Which of the following user roles can access CMX Visitor Connect?
Which of the following user roles can access CMX Visitor Connect?A . AdministratorB . Power UserC . Guest UserD . Super AdministratorView AnswerAnswer: A
When you configure BYOD access to the network, you face increased security risks and challenges. Which challenge is resolved by deploying digital client certificates?
When you configure BYOD access to the network, you face increased security risks and challenges. Which challenge is resolved by deploying digital client certificates?A . managing the increase connected devicesB . ensuring wireless LAN performance and reliabilityC . providing device choice and supportD . enforcing company usage policiesView AnswerAnswer: D
A corporation has recently implemented a BYOD policy at their HQ. Which three risks should the security director be concerned about? (Choose three.)
A corporation has recently implemented a BYOD policy at their HQ. Which three risks should the security director be concerned about? (Choose three.)A . unauthorized usersB . rogue ad-hocsC . software piracyD . lost and stolen devicesE . malwareF . keyloggersView AnswerAnswer: A,C,E
Which mobility mode must a Cisco 5508 wireless Controller be in to use the MA functionality on a cisco catalyst 3850 series switch with a cisco 550 Wireless Controller as an MC?
Which mobility mode must a Cisco 5508 wireless Controller be in to use the MA functionality on a cisco catalyst 3850 series switch with a cisco 550 Wireless Controller as an MC?A . classic mobilityB . new mobilityC . converged access mobilityD . auto-anchor mobilityView AnswerAnswer: C
An engineer must enable EAP on a new WLAN and is ensuring that the necessary components are available. Which component uses EAP and 802.1x to pass user authentication to the authenticator?
An engineer must enable EAP on a new WLAN and is ensuring that the necessary components are available. Which component uses EAP and 802.1x to pass user authentication to the authenticator?A . APB . AAA serverC . supplicantD . controllerView AnswerAnswer: D
On which two ports does the RADIUS server maintain a database and listen for incoming authentication and accounting requests? (Choose two.)
On which two ports does the RADIUS server maintain a database and listen for incoming authentication and accounting requests? (Choose two.)A . UDP 1900B . UDP port 1812C . TCP port 1812D . TCP port 1813E . UDP port 1813View AnswerAnswer: B,E
An engineer is configuring a BYOD deployment strategy and prefers a single SSID model. Which technology is required to accomplish this configuration?
An engineer is configuring a BYOD deployment strategy and prefers a single SSID model. Which technology is required to accomplish this configuration?A . mobility service engineB . wireless control systemC . identify service engineD . Prime InfrastructureView AnswerAnswer: C
A Cisco WLC has been added to the network and Cisco ISE as a network device, but authentication is failing. Which configuration within the network device configuration should be verified?
A Cisco WLC has been added to the network and Cisco ISE as a network device, but authentication is failing. Which configuration within the network device configuration should be verified?A . shared secretB . device IDC . SNMP RO communityD . device interface credentialsView AnswerAnswer: A
A customer is having problems with clients associating to me wireless network. Based on the configuration, which option describes the most likely cause of the issue?
Refer to the exhibit. A customer is having problems with clients associating to me wireless network. Based on the configuration, which option describes the most likely cause of the issue?A . Both AES and TKIP must be enabledB . SA Query Timeout is set too lowC . Comeback timer is...
An engineer is changing the authentication method of a wireless network from EAP-FAST to EAP-TLS. Which two changes are necessary? (Choose two.)
An engineer is changing the authentication method of a wireless network from EAP-FAST to EAP-TLS. Which two changes are necessary? (Choose two.)A . Cisco Secure ACS is required.B . A Cisco NAC server is required.C . All authentication clients require their own certificates.D . The authentication server now requires a...