

Implement video-stream for the multicast video on the controller.

C.  

Allow multicast-direct to work correctly and multicast-direct to be enabled globally.

D.  

Change the WLAN QoS value to Bronze for the WLAN that multicast will be enabled.

E.  

Allow RTSP to stream the video due to wireless multicast not using acknowledgements.

Discussion 0
Questions 68

What is an important consideration when implementing a dual SSID design for BYOD?

Options:

A.  

After using the provisioning SSID, an ACL that used to make the client switch SSIDs forces the user to associate and traverse the network by MAC filtering.

B.  

If multiple WLCs are used, the WLAN IDs must be exact for the clients to be provisioned and traverse the network correctly.

C.  

SSIDs for this setup must be configured with NAC State-RADIUS NAC for the clients to authenticate with Cisco ISE, or with NAC State-ISE NAC for Cisco ISE to associate the client.

D.  

One SSID is for provisioning and the other SSID is for gaining access to the network. The use of an ACL should not be enforced to make the client connect to the REAL SSID after provisioning.

Discussion 0
Questions 69

Refer to the exhibit.

An engineer configured a BYOD policy that allows for printing on the WLAN using Bonjour services. However, the engineer cannot get printing to work. The WLC firmware is 8.x. What must be implemented on the controller?

Options:

A.  

Enable mDNS and IGMP snooping.

B.  

Activate location-specific services.

C.  

Configure Secure Web Mode Cipher-Option SSLv2.

D.  

Increase the IGMP Query Interval value

Discussion 0
Questions 70

After installing and configuring Cisco CMX, an administrator must change the NTP server on the Cisco CMX server. Which action accomplishes this task?

Options:

A.  

Manually edit /etc/ntp.conf using an XML editor before restarting the server by using service restart all services.

B.  

Log in to the Cisco CMX CLI and issue set ntp server NTP_IP where NTP_IP is the IP of the NTP server.

C.  

Manually edit /etc/ntp.conf as the admin user before restarting ntpd by using service ntpd restart.

D.  

Log in to the Cisco CMX GUI as the administrator and type the IP address of the NTP server in System tab > Settings> TimeZone/NTP.

Discussion 0
Questions 71

Which command set configures a Cisco Catalyst 9800 Series Wireless Controller so that the client traffic enters the network at the AP switch port?

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

Discussion 0
Questions 72

A network engineer is implementing BYOD on a wireless network. Based on the customer requirements, a dual SSID approach must be taken. Which two advanced WLAN configurations must be performed? (Choose two.)

Options:

A.  

Set NAC State to Radius NAC.

B.  

Set Allow AAA Override to Enabled.

C.  

Set DHCP Addr. Assignment to Required.

D.  

Select DHCP Profiling.

E.  

Select Enable Session Timeout.

Discussion 0
Questions 73

What is characteristic of Multicast mode that affects the wireless network when configured on a Cisco WLC?

Options:

A.  

Packet replication is performed on the controller

B.  

The controller sends every multicast packet associated APs

C.  

Packet replication is performed on the network

D.  

The controller sends multicast packets to a user group.

Discussion 0
Questions 74

Refer to the exhibit.

An engineer tries to manage the rogues on the Cisco WLC. Based on the configuration, which AP is marked as malicious by the controller?

Options:

A.  

rogue AP with SSID admin seen for 4000 seconds and heard at -70dBm

B.  

rogue AP with SSID admin seen for 3000 seconds and heard at -60dBm

C.  

rogue AP with SSID admin seen for 4000 seconds and heard at -60dBm

D.  

rogue AP with SSID admin seen for 3000 seconds and heard at -70dBm

Discussion 0
Questions 75

An engineer needs to configure an autonomous AP for 802.1x authentication. To achieve the highest security an authentication server is used for user authentication. During testing, the AP fails to pass the user authentication request to the authentication server. Which two details need to be configured on the AP to allow communication between the server and the AP? (Choose two.)

Options:

A.  

username and password

B.  

PAC encryption key

C.  

RADIUS IP address

D.  

shared secret

E.  

group name

Discussion 0
Questions 76

An engineer is using Cisco Prime Infrastructure reporting to monitor the state of security on the WLAN. Which output is produced when the Adaptive wIPS Top 10 AP report is run?

Options:

A.  

last 10 wIPS events from monitor mode APs

B.  

last 10 wIPS events from sniffer mode APs

C.  

last of 10 sniffer mode APs with the most wIPS events

D.  

last of 10 monitor mode APs with the most wIPS events

Discussion 0
Questions 77

An engineer must implement a BYOD policy with these requirements:

Onboarding unknown machines

Easily scalable

Low overhead on the wireless network

Which method satisfies these requirements?

Options:

A.  

triple SSID

B.  

single SSID

C.  

open SSID

D.  

dual SSID

Discussion 0
Questions 78

A WLC must be configured to allow multiple mDNS profiles based on a user authentication profile configured in Cisco ISE. Which WLAN setting must be configured?

Options:

A.  

mDNS policy

B.  

mDNS Snooping

C.  

AAA Override

D.  

service advertisement

Discussion 0
Questions 79

A wireless engineer wants to schedule monthly security reports in Cisco Prime infrastructure. Drag and drop the report the from the left onto the expected results when the report is generated on the right.

Options:

Discussion 0
Questions 80

Which two restrictions are in place with regards to configuring mDNS? (Choose two.)

Options:

A.  

mDNS uses only UDP port 5436 as a destination port.

B.  

mDNS cannot use UDP port 5353 as the destination port.

C.  

mDNS is not supported on FlexConnect APs with a locally switched WLAN.

D.  

Controller software must be newer than 7.0.6+.

E.  

mDNS is not supported over IPv6.

Discussion 0
Questions 81

An engineer must create an account to log in to the CLI of an access point for troubleshooting. Which configuration on the WLC will accomplish this?

Options:

A.  

Allow New Telnet Sessions

B.  

ReadWrite User Access Mode

C.  

SNMP V3 User

D.  

Global Configuration Enable Password

Discussion 0
Questions 82

Where is Cisco Hyperlocation enabled on a Cisco Catalyst 9800 Series Wireless Controller web interface?

Options:

A.  

Policy Profile

B.  

AP Join Profile

C.  

Flex Profile

D.  

RF Profile

Discussion 0
Questions 83

Refer to the exhibit.

An engineer has deployed the Cisco CMX solution to track and detect the number of users who visit the office each day. The CMX dashboard is not showing any data. Which action resolves this issue?

Options:

A.  

Configure Single Sign-On authentication.

B.  

Add the WLCs to CMX.

C.  

Copy the exported Maps from CMX server to PI using SCP.

D.  

Install an evaluation license to CMX server.

Discussion 0