Which of the following user roles can access CMX Visitor Connect?

Which of the following user roles can access CMX Visitor Connect?A . AdministratorB . Power UserC . Guest UserD . Super AdministratorView AnswerAnswer: A

November 30, 2018 No Comments READ MORE +

When you configure BYOD access to the network, you face increased security risks and challenges. Which challenge is resolved by deploying digital client certificates?

When you configure BYOD access to the network, you face increased security risks and challenges. Which challenge is resolved by deploying digital client certificates?A . managing the increase connected devicesB . ensuring wireless LAN performance and reliabilityC . providing device choice and supportD . enforcing company usage policiesView AnswerAnswer: D

November 27, 2018 No Comments READ MORE +

A corporation has recently implemented a BYOD policy at their HQ. Which three risks should the security director be concerned about? (Choose three.)

A corporation has recently implemented a BYOD policy at their HQ. Which three risks should the security director be concerned about? (Choose three.)A . unauthorized usersB . rogue ad-hocsC . software piracyD . lost and stolen devicesE . malwareF . keyloggersView AnswerAnswer: A,C,E

November 4, 2018 No Comments READ MORE +

Which mobility mode must a Cisco 5508 wireless Controller be in to use the MA functionality on a cisco catalyst 3850 series switch with a cisco 550 Wireless Controller as an MC?

Which mobility mode must a Cisco 5508 wireless Controller be in to use the MA functionality on a cisco catalyst 3850 series switch with a cisco 550 Wireless Controller as an MC?A . classic mobilityB . new mobilityC . converged access mobilityD . auto-anchor mobilityView AnswerAnswer: C

November 1, 2018 No Comments READ MORE +

An engineer must enable EAP on a new WLAN and is ensuring that the necessary components are available. Which component uses EAP and 802.1x to pass user authentication to the authenticator?

An engineer must enable EAP on a new WLAN and is ensuring that the necessary components are available. Which component uses EAP and 802.1x to pass user authentication to the authenticator?A . APB . AAA serverC . supplicantD . controllerView AnswerAnswer: D

October 31, 2018 No Comments READ MORE +

On which two ports does the RADIUS server maintain a database and listen for incoming authentication and accounting requests? (Choose two.)

On which two ports does the RADIUS server maintain a database and listen for incoming authentication and accounting requests? (Choose two.)A . UDP 1900B . UDP port 1812C . TCP port 1812D . TCP port 1813E . UDP port 1813View AnswerAnswer: B,E

October 25, 2018 No Comments READ MORE +

An engineer is configuring a BYOD deployment strategy and prefers a single SSID model. Which technology is required to accomplish this configuration?

An engineer is configuring a BYOD deployment strategy and prefers a single SSID model. Which technology is required to accomplish this configuration?A . mobility service engineB . wireless control systemC . identify service engineD . Prime InfrastructureView AnswerAnswer: C

October 19, 2018 No Comments READ MORE +

A Cisco WLC has been added to the network and Cisco ISE as a network device, but authentication is failing. Which configuration within the network device configuration should be verified?

A Cisco WLC has been added to the network and Cisco ISE as a network device, but authentication is failing. Which configuration within the network device configuration should be verified?A . shared secretB . device IDC . SNMP RO communityD . device interface credentialsView AnswerAnswer: A

October 8, 2018 No Comments READ MORE +

A customer is having problems with clients associating to me wireless network. Based on the configuration, which option describes the most likely cause of the issue?

Refer to the exhibit. A customer is having problems with clients associating to me wireless network. Based on the configuration, which option describes the most likely cause of the issue?A . Both AES and TKIP must be enabledB . SA Query Timeout is set too lowC . Comeback timer is...

October 3, 2018 No Comments READ MORE +

An engineer is changing the authentication method of a wireless network from EAP-FAST to EAP-TLS. Which two changes are necessary? (Choose two.)

An engineer is changing the authentication method of a wireless network from EAP-FAST to EAP-TLS. Which two changes are necessary? (Choose two.)A . Cisco Secure ACS is required.B . A Cisco NAC server is required.C . All authentication clients require their own certificates.D . The authentication server now requires a...

October 2, 2018 No Comments READ MORE +