New Year Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

What are two considerations when deploying a Cisco Hyperlocation? (Choose two.)

A.

NTP configuration is available, but not recommended.

B.

The Cisco Hyperlocation feature must be enabled only on the wireless LAN controller.

C.

After enabling Cisco Hyperlocation on Cisco CMX, the APs and the wireless LAN controller must be restarted.

D.

The Cisco Hyperlocation feature must be enabled on the wireless LAN controller and Cisco CMX.

E.

If the Cisco CMX server is a VM, a high-end VM is needed for Cisco Hyperlocation deployments.

Which three characteristics of a rogue AP pose a high security risk? (Choose three.)

A.

open authentication

B.

high RSSI

C.

foreign SSID

D.

accepts clients

E.

low RSSI

F.

distant location

A new MSE with wIPS service has been installed and no alarm information appears to be reaching the MSE from controllers. Which protocol must be allowed to reach the MSE from the controllers?

A.

SOAP/XML

B.

NMSP

C.

CAPWAP

D.

SNMP

An engineer is planning an image upgrade of the WLC, and hundreds of APs are spread across remote sites with limited WAN bandwidth. The engineer must minimize the WAN utilization for this upgrade. Which approach must be used for the AP image upgrade?

A.

Predownload the new code to the APs.

B.

Use the Smart AP image upgrade feature.

C.

Allow the APs to download their code after WLC reboot.

D.

Execute parallel TFTP code upgrade on the APs via SSH.

During the EAP process and specifically related to the client authentication session, which encrypted key is sent from the RADIUS server to the access point?

A.

WPA key

B.

session key

C.

encryption key

D.

shared-secret key

What is the maximum time range that can be viewed on the Cisco DNA Center issues and alarms page?

A.

3 hours

B.

24 hours

C.

3 days

D.

7 days

Refer to the exhibit.

An ACL is configured to restrict access for BYOD clients. The ACL must redirect devices to the guest portal. To which two devices on the local network must the ACL allow access other than the DHCP server? (Choose two.)

A.

RADIUS server

B.

DNS server

C.

Cisco ISE

D.

SNMP server

E.

WLC

A wireless engineer is configuring LWA using ISE. The customer is a startup company and requested the wireless users to authenticate against a directory, but LDAP is unavailable. Which solution should be proposed in order to have the same security and user experience?

A.

Use SAML.

B.

Use the internal database of the RADIUS server.

C.

Use a preshared key on the corporate WLAN.

D.

Use Novell eDirectory.

An enterprise started using WebEx as a virtual meeting solution. There is a concern that the existing wireless network will not be able to support the increased amount of traffic as a result of using WebEx. An engineer needs to remark the QoS value for this application to ensure high quality in meetings. What must be implemented to accomplish this task?

A.

QoS preferred call index

B.

UP to DSCP map

C.

AVC profiles

D.

WLAN quality of service profile

An engineer is adding APs to an existing VolMLAN to allow for location based services. Which option will the primary change be to the network?

A.

increased transmit power on all APs

B.

moving to a bridging model

C.

AP footprint

D.

cell overlap would decrease

E.

triangulation of devices