Which statement about the VideoStream/Multicast Direct feature is true?

Which statement about the VideoStream/Multicast Direct feature is true?A . IP multicast traffic is reliable over WLAN by default as defined by the IEEE 802.11 wireless multicast delivery mechanism.B . Each VideoStream client acknowledges receiving a video IP multicast stream.C . It converts the unicast frame to a multicast frame...

September 17, 2021 No Comments READ MORE +

Which feature meets these requirements?

An engineer must implement Cisco Identity-Based Networking Services at a remote site using ISE to dynamically assign groups of users to specific IP subnets. If the subnet assigned to a client is available at the remote site, then traffic must be offloaded locally, and subnets are unavailable at the remote...

September 17, 2021 No Comments READ MORE +

Where is a Cisco OEAP enabled on a Cisco Catalyst 9800 Series Wireless Controller?

Where is a Cisco OEAP enabled on a Cisco Catalyst 9800 Series Wireless Controller?A . RF ProfileB . Flex ProfileC . Policy ProfileD . AP Join ProfileView AnswerAnswer: B Explanation: https://www.cisco.com/c/en/us/td/docs/wireless/controller/9800/configguide/b_wl_16_10_cg/flexconnect.html

September 17, 2021 No Comments READ MORE +

Which protocol do you recommend to achieve these goals?

An IT team is growing quickly and needs a solution for management device access. The solution must authenticate users from an external repository instead of the current local on the WLC, and it must also identify the user and determine what level of access users should have. Which protocol do...

September 17, 2021 No Comments READ MORE +

Which type of multicast routing should be implemented?

An engineer is configuring multicast for wireless for an all-company video meeting on a network using EIGRP and BGP within a single domain from a single source. Which type of multicast routing should be implemented?A . Protocol Independent Multicast Dense ModeB . Source Specific MulticastC . Multicast Source Discovery ProtocolD...

September 16, 2021 No Comments READ MORE +

Which two events are outcomes of a successful RF jamming attack? (Choose two.)

Which two events are outcomes of a successful RF jamming attack? (Choose two.)A . disruption of WLAN servicesB . unauthentication associationC . deauthentication broadcastD . deauthentication multicastE . physical damage to AP hardwareView AnswerAnswer: A,E Explanation: https://www.cisco.com/c/en/us/td/docs/wireless/mse/3350/72/wIPS_Configuration/Guide/wIPS_72/msecg_appA_wIPS.html#wp1345929

September 16, 2021 No Comments READ MORE +

Which Cisco CMX feature must be configured and used to accomplish this tracking?

An engineer must track guest traffic flow using the WLAN infrastructure. Which Cisco CMX feature must be configured and used to accomplish this tracking?A . analyticsB . connect and engageC . presenceD . detect and locate.View AnswerAnswer: D

September 16, 2021 No Comments READ MORE +

Based on the local EAP debug controller provided, why is the client unable to connect?

Refer to the exhibit. An engineer deployed a Cisco WLC using local EAP. Users who are configured for EAP-PEAP cannot connect to the network. Based on the local EAP debug controller provided, why is the client unable to connect?A . The client is falling to accept certificate.B . The Cisco...

September 15, 2021 No Comments READ MORE +

During the EAP process and specifically related to the client authentication session, which encrypted key is sent from the RADIUS server to the access point?

During the EAP process and specifically related to the client authentication session, which encrypted key is sent from the RADIUS server to the access point?A . WPA keyB . session keyC . encryption keyD . shared-secret keyView AnswerAnswer: B

September 15, 2021 No Comments READ MORE +

Which configured is applied to prevent the network from a Layer 2 flooding of multicast frames with a seamless transfer of multicast data to the client when roaming from one controller to another?

Which configured is applied to prevent the network from a Layer 2 flooding of multicast frames with a seamless transfer of multicast data to the client when roaming from one controller to another?A . Enable IGMPv3 on the central Layer 3 switch.B . Enable IGMP snooping on the WLCC ....

September 14, 2021 No Comments READ MORE +