Which method does the angle of arrival use to determine the location of a wireless device?
A wireless engineer needs to implement client tracking. Which method does the angle of arrival use to determine the location of a wireless device?A . received signal strengthB . triangulationC . time distance of arrivalD . angle of incidenceView AnswerAnswer: D
Which two events are outcomes of a successful RF jamming attack? (Choose two.)
Which two events are outcomes of a successful RF jamming attack? (Choose two.)A . disruption of WLAN servicesB . unauthentication associationC . deauthentication broadcastD . deauthentication multicastE . physical damage to AP hardwareView AnswerAnswer: A,E Explanation: https://www.cisco.com/c/en/us/td/docs/wireless/mse/3350/72/wIPS_Configuration/Guide/wIPS_72/msecg_appA_wIPS.html#wp1345929
Which configuration is needed to complete this task?
An engineer wants to configure WebEx to adjust the precedence and override the QoS profile on the WLAN. Which configuration is needed to complete this task?A . Change the WLAN reserved bandwidth for WebExB . Create an AVC profile for WebExC . Create an ACL for WebExD . Change the...
Which cause of this issue is true?
An engineer configured a Cisco AireOS controller with two TACACS+ servers. The engineer notices that when the primary TACACS+ server fails, the WLC starts using the secondary server as expected, but the WLC does not use the primary server again until the secondary server fails or the controller is rebooted....
What is the resulting ACL when a Human Resources user connects?
An engineer is implementing Cisco Identity-Based Networking on a Cisco AireOS controller. The engineer has two ACLs on the controller. The first ACL, named BASE_ACL, is applied to the corporate_clients interface on the WLC, which is used for all corporate clients. The second ACL, named HR_ACL, is referenced by ISE...
Which configuration must be enabled to ensure that client devices can connect to the wireless, even when WLC cannot communicate with the RADIUS?
An engineer configures the wireless LAN controller to perform 802.1x user authentication. Which configuration must be enabled to ensure that client devices can connect to the wireless, even when WLC cannot communicate with the RADIUS?A . pre-authenticationB . local EAPC . authentication cachingD . Cisco Centralized Key ManagementView AnswerAnswer: B
Which protocol do you recommend to achieve these goals?
An IT team is growing quickly and needs a solution for management device access. The solution must authenticate users from an external repository instead of the current local on the WLC, and it must also identify the user and determine what level of access users should have. Which protocol do...
Which two protocols are used to communicate between the Cisco MSE and the Cisco Prime Infrastructure network management software? (Choose two.)
Which two protocols are used to communicate between the Cisco MSE and the Cisco Prime Infrastructure network management software? (Choose two.)A . HTTPSB . TelnetC . SOAPD . SSHE . NMSPView AnswerAnswer: A, C Explanation: https://www.cisco.com/c/en/us/td/docs/net_mgmt/prime/infrastructure/33/user/guide/bk_CiscoPrimeInfrastructure_3_3_0_UserGuide/bk_CiscoPrimeInfrastructure_3_3_0_UserGuide_chapter_0100110.html
What is an important consideration when implementing a dual SSID design for BYOD?
What is an important consideration when implementing a dual SSID design for BYOD?A . After using the provisioning SSID, an ACL that used to make the client switch SSIDs forces the user to associate and traverse the network by MAC filtering.B . If multiple WLCs are used, the WLAN IDs...
Which statement about the VideoStream/Multicast Direct feature is true?
Which statement about the VideoStream/Multicast Direct feature is true?A . IP multicast traffic is reliable over WLAN by default as defined by the IEEE 802.11 wireless multicast delivery mechanism.B . Each VideoStream client acknowledges receiving a video IP multicast stream.C . It converts the unicast frame to a multicast frame...