Labour Day Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

A company has a single WLAN configured for 802.1x authentication with the QoS set to Silver. This WLAN supports all corporate and BYOD access. A decision has been made to allow users to install Cisco Jabber on their personal mobile devices. Users report poor voice quality when using Jabber. QoS is being applied only as best effort. What must be configured to ensure that the WLAN remains on the Silver class and to ensure Platinum class for Jabber?

A.

Configure QoS on the mobile devices that have Jabber installed.

B.

Enable Cisco Centralized Key Management on the WLAN so that the Jabber-enabled devices will connect.

C.

Configure the WLAN to broadcast on 5 GHz radios only and allow Jabber users to connect.

D.

Configure an AVC profile for the Jabber traffic and apply it to the WLAN.

Full Access
Question # 5

A network engineer created a new wireless network that will be used for guest access. The corporate network must utilize all rates. The guest network must use only lower rates instead of 802.11n data rates. To what must the WMM policy of the WLAN be set to accomplish this task?

A.

required

B.

allowed

C.

disabled

D.

mandatory

Full Access
Question # 6

An engineer set up identity-based networking with ISE and configured AAA override on the WLAN. Which two attributes must be used to change the client behavior from the default settings? (Choose two.)

A.

DHCP timeout

B.

DNS server

C.

IPv6 ACL

D.

DSCP value

E.

multicast address

Full Access
Question # 7

An engineer needs to configure an autonomous AP for 802.1x authentication. To achieve the highest security an authentication server is used for user authentication. During testing, the AP fails to pass the user authentication request to the authentication server. Which two details need to be configured on the AP to allow communication between the server and the AP? (Choose two.)

A.

username and password

B.

PAC encryption key

C.

RADIUS IP address

D.

shared secret

E.

group name

Full Access
Question # 8

A customer requires wireless traffic from the branch to be routed through the firewall at corporate headquarters. A RADIUS server is in each branch location. Which Cisco FlexConnect configuration must be used?

A.

central authentication and local switching

B.

central authentication and central switching

C.

local authentication and local switching

D.

local authentication and central switching

Full Access
Question # 9

An engineer must implement a BYOD policy with these requirements:

Onboarding unknown machines

Easily scalable

Low overhead on the wireless network

Which method satisfies these requirements?

A.

triple SSID

B.

single SSID

C.

open SSID

D.

dual SSID

Full Access
Question # 10

Which statement about the VideoStream/Multicast Direct feature is true?

A.

IP multicast traffic is reliable over WLAN by default as defined by the IEEE 802.11 wireless multicast delivery mechanism.

B.

Each VideoStream client acknowledges receiving a video IP multicast stream.

C.

It converts the unicast frame to a multicast frame over the air.

D.

It makes the delivery of the IP multicast stream less reliable over the air, but reliable over Ethernet.

Full Access
Question # 11

A customer managing a large network has implemented location services. Due to heavy load, it is needed to load balance the data coming through NMSP from the WLCs. Load must be spread between multiple CMX servers to help optimize the data flow for APs. Which configuration in CMX meets this requirement?

A.

cmxctl config feature flags nmsplb.cmx-ap-grouping true

B.

cmxctl config feature flags nmsplb.cmxgrouping true

C.

cmxctl config feature flags nmsplb.cmx-loadbalance true

D.

cmxctl config feature flags nmsplb.cmx-rssi-distribute true

Full Access
Question # 12

An engineer must track guest traffic flow using the WLAN infrastructure. Which Cisco CMX feature must be configured and used to accomplish this tracking?

A.

analytics

B.

connect and engage

C.

presence

D.

detect and locate

Full Access
Question # 13

Refer to the exhibit.

An engineer is creating an ACL to restrict some traffic to the WLC CPU. Which selection must be made from the direction drop- down list?

A.

It must be Inbound because traffic goes to the WLC.

B.

Packet direction has no significance; it is always Any.

C.

It must be Outbound because it is traffic that is generated from the WLC.

D.

To have the complete list of options, the CPU ACL must be created only by the CLI.

Full Access
Question # 14

A wireless engineer deployed all remote sites as FlexConnect. The client VLAN assignment on these sites is configured manually mapped by WLAN and using local switching. Dynamic VLAN assignment is provided by the newly deployed Cisco ISE. Which IETF attribute must be configured on the AAA server to send that VLAN ID?

A.

Tunnel-Medium-Type

B.

Tunnel-Client-Endpoint

C.

Tunnel-Assignment-ID

D.

Tunnel-Private-Group-ID

Full Access
Question # 15

A wireless engineer has performed a Wireshark ccapture on an 802.1x authentication process to troubleshoot a connectivity issue.

Which two types of packet does the EAP contain? (Choose two.)

A.

EAP complete

B.

EAP response

C.

EAP failure

D.

EAP request

E.

EAP reply

Full Access
Question # 16

A wireless administrator receives this information to complete a CMX deployment in high availability by using version 10.6 to gather analytics.

IP address of the primary server

IP address of the secondary server

failover mode to be configured as automatic

root password of the secondary server

email ID for NOC notifications

Enabling high availability fails when these parameters are used. Which action resolves the issue?

A.

Insert the cmxadmin password of the secondary server.

B.

Use IP protocol 4242 for the controller to reach the CMX server.

C.

Place primary and secondary servers in different subnets.

D.

Enable the virtual IP address of the primary server.

Full Access
Question # 17

What are two considerations when deploying a Cisco Hyperlocation? (Choose two.)

A.

NTP configuration is available, but not recommended.

B.

The Cisco Hyperlocation feature must be enabled only on the wireless LAN controller.

C.

After enabling Cisco Hyperlocation on Cisco CMX, the APs and the wireless LAN controller must be restarted.

D.

The Cisco Hyperlocation feature must be enabled on the wireless LAN controller and Cisco CMX.

E.

If the Cisco CMX server is a VM, a high-end VM is needed for Cisco Hyperlocation deployments.

Full Access
Question # 18

Refer to the exhibit.

An engineer implemented the CPU ACL on your Cisco 5520 Series Wireless LAN Controller, and the controller is no longer manageable via the network. What must be changes on this CPU ACL to enable it to manage the controller again?

A.

Permit statements must be added to the top of the ACL in both directions, which specify the network to be managed from and the virtual interface of the controller.

B.

Line 1 must be set to a destination port of HTTP.

C.

Permit statements must be added to the top of the ACL, which specify the network to be managed from.

D.

Line 1 must be set to the inbound direction.

Full Access
Question # 19

Refer to the exhibit.

An engineer tries to manage the rogues on the Cisco WLC. Based on the configuration, which AP is marked as malicious by the controller?

A.

rogue AP with SSID admin seen for 4000 seconds and heard at -70dBm

B.

rogue AP with SSID admin seen for 3000 seconds and heard at -60dBm

C.

rogue AP with SSID admin seen for 4000 seconds and heard at -60dBm

D.

rogue AP with SSID admin seen for 3000 seconds and heard at -70dBm

Full Access
Question # 20

An engineer is assembling a PCI report for compliance purposes and must include missed best practices that are related to WLAN controllers. The engineer has access to all WLCs, Cisco MSE, and Cisco Prime Infrastructure. Which method most efficiently displays a summary of inconsistencies?

A.

WLC running-config

B.

Cisco Prime Infrastructure monitoring

C.

Cisco Prime Infrastructure reporting

D.

WLC logs

Full Access
Question # 21

An engineer has implemented 802.1x authentication on the wireless network utilizing the internal database of a RADIUS server. Some clients reported that they are unable to connect. After troubleshooting, it is found that PEAP authentication is failing. A debug showed the server is sending an Access- Reject message. Which action must be taken to resolve authentication?

A.

Use the user password that is configured on the server.

B.

Disable the server certificate to be validated on the client.

C.

Update the client certificate to match the user account.

D.

Replace the client certificates from the CA with the server certificate.

Full Access
Question # 22

An engineer must perform a Layer 2 survey for a mining facility. Which type of antenna does the

engineer use in the mine shaft?

A.

dipole

B.

omnidirectional

C.

patch

D.

internal

Full Access
Question # 23

What must be configured on the Global Configuration page of the WLC for an AP to use 802.1x to authenticate to the wired infrastructure?

A.

local access point credentials

B.

RADIUS shared secret

C.

TACACS server IP address

D.

supplicant credentials

Full Access
Question # 24

You are configuring the social login for a guest network. Which three options are configurable social connectors in Cisco CMX Visitor Connect? (Chose three)

A.

Linkedn

B.

Pinterest

C.

Medium

D.

Google+

E.

Facebook

F.

Myspace

Full Access
Question # 25

What is the default NMSP echo interval between Cisco MSE and a Wireless LAN Controller?

A.

10 seconds

B.

15 seconds

C.

30 seconds

D.

60 seconds

Full Access
Question # 26

An engineer added more APs to newly renovated areas in building. The engineer is now receiving Out-of-Sync alarms on Cisco Prime Infrastructure. Which two actions resolve this issue? (Choose two.)

A.

Manually synchronize from Cisco Prime Infrastructure.

B.

Manually synchronize from MSE.

C.

Enable automatic synchronization on Cisco Prime Infrastructure.

D.

Enable automatic synchronization on MSE.

E.

Add new APs to maps on Cisco Prime Infrastructure.

Full Access
Question # 27

An engineer must configure MSE to provide guests access using social media authentication. Which service does the engineer configure so that guests use Facebook credentials to authenticate?

A.

Social Connect

B.

Client Connect

C.

Visitor Connect

D.

Guest Connect

Full Access
Question # 28

An enterprise has two WLANs configured on WLC. It is reported that when converting APs to FlexConnect mode, WLAN A works but WLAN B does not. When converting APs to local mode, WLAN B works, but WLAN A does not. Which action is needed to complete this configuration?

A.

Create a Cisco FlexConnect group with WLAN-VLAN mapping.

B.

Disable local switching on the WLANs.

C.

Map the AP group to the WLAN interface.

D.

Join the APs to a Cisco FlexConnect group.

Full Access
Question # 29

A company is deploying wireless PCs on forklifts within its new 10,000-square-foot(3048-square-rneter) facility.

The clients are configured for PEAP-MS-CHAPv2 with WPA TKIP. Users report that applications frequently drop when the clients roam between access points on the floor. A professional site survey was completed.

Which configuration change is recommended to improve the speed of client roaming?

A.

EAP-FAST

B.

EAP-TLS

C.

WPAAES

D.

WPA2AES

Full Access
Question # 30

A network engineer is deploying 8865 IP phones with wireless clients connected to them. In order to apply the appropriate QoS, the IP voice traffic needs to be distinguished from client data traffic. Which switch configuration feature must be enabled?

A.

Voice VLAN

B.

QBSS

C.

WME

D.

QoS routing

Full Access
Question # 31

Refer to the exhibit.

An engineer needs to manage non-802.11 interference. What is observed in the output on PI?

A.

At least one strong interferer is impacting connectivity at this site.

B.

Several light interferers are collectively impacting connectivity at this site.

C.

The three individual clusters shown indicate poor AP placement.

D.

RF at this site is unable to provide adequate wireless performance.

Full Access
Question # 32

An engineer is considering an MDM integration with Cisco ISE to assist with security for lost devices.

Which two functions of MDM increase security for lost devices that access data from the network? (Choose two.)

A.

PIN enforcement

B.

Jailbreak/root detection

C.

data wipe

D.

data encryption

E.

data loss prevention

Full Access