Why would this problem occur?

Microsoft Active Directory integrated machines are not authenticating to the internal WLAN. The WLAN settings are WPA2-AES-802.1x and are authenticating to a Cisco Identity Services Engine server. You investigate and note that non-domain authenticated machines are properly authenticating to the WLAN using their Active Directory credentials. Why would this problem...

July 13, 2018 No Comments READ MORE +

What is the most likely cause of this issue?

You have an Apple IOS iPhone4 that is used on your home Wi-Fi network and a personal laptop that is used on your work's enterprise wireless network. At your office, you are unable to see the enterprise wireless network on your iPhone4. What is the most likely cause of this...

July 13, 2018 No Comments READ MORE +

Which method is used to shield the client from class 3 management attacks?

Which method is used to shield the client from class 3 management attacks?A . client MFPB . WEPC . WPAD . client protection suiteE . 802.1XView AnswerAnswer: A

July 12, 2018 No Comments READ MORE +

Which type of basic radiation pattern does a Yagi antenna have?

Which type of basic radiation pattern does a Yagi antenna have?A . circularB . semicircularC . straight lineD . coneView AnswerAnswer: D

July 11, 2018 No Comments READ MORE +

Which protocol helps the administrator to determine whether a detected rogue AP is in the network of the organization?

Which protocol helps the administrator to determine whether a detected rogue AP is in the network of the organization?A . RLDPB . RCPC . RDPD . RAPPView AnswerAnswer: A

July 11, 2018 No Comments READ MORE +

When deploying a Cisco Cloud Wireless Infrastructure, what two destination ports must be open? (Choose two.)

When deploying a Cisco Cloud Wireless Infrastructure, what two destination ports must be open? (Choose two.)A . TCP/5246B . UDP/5246C . TCP/5247D . UDP/5247E . TCP/7351F . UDP/7351G . TCP/7734H . UDP/7734View AnswerAnswer: F, G

July 11, 2018 No Comments READ MORE +

Which two algorithms are available in RRM? (Choose two.)

Which two algorithms are available in RRM? (Choose two.)A . coverage-hole detectionB . dynamic channel assignmentC . RSSI normalizerD . transmitting channel expanderE . rogue detectionView AnswerAnswer: A, B

July 10, 2018 No Comments READ MORE +

Which two statements about the status of the respective AP on a Cisco WCS version 7.0 map does this icon represent?

Refer to the exhibit. Which two statements about the status of the respective AP on a Cisco WCS version 7.0 map does this icon represent? (Choose two.)A . The 802.11a/n radio is administratively disabled.B . The 802.11a/n radio has a minor fault.C . The 802.11a/n radio has a major fault.D...

July 9, 2018 No Comments READ MORE +

Which three management protocols will provide encrypted access to the equipment?

A customer has asked for its wireless equipment to be managed as securely as possible. Which three management protocols will provide encrypted access to the equipment? (Choose three.)A . Secure ShellB . HTTPSC . SNMPv3D . TelnetE . SNMPv2cF . HTTPView AnswerAnswer: A, B, C

July 9, 2018 No Comments READ MORE +