Exams > Cisco > 300-430: Implementing Cisco Enterprise Wireless Networks (300-430 ENWLSI)
300-430: Implementing Cisco Enterprise Wireless Networks (300-430 ENWLSI)
Page 9 out of 19 pages Questions 81-90 out of 182 questions
Question#81

An engineer is using Cisco Prime Infrastructure reporting to monitor the state of security on the WLAN. Which output is produced when the Adaptive wIPS Top 10
AP report is run?

  • A. last 10 wIPS events from monitor mode APs
  • B. last 10 wIPS events from sniffer mode APs
  • C. last of 10 sniffer mode APs with the most wIPS events
  • D. last of 10 monitor mode APs with the most wIPS events
Discover Answer Hide Answer

A

Question#82


Refer to the exhibit. An engineer tries to manage the rogues on the Cisco WLC. Based on the configuration, which AP is marked as malicious by the controller?

  • A. rogue AP with SSID admin seen for 4000 seconds and heard at -70dBm
  • B. rogue AP with SSID admin seen for 3000 seconds and heard at -60dBm
  • C. rogue AP with SSID admin seen for 4000 seconds and heard at -60dBm
  • D. rogue AP with SSID admin seen for 3000 seconds and heard at -70dBm
Discover Answer Hide Answer

D

Question#83

Which devices can be tracked with the Cisco Context Aware Services?

  • A. wired and wireless devices
  • B. wireless devices
  • C. wired devices
  • D. Cisco certified wireless devices
Discover Answer Hide Answer

A
Reference:
https://www.cisco.com/c/en/us/support/docs/wireless/context-aware-software/110836-cas-faq.html

Question#84

Which two events are outcomes of a successful RF jamming attack? (Choose two.)

  • A. disruption of WLAN services
  • B. unauthentication association
  • C. deauthentication broadcast
  • D. deauthentication multicast
  • E. physical damage to AP hardware
Discover Answer Hide Answer

AE

Question#85

An engineer must create an account to log in to the CLI of an access point for troubleshooting. Which configuration on the WLC will accomplish this?

  • A. Allow New Telnet Sessions
  • B. ReadWrite User Access Mode
  • C. SNMP V3 User
  • D. Global Configuration Enable Password
Discover Answer Hide Answer

D

Question#86

A multitenant building contains known wireless networks in most of the suites. Rogues must be classified in the WLC. How are the competing wireless APs classified?

  • A. adhoc
  • B. friendly
  • C. malicious
  • D. unclassified
Discover Answer Hide Answer

B

Question#87

An enterprise has recently deployed a voice and video solution available to all employees using AireOS controllers. The employees must use this service over their laptops, but users report poor service when connected to the wireless network. The programs that consume bandwidth must be identified and restricted.
Which configuration on the WLAN aids in recognizing the traffic?

  • A. NetFlow Monitor
  • B. AVC Profile
  • C. QoS Profile
  • D. Application Visibility
Discover Answer Hide Answer

D

Question#88

Which customizable security report on Cisco Prime Infrastructure will show rogue APs detected since a point in time?

  • A. Network Summary
  • B. Rogue APs Events
  • C. New Rogue APs
  • D. Rogue APs Count Summary
Discover Answer Hide Answer

C

Question#89

An engineer configures a Cisco Aironet 600 Series OfficeExtend AP for a user who works remotely. What is configured on the Cisco WLC to allow the user to print a printer on his home network?

  • A. split tunneling
  • B. SE-connect
  • C. FlexConnect
  • D. AP failover priority
Discover Answer Hide Answer

A
Reference:
https://www.cisco.com/c/en/us/support/docs/wireless/aironet-602-officeextend-access-point/117540-configure-splittunneloeap-00.html

Question#90

An engineer must configure a Cisco WLC to support Cisco Aironet 600 Series OfficeExtend APs. Which two Layer 2 security options are supported in this environment? (Choose two.)

  • A. Static WEP + 802.1X
  • B. WPA+WPA2
  • C. Static WEP
  • D. CKIP
  • E. 802.1X
Discover Answer Hide Answer

BC

chevron rightPrevious Nextchevron right