Which two changes are necessary?

An engineer is changing the authentication method of a wireless network from EAP-FAST to EAP­TLS. Which two changes are necessary? (Choose two.)A . Cisco Secure ACS is required.B . A Cisco NAC server is required.C . All authentication clients require their own certificates.D . The authentication server now requires a...

December 12, 2019 No Comments READ MORE +

Which two considerations must a network engineer have when planning for voice over wireless roaming? (Choose two.)

Which two considerations must a network engineer have when planning for voice over wireless roaming? (Choose two.)A . Roaming with only 802.1x authentication requires full reauthentication.B . Full reauthentication introduces gaps in a voice conversation.C . Roaming occurs when e phone has seen at least four APs.D . Roaming occurs...

December 12, 2019 No Comments READ MORE +

Which three risks should the security director be concerned about?

A corporation has recently implemented a BYOD policy at their HQ. Which three risks should the security director be concerned about? (Choose three.)A . unauthorized usersB . rogue ad-hocsC . software piracyD . lost and stolen devicesE . malwareF . keyloggersView AnswerAnswer: A,C,E

December 12, 2019 No Comments READ MORE +

Which two events are possible outcomes of a successful RF jamming attack? (Choose two.)

Which two events are possible outcomes of a successful RF jamming attack? (Choose two.)A . unauthentication associationB . deauthentication multicastC . deauthentication broadcastD . disruption of WLAN servicesE . physical damage to AP hardwareView AnswerAnswer: D,E

December 12, 2019 No Comments READ MORE +

What is the maximum number of clients that a small branch deployment using a four-member Cisco Catalyst 3850 stack (acting as MC/MA) can support?

What is the maximum number of clients that a small branch deployment using a four-member Cisco Catalyst 3850 stack (acting as MC/MA) can support?A . 10000B . 1000C . 500D . 2000E . 5000View AnswerAnswer: E

December 11, 2019 No Comments READ MORE +

What will occur when the primary RADIUS fails then recovers?

An engineer has configured passive fallback mode for RADIUS with default timer settings. What will occur when the primary RADIUS fails then recovers?A . RADIUS requests will be sent to the secondary RADIUS server until the secondary fails to respond.B . The controller will immediately revert back after it receives...

December 11, 2019 No Comments READ MORE +

Which authentication method must be configured on the client to support this deployment?

A customer has deployed PEAP authentication with a Novell eDirectory LDAP Server. Which authentication method must be configured on the client to support this deployment?A . PEAP(EAP-MSCHAPv2)B . PEAP(EAP-TTLS)C . PEAP(EAP-GTC)D . PEAP(EAP-WPA)View AnswerAnswer: C

December 11, 2019 No Comments READ MORE +

Which two 802.11 methods can be configured to protect card holder data? (Choose two.)

Which two 802.11 methods can be configured to protect card holder data? (Choose two.)A . CCMPB . WEPC . SSLD . TKIPE . VPNView AnswerAnswer: C,E

December 11, 2019 No Comments READ MORE +

Which CLI command do you use on Cisco IOS XE Software to put the AP named Floor1_AP1 back in the default AP group?

Which CLI command do you use on Cisco IOS XE Software to put the AP named Floor1_AP1 back in the default AP group?A . ap Floor1_AP1 ap-groupname default-groupB . ap name Floor1_AP1 apgroup default-groupC . ap name Floor1_AP1 ap-groupname default-groupD . ap name Floor1_AP1 ap-groupname defaultView AnswerAnswer: C

December 11, 2019 No Comments READ MORE +

Winch report provides the required data?

An engineer must provide a graphical trending report of the total number of wireless clients on the network. Winch report provides the required data?A . Client SummaryB . Posture Status CountC . Client Traffic Stream MetricsD . Mobility Client SummaryView AnswerAnswer: D

December 11, 2019 No Comments READ MORE +