Which statement describes a security weakness of a WPA2 with a PSK?

Which statement describes a security weakness of a WPA2 with a PSK?A . The compromised key can be used for another connection.B . The key can be eavesdropped from the wireless medium.C . The key can be recreated from a few eavesdropped frames.D . The key is not case-sensitive and...

June 24, 2018 No Comments READ MORE +

Which two access points would meet the customers requirements?

A customer wants to deploy Cisco Cloud Wireless architecture with 802.11ac capabilities. Which two access points would meet the customers requirements? (Choose two.)A . Cisco 3700 Access PointsB . Cisco MR34 Access PointsC . Cisco MR18 Access PointsD . Cisco 3600 Access PointsE . Cisco MR72 Access PointsF . Cisco...

June 24, 2018 No Comments READ MORE +

What is the function of the Cisco AnyConnect DART tool?

What is the function of the Cisco AnyConnect DART tool?A . creates a compressed bundle of client logs and informationB . visualizes a WLAN environment, showing the possible locations of problemsC . gathers statistics from neighboring clients for comparison to the baselineD . helps to troubleshoot a WLAN connection by...

June 23, 2018 No Comments READ MORE +

In order to configure the employee WLAN, what Layer 2 security policies are valid?

A customer has completed the installation of an 802.11ac greenfield deployment at their corporate headquarters. They would like to leverage 802.11ac enhanced speeds on the trusted employee WLAN. In order to configure the employee WLAN, what Layer 2 security policies are valid?A . WPA2 (TKIP)B . WPA (AES)C . OPEND...

June 22, 2018 No Comments READ MORE +

Which two protocols are available to download or upload files to or from Cisco WLC? (Choose two.)

Which two protocols are available to download or upload files to or from Cisco WLC? (Choose two.)A . FTPB . TFTPC . SCPD . HTTPE . HTTPSView AnswerAnswer: A, B

June 22, 2018 No Comments READ MORE +

Which Cisco AnyConnect module allows you to set the parameters that are needed to connect to the wireless network?

Which Cisco AnyConnect module allows you to set the parameters that are needed to connect to the wireless network?A . NAMB . DARTC . postureD . telemetryView AnswerAnswer: A

June 21, 2018 No Comments READ MORE +

Which architecture is used to divide the roles between the access point and the WLC when deploying a centralized wireless solution?

Which architecture is used to divide the roles between the access point and the WLC when deploying a centralized wireless solution?A . Split MACB . CAPWAPC . LWAPPD . Local MACView AnswerAnswer: A

June 20, 2018 No Comments READ MORE +

Which two characteristics are components of mobility anchoring? (Choose two.)

Which two characteristics are components of mobility anchoring? (Choose two.)A . It is enabled as a global setting.B . Only one mobility anchor is allowed per WLAD . It is enabled on a per WLAN basis.E . Client traffic is tunneled to predefined WLC(s).F . It acts as master controller...

June 20, 2018 No Comments READ MORE +

Which three options relate to event-driven RRM? (Choose three.)

Which three options relate to event-driven RRM? (Choose three.)A . any 802.11n AP modelsB . specific AP modelsC . minimum of AP and WLCD . minimum of AP, WLC, and WCSE . minimum of AP, WLC, WCS, and MSEF . configurable in WLC at 802.11b/g/n > RRM > TPCG ....

June 19, 2018 No Comments READ MORE +

Which tool can be used to identify BSSID traffic in the facility?

A customer wants to identify the amount of BSSID traffic that is propagating through its facility from neighboring networks. Which tool can be used to identify BSSID traffic in the facility?A . Wi-Fi scannerB . wireless attenuatorC . RF jammerD . Cisco Identity Services EngineView AnswerAnswer: A

June 19, 2018 No Comments READ MORE +