A) controller IGMP snooping
B) multicast AP multicast mode
C) broadcast forwarding
D) unicast AP multicast mode
Correct Answer
verified
Multiple Choice
A) SOAP/XML
B) NMSP
C) CAPWAP
D) SNMP
Correct Answer
verified
Multiple Choice
A) Configure a second WLC to support half of the APs in the deployment.
B) Configure one single SSID and implement Cisco ISE for VLAN assignment according to different user roles.
C) Configure different AP groups to support different VLANs, so that all of the WLANs can be broadcast on both radios.
D) Configure 16 WLANs to be broadcast on the 2.4-GHz band and 16 WLANs to be broadcast on the 5.0-GHz band.
Correct Answer
verified
Multiple Choice
A) wireless traffic only
B) wired traffic only
C) VPN traffic
D) wireless and wired traffic
Correct Answer
verified
Multiple Choice
A) received signal strength
B) triangulation
C) time distance of arrival
D) angle of incidence
Correct Answer
verified
Multiple Choice
A) ?ll ports participate in the LAG by default when LAG is enabled on the controller. y
B) Dynamic interfaces and management are moved to port 1
C) Primary and secondary ports are needed for each interface.
D) Multiple untagged interfaces to the same port are not allowed.
E) EtherChannel must be configured for mode "on" on the switch.
F) Only one functional physical port is needed to continue to pass traffic.
G) Multiple LAGs are permitted on the controller.
H) The WLC does not need to be rebooted to enable the LAG configuration.
Correct Answer
verified
Multiple Choice
A) The Cisco CMX server receives NetFlow data from the WLC.
B) The Cisco CMX server receives NMSP traffic from the WLC.
C) The Cisco CMX server receives SNMP traffic from the WLC.
D) The Cisco CMX server receives Angle-of-Arrival data from the WLC.
Correct Answer
verified
Multiple Choice
A) remote LAN ACL
B) AAA override
C) client load balancing
D) remote LAN
Correct Answer
verified
Multiple Choice
A) permit-ACL
B) WMM required
C) mark
D) rate-limit
Correct Answer
verified
Multiple Choice
A) Voice VLAN
B) QBSS
C) WME
D) QoS routing
Correct Answer
verified
Multiple Choice
A) network analyzers
B) malware
C) lost and stolen devices
D) keyloggers
E) unauthorized users
Correct Answer
verified
Multiple Choice
A) Allow all the traffic before authentication and intercept HTTPs only.
B) Allow HTTP traffic only before authentication and block all the traffic.
C) Allow SNMP traffic only before authentication and block all the traffic.
D) Allow all the traffic before authentication and intercept HTTP only.
E) Allow HTTPs traffic only before authentication and block all other traffic.
Correct Answer
verified
Multiple Choice
A) mobility group name, version of controller code, Control and Provisioning of Wireless Access Points mode, ACLs, and WLANs (SSIDs)
B) mobility domain name, version of controller code, and Control and Provisioning of Wireless Access Points mode
C) mobility domain name, version of controller code, Control and Provisioning of Wireless Access Points mode, ACLs, and WLANs (SSIDs)
D) mobility group name, version of controller code, and Control and Provisioning of Wireless Access Points mode
Correct Answer
verified
Multiple Choice
A) Allow UDP/16113 port on the central switch.
B) Allow TCP/16113 port on the firewall.
C) Allow UDP/16666 port on the VPN router.
D) Allow TCP/16666 port on the router.
Correct Answer
verified
Multiple Choice
A) Synchronize access points with the MSE.
B) Add the MSE to Cisco Prime Infrastructure using the CLI credentials.
C) Add the MSE to Cisco Prime Infrastructure using the Cisco Prime Infrastructure communication credentials configured during set up.
D) Apply a valid license for Wireless Intrusion Prevention System.
E) Apply a valid license for location tracking.
Correct Answer
verified
Multiple Choice
A) per-branch local controllers
B) anchor controllers
C) FlexConnect controllers
D) autonomous access points
Correct Answer
verified
Multiple Choice
A) Allow connectivity from the wireless controller to the IP of the RADIUS server.
B) Provide a valid client username that has been configured on the RADIUS server.
C) Configure the shared-secret keys on the controller and the RADIUS server.
D) Authenticate the client using the same EAP type that has been set up on the RADIUS server.
Correct Answer
verified
Multiple Choice
A) The client context is deleted in controller WLC_1, and a new client context is created in WLC_2 to become the anchor controller.
B) The client context is moved from controller WLC_1 to controller WLC_2. The result is that the WLC_1 client context is deleted and WLC_2 becomes the anchor controller.
C) The client context is copied from controller WLC_1 to controller WLC_2. The result is that WLC_1 becomes the foreign controller and WLC_2 becomes the anchor controller.
D) The client context is copied from controller WLC_1 to controller WLC_2. The result is that WLC_1 becomes the anchor controller and WLC_2 becomes the foreign controller.
Correct Answer
verified
Multiple Choice
A) A complete characterization of the external WLAN environment.
B) The exact number of users the WLAN will support.
C) Soft copies of configuration for switches, routers, controllers, and location appliances.
D) A detailed description of the WLAN environment during the post-installation testing, for example, number of people present, furniture, no furniture, and sources of interference present.
Correct Answer
verified
Multiple Choice
A) learn client IP address
B) FlexConnect local authentication
C) VLAN-based central switching
D) central DHCP processing
Correct Answer
verified
Showing 21 - 40 of 101
Related Exams