What is causing the issue?
A user is trying to connect to a wireless network that is configured for WPA2-Enterprise security using a corporate laptop. The CA certificate for the authentication server has been installed on the Trusted Root Certification Authorities store on the laptop. The user has been prompted to enter the credentials multiple...
Where is a Cisco OEAP enabled on a Cisco Catalyst 9800 Series Wireless Controller?
Where is a Cisco OEAP enabled on a Cisco Catalyst 9800 Series Wireless Controller?A . RF ProfileB . Flex ProfileC . Policy ProfileD . AP Join ProfileView AnswerAnswer: B Explanation: https://www.cisco.com/c/en/us/td/docs/wireless/controller/9800/configguide/b_wl_16_10_cg/flexconnect.html
Which technology must be implemented for this use case?
An engineer must achieve the highest level of location accuracy possible for a new mobile application. Which technology must be implemented for this use case?A . Time Difference of ArrivalB . Bluetooth Low EnergyC . RSS laterationD . ToA laterationView AnswerAnswer: A Explanation: https://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/Mobility/WiFiLBSDG/wifich2.ht ml
What is the maximum number of APs that should be used for containment?
An engineer must implement rogue containment for an SSID. What is the maximum number of APs that should be used for containment?A . 1B . 2C . 3D . 4View AnswerAnswer: D
Which two settings must be set on the wireless infrastructure to determine its location?
An IT department receives a report of a stolen laptop and has information on the MAC address of the laptop. Which two settings must be set on the wireless infrastructure to determine its location? (Choose two.)A . Location History for Visitors must be enabled on the MSC . Location History...
Which configuration on the WLC will accomplish this?
An engineer must create an account to log in to the CLI of an access point for troubleshooting. Which configuration on the WLC will accomplish this?A . ReadWrite User Access ModeB . Global Configuration Enable PasswordC . SNMP V3 UserD . Allow New Telnet SessionsView AnswerAnswer: B Explanation: https://www.cisco.com/c/en/us/td/docs/wireless/controller/7-4/configuration/guides/consolidated/b_cg74_CONSOLIDATED/b_cg74_CONSOLIDATED_chapter_01101011.html
Which Cisco CMX feature must be configured and used to accomplish this tracking?
An engineer must track guest traffic flow using the WLAN infrastructure. Which Cisco CMX feature must be configured and used to accomplish this tracking?A . analyticsB . connect and engageC . presenceD . detect and locate.View AnswerAnswer: D
Which configured is applied to prevent the network from a Layer 2 flooding of multicast frames with a seamless transfer of multicast data to the client when roaming from one controller to another?
Which configured is applied to prevent the network from a Layer 2 flooding of multicast frames with a seamless transfer of multicast data to the client when roaming from one controller to another?A . Enable IGMPv3 on the central Layer 3 switch.B . Enable IGMP snooping on the WLCC ....
Which type of multicast routing should be implemented?
An engineer is configuring multicast for wireless for an all-company video meeting on a network using EIGRP and BGP within a single domain from a single source. Which type of multicast routing should be implemented?A . Protocol Independent Multicast Dense ModeB . Source Specific MulticastC . Multicast Source Discovery ProtocolD...
Which feature meets these requirements?
An engineer must implement Cisco Identity-Based Networking Services at a remote site using ISE to dynamically assign groups of users to specific IP subnets. If the subnet assigned to a client is available at the remote site, then traffic must be offloaded locally, and subnets are unavailable at the remote...