Which port must the firewall allow to ensure that authentication can occur?
A customer has a corporate SSID that is configured to authenticate against an ACS server to validate client credentials on the corporate SSID. The customer has a firewall logically positioned on the network between the WLC and the ACS server in the network architecture. Which port must the firewall allow...
Please Answer Questions Follow The Prompts Below
DRAG DROPView AnswerAnswer:
Which feature on an 802.11n AP provides better performance to legacy devices?
A company has all IEEE 802.11a/802.11g devices; however, its network administrator recommends installing 802.11n access points to provide greater performance. Which feature on an 802.11n AP provides better performance to legacy devices?A . channel aggregationB . transmit beam-formingC . maximal-ratio combiningD . spatial multiplexingView AnswerAnswer: B
In a typical wireless network using WPA, WPA2 or VPN, why is it still possible for a rogue client to launch a DOS attack?
In a typical wireless network using WPA, WPA2 or VPN, why is it still possible for a rogue client to launch a DOS attack?A . WPA and WPA2 are not considered strong encryption algorithms and are easily cracked.B . 802.11 management frames are easily compromised.C . Cisco Compatible Extensions v5...
Which action secures the SNMPv2C protocol in a Cisco WLC?
Which action secures the SNMPv2C protocol in a Cisco WLC?A . configure new communities and disable default communitiesB . use digital certificates to authenticate and encrypt transmissionsC . enable password or transfer encryptionD . set a username and difficult-to-guess passwordView AnswerAnswer: A
A customer wants to deploy a mesh network with 2 root access points and 10 mesh access points. The root access points should be configured as which mode on the WLC?
A customer wants to deploy a mesh network with 2 root access points and 10 mesh access points. The root access points should be configured as which mode on the WLC?A . meshB . FlexConnectC . bridgeD . rouge detectionE . snifferView AnswerAnswer: C
Which option is used to form the BSSID in a BSS?
Which option is used to form the BSSID in a BSS?A . AP radio MAC addressB . AP wired MAC addressC . AP serial numberD . client radio MAC addressE . client wired MAC addressF . client serial numberView AnswerAnswer: A
When connected to the console port, which three minimum parameters must you configure?
You have a lightweight AP that has been moved to a new subnet and has become stranded because DNS and DHCP servers are unavailable. The AP cannot connect to the controller. When connected to the console port, which three minimum parameters must you configure? (Choose three.)A . AP IP addressB...
What are the three primary functions of the Cisco Unified Wireless LWAPP architecture? (Choose three.)
What are the three primary functions of the Cisco Unified Wireless LWAPP architecture? (Choose three.)A . control and management of the CAPWAPB . tunneling of VPN clients over the WANC . tunneling of WLAN client traffic to the WLCD . collection of 802.1Q trunksE . collection of 802.11 data for...
Which five options are results of that exchange being used on a controller-based network?
When the enterprise-based authentication method is used for WPA2, a bidirectional handshake exchange occurs between the client and the authenticator. Which five options are results of that exchange being used on a controller-based network? (Choose five.)A . a bidirectional exchange of a nonce used for key generationB . binding of...