When a wireless client uses WPA2 AES, which keys are created at the end of the four way handshake process between the client and the access point?
When a wireless client uses WPA2 AES, which keys are created at the end of the four way handshake process between the client and the access point?A . AES key, TKIP key, WEP keyB . AES key, WPA2 key, PMKC . KCK, KEK, TKD . KCK, KEK, MIC keyView AnswerAnswer:...
Which three commands are part of the requirements on Cisco Catalyst 3850 series Switch with Cisco IOX XE to create a RADIUS authentication server group? (Choose three.)
Which three commands are part of the requirements on Cisco Catalyst 3850 series Switch with Cisco IOX XE to create a RADIUS authentication server group? (Choose three.)A . authentication dot1x default localB . aaa session-idcommonC . dot1x system-auth-controlD . aaa new-modelE . local-auth wcm_eap_profF . security dot1xView AnswerAnswer: B,C,D
When a supplicant and AAA server are configured to use PEAP, which mechanism is used by the client to authenticate the AAA server in Phase One?
When a supplicant and AAA server are configured to use PEAP, which mechanism is used by the client to authenticate the AAA server in Phase One?A . PMKB . shared secret keysC . digital certificateD . PACView AnswerAnswer: C
What is the 1.1.1.1 IP address?
Refer to the exhibit. What is the 1.1.1.1 IP address?A . the wireless client IP addressB . the RADIUS server IP addressC . the controller management IP addressD . the lightweight IP addressE . the controller AP-manager IP addressF . the controller virtual interface IP addressView AnswerAnswer: F
Which security option should be configured?
An engineer requires authentication for WPA2 that will use fast rekeying to enable clients to roam from one access point to another without going through the controller. Which security option should be configured?A . PSKB . AESC . Cisco Centralized key ManagementD . 802.1xView AnswerAnswer: C
Which security method does a Cisco guest wireless deployment that relies on Cisco ISE guest portal for user authentication use?
Which security method does a Cisco guest wireless deployment that relies on Cisco ISE guest portal for user authentication use?A . Layer 2 and Layer 3B . Layer 2 onlyC . No security methods are needed to deploy CWAD . Layer 3 onlyView AnswerAnswer: B
Which option describes the purpose of configuring switch peer groups?
Which option describes the purpose of configuring switch peer groups?A . enforces RF profilesB . enables location servicesC . restricts roaming traffic to certain switchesD . allows template based configuration changesView AnswerAnswer: C
Which three options are valid client profile probes m Cisco ISE? (Choose three.)
Which three options are valid client profile probes m Cisco ISE? (Choose three.)A . DHCPB . 802.1XC . CCXD . NetFlowE . TACACSF . HTTPView AnswerAnswer: A,D,F
Which command is an SNMPv3-specific command that an engineer can use only in Cisco IOS XE?
Which command is an SNMPv3-specific command that an engineer can use only in Cisco IOS XE?A . snmp-server user remoteuser1 group1 remote 10.12.0.4B . snmp-server host 172.16.1.33 publicC . snmp-server community comaccess ro 4D . snmp-server enable traps wirelessView AnswerAnswer: A
When using the Standalone Profile Editor in the Cisco AnyConnect v3.0 to create a new NAM profile, which two statements describe the profile becoming active? (Choose two.)
When using the Standalone Profile Editor in the Cisco AnyConnect v3.0 to create a new NAM profile, which two statements describe the profile becoming active? (Choose two.)A . selects the new profile from NAMB . selects "Network Repair" from NAMC . becomes active after a save of the profile nameD...