Pre-Summer Sale Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ex2p65

Exact2Pass Menu

Question # 4

A corporation has employees working from their homes. A wireless engineer must connect 1810 OEAP at remote teleworker locations. All configuration has been completed on the controller side, but the network readiness is pending. Which two configurations must be performed on the firewall to allow the AP to join the controller? (Choose two.)

A.

Block UDP ports 1812 and 1813 on the firewall.

B.

Enable NAT Address on the 5520 with an Internet-routable IP address.

C.

Configure a static IP on the OEAP 1810.

D.

Allow UDP ports 5246 and UDP port 5247 on the firewall.

E.

Allow UDP ports 12222 and 12223 on the firewall.

Full Access
Question # 5

A network engineer is deploying 8865 IP phones with wireless clients connected to them. In order to apply the appropriate QoS, the IP voice traffic needs to be distinguished from client data traffic. Which switch configuration feature must be enabled?

A.

Voice VLAN

B.

QBSS

C.

WME

D.

QoS routing

Full Access
Question # 6

Refer to the exhibit.

The image shows a packet capture that was taken at the CLI of the Cisco CMX server. It shows UDP traffic from the WLC coming into the server. What does the capture prove?

A.

The Cisco CMX server receives NetFlow data from the WLC.

B.

The Cisco CMX server receives NMSP traffic from the WLC.

C.

The Cisco CMX server receives SNMP traffic from the WLC.

D.

The Cisco CMX server receives Angle-of-Arrival data from the WLC.

Full Access
Question # 7

An engineer has implemented advanced location services for a retail wireless deployment. The marketing department wants to collect user demographic information in exchange for guest WLAN access and to have a customized portal per location hosted by the provider. Which social connector must be tied into Cisco CMX to provide this service?

A.

Gmail

B.

Google+

C.

Facebook

D.

MySpace

Full Access
Question # 8

An engineer is responsible for a wireless network for an enterprise. The enterprise has distributed offices around the globe, and all APs are configured in FlexConnect mode. The network must be configured to support 802.11r and CCKM. What needs to be implemented to accomplish this goal?

A.

Enable VLAN-based central switching.

B.

Enable FlexConnect local authentication.

C.

Enable FlexConnect local switching.

D.

Create FlexConnect groups.

Full Access
Question # 9

An engineer must use Cisco AVC on a Cisco WLC to prioritize Cisco IP cameras that use the wireless network. Which element do you configure in a rule?

A.

permit-ACL

B.

WMM required

C.

mark

D.

rate-limit

Full Access
Question # 10

Which statement about the VideoStream/Multicast Direct feature is true?

A.

IP multicast traffic is reliable over WLAN by default as defined by the IEEE 802.11 wireless multicast delivery mechanism.

B.

Each VideoStream client acknowledges receiving a video IP multicast stream.

C.

It converts the unicast frame to a multicast frame over the air.

D.

It makes the delivery of the IP multicast stream less reliable over the air, but reliable over Ethernet.

Full Access
Question # 11

After looking in the logs, an engineer notices that RRM keeps changing the channels for non-IEEE 802.11 interferers. After surveying the area, it has been decided that RRM should not change the channel. Which feature must be enabled to ignore non-802.11 interference?

A.

Avoid Cisco AP Load

B.

Avoid Non-802.11 Noise

C.

Avoid Persistent Non-WiFi Interference

D.

Avoid Foreign AP Interference

Full Access
Question # 12

A multitenant building contains known wireless networks in most of the suites. Rogues must be classified in the WLC. How are the competing wireless APs classified?

A.

adhoc

B.

friendly

C.

malicious

D.

unclassified

Full Access
Question # 13

Which three properties are used for client profiling of wireless clients? (Choose three.)

A.

HTTP user agent

B.

DHCP

C.

MAC OUI

D.

hostname

E.

OS version

F.

IP address

Full Access
Question # 14

An IT administrator is managing a wireless network in which most devices are Apple iOS. A QoS issue must be addressed on the WLANs. Which configuration must be performed?

A.

Enable Fastlane globally under Wireless > Access Points > Global Configuration.

B.

Create a new AVC Profile named AUTOQOS-AVC-PROFILE and apply to all WLANs.

C.

Enable Fastlane under each WLAN setting.

D.

Enable WMM TSPEC/TCLAS negotiation under Wireless > Advanced.

Full Access
Question # 15

An engineer is setting up a WLAN to work with a Cisco ISE as the AAA server. The company policy requires that all users be denied access to any resources until they pass the validation. Which component must be configured to achieve this stipulation?

A.

WPA2 passkey

B.

AAA override

C.

CPU ACL

D.

preauthentication ACL

Full Access
Question # 16

An engineer must implement a CPU ACL that blocks web management traffic to the controller, but they also must allow guests to reach a Web Authentication Redirect page. To which IP address is guest client HTTPS traffic allowed for this to work?

A.

DNS server IP

B.

controller management IP

C.

virtual interface IP

D.

client interface IP

Full Access
Question # 17

The Cisco Hyperlocation detection threshold is currently set to -50 dBm. After reviewing the wireless user location, discrepancies have been noticed. To improve the Cisco Hyperlocation accuracy, an engineer attempts to change the detection threshold to -100 dBm. However, the Cisco Catalyst 9800 Series Wireless Controller does not allow this change to be applied. What actions should be taken to resolve this issue?

A.

Disable Cisco Hyperlocation, change the Cisco Hyperlocation detection threshold, and then enable it.

B.

Create a new profile on Cisco CMX with the new Cisco Hyperlocation detection range, and apply it on the WLAN.

C.

Place the APs to monitor mode, shutdown the radios, and then change the Cisco Hyperlocation detection threshold.

D.

Shutdown all radios on the controller, change the Cisco Hyperlocation detection range, and enable the radios again.

Full Access
Question # 18

The security policy mandates that only controller web management traffic is allowed from the IT subnet. In testing, an engineer is trying to connect to a WLAN with Web Authentication for guest users, but the page is timing out on the wireless client browser. What is the cause of the issue?

A.

The implemented CPU ACL on the controller is blocking HTTP/HTTPS traffic from the guest clients.

B.

Web Authentication Redirect is not supported with CPU ACLs.

C.

The DNS server that is configured on the controller is incorrect.

D.

Web Authentication Redirect is supported only with Internet Explorer, and the client is using Google Chrome.

Full Access
Question # 19

An engineer is setting up a WLAN to work with a Cisco ISE as the AAA server. The company policy requires that all users be denied access to any resources until they pass the validation. Which component must be configured to achieve this stipulation?

A.

WPA2 passkey

B.

AAA override

C.

CPU ACL

D.

preauthentication ACL

Full Access
Question # 20

A network administrator managing a Cisco Catalyst 9800 WLC must place all iOS-connected devices to the guest SSID on VLAN 101. The rest of the clients must connect on VLAN 102 to distribute load across subnets. To achieve this configuration, the administrator configures a local policy on the WLC. Which two configurations are required? (Choose two.)

A.

Assign a policy map under global security policy settings.

B.

Add local profiling policy under global security policy settings.

C.

Create a service template.

D.

Allow HTTP and DHCP profiling under policy map.

E.

Enable device classification on global wireless settings.

Full Access
Question # 21

Which two protocols are used to communicate between the Cisco MSE and the Cisco Prime Infrastructure network management software? (Choose two.)

A.

HTTPS

B.

Telnet

C.

SOAP

D.

SSH

E.

NMSP

Full Access
Question # 22

Which two configurations are applied on the WLC to enable multicast, check multicast stream subscriptions, and stream content only to subscribed clients? (Choose two)

A.

Enable IGMP snooping

B.

Set the IGMP timeout to 180 seconds

C.

Enable broadcast forwarding

D.

Enable 802.3x flow control mode.

E.

Set the AP multicast to 238.255.255.255

Full Access
Question # 23

Refer to the exhibit.

An engineer is troubleshooting a client connectivity issue. The client is in the RUN state, and no traffic is passed after authenticating by using Cisco ISE. Which action resolves the problem?

A.

Configure a different client VLAN after authentication.

B.

Disable the ACL that prevents traffic from being allowed.

C.

Apply a lower WMM QoS.

D.

Enable rate-limiting to the client.

Full Access
Question # 24

A hospital wants to offer indoor directions to patient rooms utilizing its existing wireless infrastructure. The wireless network has been using location services specifications. Which two components must be installed to support this requirement? (Choose two.)

A.

WIPS

B.

Cisco MSE

C.

Cisco CMX Visitor Connect

D.

Cisco CMX AppEngage

E.

Cisco CMX Analytics

Full Access
Question # 25

Which two statements about the requirements for a Cisco Hyperlocation deployment are true? (Choose two.)

A.

After enabling Cisco Hyperlocation on Cisco CMX, the APs and the wireless LAN controller must be restarted.

B.

NTP can be configured, but that is not recommended.

C.

The Cisco Hyperlocation feature must be enabled on the wireless LAN controller and Cisco CMX.

D.

The Cisco Hyperlocation feature must be enabled only on the wireless LAN controller.

E.

If the Cisco CMX server is a VM, a high-end VM is needed for Cisco Hyperlocation deployments.

Full Access
Question # 26

An engineer wants the wireless voice traffic class of service to be used to determine the queue order for packets received, and then have the differentiated services code point set to match when it is resent to another port on the switch. Which configuration is required in the network?

A.

Platinum QoS configured on the WLAN

B.

WMM set to required on the WLAN

C.

msl qos trust dscp configured on the controller switch port

D.

msl qos trust cos configured on the controller switch port

Full Access
Question # 27

An engineer must run a Client Traffic Stream Metrics report in Cisco Prime Infrastructure. Which task must be run before the report?

A.

scheduled report

B.

radio performance

C.

client status

D.

software

Full Access
Question # 28

An engineer is implementing Cisco Identity-Based Networking on a Cisco AireOS controller. The engineer has two ACLs on the controller. The first ACL, named BASE_ACL, is applied to the corporate_clients interface on the WLC, which is used for all corporate clients. The second ACL, named HR_ACL, is referenced by ISE in the Human Resources group policy. What is the resulting ACL when a Human Resources user connects?

A.

HR_ACL appended with BASE_ACL

B.

HR_ACL only

C.

BASE_ACL appended with HR_ACL

D.

BASE_ACL only

Full Access
Question # 29

A new MSE with wIPS service has been installed and no alarm information appears to be reaching the MSE from controllers. Which protocol must be allowed to reach the MSE from the controllers?

A.

SOAP/XML

B.

NMSP

C.

CAPWAP

D.

SNMP

Full Access
Question # 30

A wireless engineer must implement a corporate wireless network for a large company in the most efficient way possible. The wireless network must support 32 VLANs for 300 employees in different departments. Which solution must the engineer choose?

A.

Configure a second WLC to support half of the APs in the deployment.

B.

Configure one single SSID and implement Cisco ISE for VLAN assignment according to different user roles.

C.

Configure different AP groups to support different VLANs, so that all of the WLANs can be broadcast on both radios.

D.

Configure 16 WLANs to be broadcast on the 2.4-GHz band and 16 WLANs to be broadcast on the 5.0-GHz band.

Full Access
Question # 31

The CTO of an organization wants to ensure that all Android devices are placed into a separate VLAN on their wireless network. However, the CTO does not want to deploy ISE. Which feature must be implemented on the Cisco WLC?

A.

WLAN local policy

B.

RADIUS server overwrite interface

C.

AAA override

D.

custom AVC profile

Full Access
Question # 32

A network engineer is implementing BYOD on a wireless network. Based on the customer requirements, a dual SSID approach must be taken. Which two advanced WLAN configurations must be performed? (Choose two.)

A.

Set NAC State to Radius NAC.

B.

Set Allow AAA Override to Enabled.

C.

Set DHCP Addr. Assignment to Required.

D.

Select DHCP Profiling.

E.

Select Enable Session Timeout.

Full Access
Question # 33

An engineer needs to configure an autonomous AP for 802.1x authentication. To achieve the highest security an authentication server is used for user authentication. During testing, the AP fails to pass the user authentication request to the authentication server. Which two details need to be configured on the AP to allow communication between the server and the AP? (Choose two.)

A.

username and password

B.

PAC encryption key

C.

RADIUS IP address

D.

shared secret

E.

group name

Full Access
Question # 34

The network management team in a large shopping center has detected numerous rogue APs from local coffee shops that are broadcasting SSIDs. All of these SSIDs have names starting with ATC (for example, ATC302, ATC011, and ATC566). A wireless network engineer must appropriately classify these SSIDs using the Rogue Rules feature. Drag and drop the options from the left onto the categories in which they must be used on the right. Not all options are used.

Full Access
Question # 35

What is the Cisco recommended configuration for a Cisco switch port connected to an AP in local mode for optimal voice over WLAN performance with an 8821 wireless phone?

A.

switchport encapsulation dot1q

switchport mode trunk

mls qos trust device cisco-phone

B.

switchport mode access

mls qos trust device cisco-phone

C.

switchport mode access mls qos trust cos

D.

switchport mode access mls qos trust dscp

Full Access
Question # 36

After looking in the logs, an engineer notices that RRM keeps changing the channels for non-IEEE 802.11 interferers. After surveying the area, it has been decided that RRM should not change the channel. Which feature must be enabled to ignore non-802.11 interference?

A.

Avoid Cisco AP Load

B.

Avoid Non-802.11 Noise

C.

Avoid Persistent Non-WiFi Interference

D.

Avoid Foreign AP Interference

Full Access
Question # 37

A user is trying to connect to a wireless network that is configured for WPA2-Enterprise security using a corporate laptop. The CA certificate for the authentication server has been installed on the Trusted Root Certification Authorities store on the laptop. The user has been prompted to enter the credentials multiple times, but the authentication has not succeeded. What is causing the issue?

A.

There is an IEEE invalid 802.1X authentication policy on the authentication server.

B.

The user Active Directory account is locked out after several failed attempts.

C.

There is an invalid 802.1X authentication policy on the authenticator.

D.

The laptop has not received a valid IP address from the wireless controller.

Full Access
Question # 38

An engineer must implement a BYOD policy with these requirements:

Onboarding unknown machines

Easily scalable

Low overhead on the wireless network

Which method satisfies these requirements?

A.

triple SSID

B.

single SSID

C.

open SSID

D.

dual SSID

Full Access
Question # 39

An administrator receives reports of many interferers in the wireless network and wants to get the location of these interferers from the maps in Cisco Prime Infrastructure.

When looking at the floor plans/maps, the administrator does not see any interferers, but can see all wireless clients located successfully.

Which two statements define the cause of the issue? (Choose two.)

A.

MSE is not added to Cisco Prime infrastructure and synchronized.

B.

Interferer tracking is not enabled on the MSE.

C.

SNMP between Cisco Prime Infrastructure and the WLC is failing.

D.

Context Aware Service tracking limit has already been reached with tracking other elements.

E.

NSMP communication is inactive with the WLC.

Full Access
Question # 40

Which EAP method can an AP use to authenticate to the wired network?

A.

EAP-GTC

B.

EAP-MD5

C.

EAP-TLS

D.

EAP-FAST

Full Access
Question # 41

An engineer is configuring a BYOD deploymernt strategy and prefers a single SSID model.

Which technology is required to accomplish this configuration?

A.

mobility service engine

B.

wireless control system

C.

identify service engine

D.

Prime Infrastructure

Full Access
Question # 42

An engineer set up identity-based networking with ISE and configured AAA override on the WLAN. Which two attributes must be used to change the client behavior from the default settings? (Choose two.)

A.

DHCP timeout

B.

DNS server

C.

IPv6 ACL

D.

DSCP value

E.

multicast address

Full Access
Question # 43

An engineer has configured the wireless controller to authenticate clients on the employee SSID against Microsoft Active Directory using PEAP authentication.

Which protocol does the controller use to communicate with the authentication server?

A.

EAP

B.

802.1X

C.

RADIUS

D.

WPA2

Full Access
Question # 44

An engineer is implementing RADIUS to restrict administrative control to the network with the WLC management IP address of 192.168.1.10 and an AP subnet of 192.168.2.0/24. Which entry does the engineer define in the RADIUS server?

A.

administrative access defined on the WLC and the network range 192.168.2.0/255.255.254.0

B.

NAS entry of the virtual interface and the network range 192.168.2.0/255.255.255.0

C.

shared secret defined on the WLC and the network range 192.168.1.0/255.255.254.0

D.

WLC roles for commands and the network range 192.168.1.0/255.255.255.0

Full Access
Question # 45

Which condition introduce security risk to a BYOD policy?

A.

enterprise-managed MDM platform used for personal devices

B.

access to LAN without implementing MDM solution

C.

enforcement of BYOD access to internet only network

D.

enterprise life-cycle enforcement of personal device refresh

Full Access
Question # 46

A company has a single WLAN configured for 802.1x authentication with the QoS set to Silver. This WLAN supports all corporate and BYOD access. A decision has been made to allow users to install Cisco Jabber on their personal mobile devices. Users report poor voice quality when using Jabber. QoS is being applied only as best effort. What must be configured to ensure that the WLAN remains on the Silver class and to ensure Platinum class for Jabber?

A.

Configure QoS on the mobile devices that have Jabber installed.

B.

Enable Cisco Centralized Key Management on the WLAN so that the Jabber-enabled devices will connect.

C.

Configure the WLAN to broadcast on 5 GHz radios only and allow Jabber users to connect.

D.

Configure an AVC profile for the Jabber traffic and apply it to the WLAN.

Full Access
Question # 47

CMX Facebook Wi-Fi allows access to the network before authentication. Which two elements are available? (Choose two.)

A.

Allow HTTP traffic only before authentication and block all the traffic.

B.

Allow all the traffic before authentication and intercept HTTPS only.

C.

Allow HTTPs traffic only before authentication and block all other traffic.

D.

Allow all the traffic before authentication and intercept HTTP only.

E.

Allow SNMP traffic only before authentication and block all the traffic.

Full Access
Question # 48

On a Cisco Catalyst 9800 Series Wireless Controller, an engineer wants to prevent a FlexConnect AP from allowing wireless clients to connect when its Ethernet connection is nonoperational. Which command set prevents this connection?

A.

config terminal

wireless flexconnect profile [profile name]

ethernet-fallback-enable

end

B.

config terminal

wireless flexconnect profile [profile name]

fallback-radio-shut

end

C.

config terminal

wireless profile flex [profile name]

fallback-radio-shut

end

D.

config terminal

wireless profile flex [profile name]

ethernet-fallback-enable

end

Full Access
Question # 49

Where is a Cisco OEAP enabled on a Cisco Catalyst 9800 Series Wireless Controller?

A.

RF Profile

B.

Flex Profile

C.

Policy Profile

D.

AP Join Profile

Full Access
Question # 50

What is the default IEEE 802.1x AP authentication configuration on a Cisco Catalyst 9800 Series Wireless Controller?

A.

EAP-PEAP with 802.1x port authentication

B.

EAP-TLS with 802.1x port authentication

C.

EAP-FAST with CAPWAP DTLS + port authentication

D.

EAP-FAST with CAPWAP DTLS

Full Access
Question # 51

When configuring a Cisco WLC, which CLI command adds a VLAN with VLAN ID of 30 to a FlexConnect group named BranchA-FCG?

A.

config flexconnect BranchA-FCG vlan 30 add

B.

config flexconnect BranchA-FCG vlan add 30

C.

config flexconnect group BranchA-FCG vlan 30 add

D.

config flexconnect group BranchA-FCG vlan add 30

Full Access
Question # 52

An engineer is adding APs to an existing VolMLAN to allow for location based services. Which option will the primary change be to the network?

A.

increased transmit power on all APs

B.

moving to a bridging model

C.

AP footprint

D.

cell overlap would decrease

E.

triangulation of devices

Full Access
Question # 53

An engineer wants to upgrade the APs in a Cisco FlexConnect group. To accomplish this upgrade, the FlexConnect AP Upgrade setting will be used. One AP of each model with the lowest MAC address in the group must receive the upgrade directly from the controller. Which action accomplishes this direct upgrade?

A.

Remove the APs from the group.

B.

Reboot all APs before the upgrade.

C.

Allocate the master APs to different groups.

D.

Do not set any master APs.

Full Access
Question # 54

An engineer has configured the wireless controller to authenticate clients on the employee SSID against Microsoft Active Directory using PEAP authentication.

Which protocol does the controller use to communicate with the authentication server?

A.

EAP

B.

802.1X

C.

RADIUS

D.

WPA2

Full Access
Question # 55

Where is Cisco Hyperlocation enabled on a Cisco Catalyst 9800 Series Wireless Controller web interface?

A.

Policy Profile

B.

AP Join Profile

C.

Flex Profile

D.

RF Profile

Full Access
Question # 56

An engineer must achieve the highest level of location accuracy possible for a new mobile application. Which technology must be implemented for this use case?

A.

Time Difference of Arrival

B.

Bluetooth Low Energy

C.

RSS lateration

D.

ToA lateration

Full Access
Question # 57

An engineer is in the process of implementing Fastlane on a wireless network with a Mobility Express AP installed. The network must support voice and video applications for Apple devices. Due to a security concern, all iPhones are updated to version 14.5.432302546. Which QoS profile must the engineer configure on the user WLAN?

A.

Bronze

B.

Best Effort

C.

Silver

D.

Platinum

Full Access
Question # 58

An engineer is using Cisco Prime Infrastructure reporting to monitor the state of security on the WLAN. Which output is produced when the Adaptive wIPS Top 10 AP report is run?

A.

last 10 wIPS events from monitor mode APs

B.

last 10 wIPS events from sniffer mode APs

C.

last of 10 sniffer mode APs with the most wIPS events

D.

last of 10 monitor mode APs with the most wIPS events

Full Access
Question # 59

During the EAP process and specifically related to the client authentication session, which encrypted key is sent from the RADIUS server to the access point?

A.

WPA key

B.

session key

C.

encryption key

D.

shared-secret key

Full Access
Question # 60

A shopping center uses AireOS controllers with Cisco Wave 2 APs. A separate WLAN named Guest-012345678-WLAN is used for guest wireless clients. Management needs location analytics to determine popular areas. CMX must track only associated clients. What must be selected on the CMX server settings?

A.

Exclude probing clients

B.

Duty Cycle Cutoff

C.

Enable Locally Administered MAC Filtering

D.

Enable Location MAC Filtering

Full Access
Question # 61

Company XYZ recently migrated from AireOS to IOS XE 9800 WLCs. The Internet bandwidth must be limited to 5 Mbps for each guest client as per the global standard. In which configuration on the Cisco Catalyst 9800 WLC must the QoS requirement be added?

A.

table map

B.

policy map

C.

service policy

D.

class map

Full Access
Question # 62

A customer managing a large network has implemented location services. Due to heavy load, it is needed to load balance the data coming through NMSP from the WLCs. Load must be spread between multiple CMX servers to help optimize the data flow for APs. Which configuration in CMX meets this requirement?

A.

cmxctl config feature flags nmsplb.cmx-ap-grouping true

B.

cmxctl config feature flags nmsplb.cmxgrouping true

C.

cmxctl config feature flags nmsplb.cmx-loadbalance true

D.

cmxctl config feature flags nmsplb.cmx-rssi-distribute true

Full Access
Question # 63

An engineer is implementing profiling for BYOD devices using Cisco ISE. When using a distributed model, which persona must the engineer configure with the profiling service?

A.

Device Admin Node

B.

Primary Admin Node

C.

Monitor Node

D.

Policy Services Node

Full Access
Question # 64

An engineer is implementing a FlexConnect group for access points at a remote location using local switching but central DHCP. Which client feature becomes available only if this configuration is changed?

A.

multicast

B.

static IP

C.

fast roaming

D.

mDNS

Full Access