web analytics

What WLAN Layer 2 security must be selected to use client MFP?

An engineer is configuring client MFP. What WLAN Layer 2 security must be selected to use client MFP? A. Static WEP B. CKIP C. WPA + WPA2 D. 802.1x Correct

Which two events are possible outcomes of a successful RF jamming attack?

Which two events are possible outcomes of a successful RF jamming attack? (Choose two.) A. unauthentication association B. deauthentication multicast C. deauthentication broadcast D. disruption of WLAN services E. physical

Which CLI command do you use on Cisco IOS XE Software to put the AP named Floor1_AP1 back in the default AP group?

Which CLI command do you use on Cisco IOS XE Software to put the AP named Floor1_AP1 back in the default AP group? A. ap Floor1_AP1 ap-groupname default-group B. ap

Which two conditions must be met to be able to enter this command?

An engineer is configuring a new mobility anchor for a WLAN on the CLI with the config wlan mobility anchor add 3 10.10.10.10 command, but the command is failing. Which

Which authentication method must be configured on the client to support this deployment?

A customer has deployed PEAP authentication with a Novell eDirectory LDAP Server. Which authentication method must be configured on the client to support this deployment? A. PEAP(EAP-MSCHAPv2) B. PEAP((EAP-TTLS) C.

Which three features on the wireless controller can be configured to maintain network operations if this situation reoccurs?

Access points at branch sites for a company are in FlexConnect mode and perform local switching, but they authenticate to the central RADIUS at headquarters. VPN connections to the headquarters

Which security method does a Cisco guest wireless deployment that relies on Cisco ISE guest portal for user authentication use?

Which security method does a Cisco guest wireless deployment that relies on Cisco ISE guest portal for user authentication use? A. Layer 2 and Layer 3 B. Layer 2 only

Which two options are types of MFP that can be performed?

Which two options are types of MFP that can be performed? (Choose two.) A. message integrity check B. infrastructure C. client D. AES-CCMP E. RSN Correct Answer: BC

Which three items must be verified for EAP-TLS authentication?

An engineer has determined that the source of an authentication issue is the client laptop. Which three items must be verified for EAP-TLS authentication? (Choose three.) A. The client certificate

Which security option should be configured?

An engineer requires authentication for WPA2 that will use fast rekeying to enable clients to roam from one access point to another without going through the controller. Which security option

Which Cisco feature must an engineer configure on a Cisco WLC to enable PCI specification compliance for communication of neighbor radio information?

Which Cisco feature must an engineer configure on a Cisco WLC to enable PCI specification compliance for communication of neighbor radio information? A. RF Grouping B. MFP C. Rogue Access

What is the cause of this issue?

MFP is enabled globally on a WLAN with default settings on a single controller wireless network. Older client devices are disconnected from the network during a deauthentication attack. What is

Which component uses E?? and 802.1x to pass user authentication to the authenticator?

An engineer must enable EAP on a new WLAN and is ensuing that the necessary components are available. Which component uses E?? and 802.1x to pass user authentication to the

Which three configuration steps are necessary on the WLC when implementing central web authentication in conjunction with Cisco ISE.

Which three configuration steps are necessary on the WLC when implementing central web authentication in conjunction with Cisco ISE. (Choose three.) A. Set P2P Blocking Action to Drop. B. Enable

Which option describes the purpose of configuring switch peer groups?

Which option describes the purpose of configuring switch peer groups? A. enforces RF profiles B. enables location services C. restricts roaming traffic to certain switches D. allows template based configuration

Which of the following user roles can access CMX Visitor Connect?

Which of the following user roles can access CMX Visitor Connect? A. Administrator B. Power User C. Guest User D. Super Administrator Correct Answer: A

Which two ports does the RADIUS server maintain a database and listen for incoming authentication and accounting requests?

On which two ports does the RADIUS server maintain a database and listen for incoming authentication and accounting requests? (Choose two.) A. UDP 1900 B. UDP port 1812 C. TCP

Which command is an SNMPv3-specific command that an engineer can use only in Cisco IOS XE?

Which command is an SNMPv3-specific command that an engineer can use only in Cisco IOS XE? A. snmp-server user remoteuser1 group1 remote 10.12.8.4 B. snmp-server host 172.16.1.33 public C. snmp-server

Which report provides the required data?

An engineer must provide a graphical trending report of the total number of wireless clients on the network. Which report provides the required data? A. Client Summary B. Posture Status

When a wireless client uses WPA2 AES, which keys are created at the end of the four-way handshake process between the client and the access point?

When a wireless client uses WPA2 AES, which keys are created at the end of the four-way handshake process between the client and the access point? A. AES key, TKIP

Which customizable security report on Cisco Prime Infrastructure would show rogue APs detected since a point in time?

Which customizable security report on Cisco Prime Infrastructure would show rogue APs detected since a point in time? A. New Rogue APs B. Rogue AP Events C. Rogue APs D.

Which type of channel should you conduct spectrum analysis to identify if radar is impacting the wireless network?

A customer is concerned that radar is impacting the access points that service the wireless network in an office located near an airport. On which type of channel should you

Which option must be enabled to ensure that client devices can connect to the wireless, even when WLC cannot communicate with the RADIUS?

An engineer configures the wireless LAN controller to perform 802.1x user authentication. Which option must be enabled to ensure that client devices can connect to the wireless, even when WLC

What is the maximum number of clients that a small branch deployment using a four-member Cisco Catalyst 3850 stack (acting as MC/MA) can support?

What is the maximum number of clients that a small branch deployment using a four-member Cisco Catalyst 3850 stack (acting as MC/MA) can support? A. 10000 B. 1000 C. 500

Which three risks should the security director be concerned about?

A corporation has recently implemented a BYOD policy at their HQ. Which three risks should the security director be concerned about? (Choose three.) A. unauthorized users B. rogue ad-hocs C.

Which three options are valid client profile probes in Cisco ISE?

Which three options are valid client profile probes in Cisco ISE? (Choose three.) A. DHCP B. 802.1X C. CCX D. NetFlow E. TACACS F. HTTP Correct Answer: ADF

Which feature can be enabled to help alleviate these concerns and mitigate DOS attacks on a WLAN?

A customer is concerned about DOS attacks from a neighboring facility. Which feature can be enabled to help alleviate these concerns and mitigate DOS attacks on a WLAN? A. PMF