What is causing the issue?

A user is trying to connect to a wireless network that is configured for WPA2-Enterprise security using a corporate laptop. The CA certificate for the authentication server has been installed on the Trusted Root Certification Authorities store on the laptop. The user has been prompted to enter the credentials multiple...

November 6, 2021 No Comments READ MORE +

Where is a Cisco OEAP enabled on a Cisco Catalyst 9800 Series Wireless Controller?

Where is a Cisco OEAP enabled on a Cisco Catalyst 9800 Series Wireless Controller?A . RF ProfileB . Flex ProfileC . Policy ProfileD . AP Join ProfileView AnswerAnswer: B Explanation: https://www.cisco.com/c/en/us/td/docs/wireless/controller/9800/configguide/b_wl_16_10_cg/flexconnect.html

November 6, 2021 No Comments READ MORE +

Which technology must be implemented for this use case?

An engineer must achieve the highest level of location accuracy possible for a new mobile application. Which technology must be implemented for this use case?A . Time Difference of ArrivalB . Bluetooth Low EnergyC . RSS laterationD . ToA laterationView AnswerAnswer: A Explanation: https://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/Mobility/WiFiLBSDG/wifich2.ht ml

November 5, 2021 No Comments READ MORE +

What is the maximum number of APs that should be used for containment?

An engineer must implement rogue containment for an SSID. What is the maximum number of APs that should be used for containment?A . 1B . 2C . 3D . 4View AnswerAnswer: D

November 5, 2021 No Comments READ MORE +

Which two settings must be set on the wireless infrastructure to determine its location?

An IT department receives a report of a stolen laptop and has information on the MAC address of the laptop. Which two settings must be set on the wireless infrastructure to determine its location? (Choose two.)A . Location History for Visitors must be enabled on the MSC . Location History...

November 5, 2021 No Comments READ MORE +

Which configuration on the WLC will accomplish this?

An engineer must create an account to log in to the CLI of an access point for troubleshooting. Which configuration on the WLC will accomplish this?A . ReadWrite User Access ModeB . Global Configuration Enable PasswordC . SNMP V3 UserD . Allow New Telnet SessionsView AnswerAnswer: B Explanation: https://www.cisco.com/c/en/us/td/docs/wireless/controller/7-4/configuration/guides/consolidated/b_cg74_CONSOLIDATED/b_cg74_CONSOLIDATED_chapter_01101011.html

November 5, 2021 No Comments READ MORE +

Which Cisco CMX feature must be configured and used to accomplish this tracking?

An engineer must track guest traffic flow using the WLAN infrastructure. Which Cisco CMX feature must be configured and used to accomplish this tracking?A . analyticsB . connect and engageC . presenceD . detect and locate.View AnswerAnswer: D

November 5, 2021 No Comments READ MORE +

Which configured is applied to prevent the network from a Layer 2 flooding of multicast frames with a seamless transfer of multicast data to the client when roaming from one controller to another?

Which configured is applied to prevent the network from a Layer 2 flooding of multicast frames with a seamless transfer of multicast data to the client when roaming from one controller to another?A . Enable IGMPv3 on the central Layer 3 switch.B . Enable IGMP snooping on the WLCC ....

November 5, 2021 No Comments READ MORE +

Which type of multicast routing should be implemented?

An engineer is configuring multicast for wireless for an all-company video meeting on a network using EIGRP and BGP within a single domain from a single source. Which type of multicast routing should be implemented?A . Protocol Independent Multicast Dense ModeB . Source Specific MulticastC . Multicast Source Discovery ProtocolD...

November 3, 2021 No Comments READ MORE +

Which feature meets these requirements?

An engineer must implement Cisco Identity-Based Networking Services at a remote site using ISE to dynamically assign groups of users to specific IP subnets. If the subnet assigned to a client is available at the remote site, then traffic must be offloaded locally, and subnets are unavailable at the remote...

November 3, 2021 No Comments READ MORE +