Winter Special Sale - Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 575363r9

Welcome To DumpsPedia

300-430 Sample Questions Answers

Questions 4

Refer to the exhibit.

Which two items must be supported on the VoWLAN phones to take full advantage of this WLAN configuration? (Choose two.)

Options:

A.

TSPEC

B.

SIFS

C.

802.11e

D.

WMM

E.

APSD

Buy Now
Questions 5

An engineer is configuring location services within Cisco Spaces (formerly Cisco DNA Spaces). The solution must track interfering devices. Which component of Cisco Spaces must be configured?

Options:

A.

Proximity Reporting

B.

Detect and Locate

C.

Cisco DNA Spaces SDK

D.

Location Analytics

Buy Now
Questions 6

Which two events are outcomes of a successful RF jamming attack? (Choose two.)

Options:

A.

disruption of WLAN services

B.

unauthentication association

C.

deauthentication broadcast

D.

deauthentication multicast

E.

physical damage to AP hardware

Buy Now
Questions 7

A network engineer must get an autonomous AP to authenticate to the upstream switch via IEEE 802.1 X. Drag and drop the commands from the left onto the right to complete the configuration.

Options:

Buy Now
Questions 8

An engineer is in the process of implementing Fastiane on a wireless network with a Mobility Express AP installed and Apple end-user devices. Due to a security concern, the IT department has updated all the iPads to version 14.5.423551943. Which QoS profile must the engineer configure on the user WLAN?

Options:

A.

Platinum

B.

Best Effort

C.

Bronze

D.

Silver

Buy Now
Questions 9

An engineer must configure a Cisco WLC to support Cisco Aironet 600 Series OfficeExtend APs. Which two Layer 2 security options are supported in this environment? (Choose two.)

Options:

A.

Static WEP + 802.1X

B.

WPA+WPA2

C.

Static WEP

D.

CKIP

E.

802.1X

Buy Now
Questions 10

An engineer is deploying a virtual MSE. The network has 3000 APs and needs 7000 IPS licenses.

To which size server does the engineer scale it?

Options:

A.

virtual

B.

standard

C.

high end

D.

low end

Buy Now
Questions 11

WPA2 Enterprise with 802.1X is being used for clients to authenticate to a wireless network through a Cisco ISE server. For security reasons, the network engineer wants to ensure that only PEAP authentication is used. The engineer sent instructions to clients on how to configure the supplicants, but the ISE logs still show users authenticating using EAP-FAST. Which action ensures that access to the network is restricted for these users unless the correct authentication mechanism is configured?

Options:

A.

Enable AAA override on the SSID, gather the usernames of these users, and disable the RADIUS accounts until the devices are correctly configured.

B.

Enable AAA override on the SSID and configure an ACL on the WLC that allows access to users with IP addresses from a specific subnet.

C.

Enable AAA override on the SSID and configure an access policy in Cisco ISE that denies access to the list of MACs that have used EAP-FAST.

D.

Enable AAA override on the SSID and configure an access policy in Cisco ISE that allows access only when the EAP authentication method is PEAP.

Buy Now
Questions 12

An engineer must configure MSE to provide guests access using social media authentication. Which service does the engineer configure so that guests use Facebook credentials to authenticate?

Options:

A.

Social Connect

B.

Client Connect

C.

Visitor Connect

D.

Guest Connect

Buy Now
Questions 13

After looking in the logs, an engineer notices that RRM keeps changing the channels for non-IEEE 802.11 interferers. After surveying the area, it has been decided that RRM should not change the channel. Which feature must be enabled to ignore non-802.11 interference?

Options:

A.

Avoid Cisco AP Load

B.

Avoid Non-802.11 Noise

C.

Avoid Persistent Non-WiFi Interference

D.

Avoid Foreign AP Interference

Buy Now
Questions 14

A network engineer must segregate all IPads on the guest WLAN to a separate VLAN. How does the engineer accomplish this task without using Cisco

ISE?

Options:

A.

Create a local policy on the WLC.

B.

Use 802.1x authentication to profile the devices.

C.

Use an mDNS profile for the iPad device.

D.

Enable RADIUS DHCP profiling on the WLAN.

Buy Now
Questions 15

An engineer just added a new MSE to Cisco Prime Infrastructure and wants to synchronize the MSE with the Cisco 5520 WLC, located behind a firewall in a DMZ. It is noticed that NMSP messages are failing between the two devices. Which traffic must be allowed on the firewall to ensure that the MSE and WLC are able to communicate using NMSP?

Options:

A.

TCP 1613

B.

UDP 16113

C.

UDP 1613

D.

TCP 16113

Buy Now
Questions 16

A multitenant building contains known wireless networks in most of the suites. Rogues must be classified in the WLC. How are the competing wireless APs classified?

Options:

A.

adhoc

B.

friendly

C.

malicious

D.

unclassified

Buy Now
Questions 17

A wireless network has two RF groups where Cisco WLCs are joined. APs are associated with different controllers using the round-robin approach. Rogue containment must be deployed v\ all controllers, but the network must not be affected by any RRM neighbor packets sent by friendly APs. Which AP authentication protection type must be enabled?

Options:

A.

AP Security

B.

AP Authentication

C.

AP Wireless Protection Rules

D.

AP Access Control

Buy Now
Questions 18

A company is collecting the requirements for an on-premises event. During the event, a wireless client connected to a dedicated WLAN will run a video application that will need on average 391595179 bits per second to function properly. What is the QoS marking that needs to be applied to that WLAN?

Options:

A.

Platinum

B.

Gold

C.

Silver

D.

Bronze

Buy Now
Questions 19

A wireless network engineer must present a list of all rogue APs with a high severity score to senior management. Which report must be created in Cisco Prime Infrastructure to provide this information?

Options:

A.

Rogue AP Count Summary

B.

New Rogue APs

C.

Rogue AP Events

D.

Rogue APs

Buy Now
Questions 20

A Cisco WLC has been added to the network and Cisco ISE as a network device, but authentication is failing. Which configuration within the network device configuration should be verified?

Options:

A.

SNMP RO community

B.

device interface credentials

C.

device ID

D.

shared secret

Buy Now
Questions 21

An engineer must use Cisco AVC on a Cisco WLC to prioritize Cisco IP cameras that use the wireless network. Which element do you configure in a rule?

Options:

A.

permit-ACL

B.

WMM required

C.

mark

D.

rate-limit

Buy Now
Questions 22

A customer wants to allow employees to easily onboard their personal devices to the wireless network. The visitors also must be able to connect to the same network without the need to engage with anyone from the reception desk. Which process must be configured on Cisco ISE to support this requirement?

Options:

A.

MAC authentication bypass

B.

native supplicant provisioning

C.

local web auth

D.

self-registration guest portal

Buy Now
Questions 23

An engineer is responsible for a wireless network for an enterprise. The enterprise has distributed offices around the globe, and all APs are configured in FlexConnect mode. The network must be configured to support 802.11r and CCKM. What needs to be implemented to accomplish this goal?

Options:

A.

Enable VLAN-based central switching.

B.

Enable FlexConnect local authentication.

C.

Enable FlexConnect local switching.

D.

Create FlexConnect groups.

Buy Now
Questions 24

An engineer has implemented advanced location services for a retail wireless deployment. The marketing department wants to collect user demographic information in exchange for guest WLAN access and to have a customized portal per location hosted by the provider. Which social connector must be tied into Cisco CMX to provide this service?

Options:

A.

Gmail

B.

Google+

C.

Facebook

D.

MySpace

Buy Now
Questions 25

A wireless engineer is configuring LWA using ISE. The customer is a startup company and requested the wireless users to authenticate against a directory, but LDAP is unavailable. Which solution should be proposed in order to have the same security and user experience?

Options:

A.

Use SAML.

B.

Use the internal database of the RADIUS server.

C.

Use a preshared key on the corporate WLAN.

D.

Use Novell eDirectory.

Buy Now
Questions 26

Which two configurations are applied on the WLC to enable multicast, check multicast stream subscriptions, and stream content only to subscribed clients? (Choose two)

Options:

A.

Enable IGMP snooping

B.

Set the IGMP timeout to 180 seconds

C.

Enable broadcast forwarding

D.

Enable 802.3x flow control mode.

E.

Set the AP multicast to 238.255.255.255

Buy Now
Questions 27

An engineer must run a Client Traffic Stream Metrics report in Cisco Prime Infrastructure. Which task must be run before the report?

Options:

A.

scheduled report

B.

radio performance

C.

client status

D.

software

Buy Now
Questions 28

What is characteristic of Multicast mode that affects the wireless network when configured on a Cisco WLC?

Options:

A.

Packet replication is performed on the controller

B.

The controller sends every multicast packet associated APs

C.

Packet replication is performed on the network

D.

The controller sends multicast packets to a user group.

Buy Now
Questions 29

Which two steps are needed to complete integration of the MSE to Cisco Prime Infrastructure to track the location of clients/rogues on maps? (Choose two.)

Options:

A.

Synchronize access points with the MSE.

B.

Add the MSE to Cisco Prime Infrastructure using the CLI credentials.

C.

Add the MSE to Cisco Prime Infrastructure using the Cisco Prime Infrastructure communication credentials.

D.

Apply a valid license for Wireless Intrusion Prevention System.

E.

Apply a valid license for location tracking.

Buy Now
Questions 30

An engineer is following the proper upgrade path to upgrade a Cisco AireOS WLC from version 7.3 to 8.9. Which two ACLs for Cisco CWA must be configured when upgrading from the specified codes? (Choose two.)

Options:

A.

Permit 0.0.0.0 0.0.0.0 any DNS any

B.

Permit 0.0.0.0 0.0.0.0 UDP DNS any

C.

Permit 0.0.0.0 0.0.0.0 UDP any DNS

D.

Permit any any any

E.

Permit 0.0.0.0 0.0.0.0 UDP any any

Buy Now
Questions 31

An engineer has configured Media Stream on the WLC and must guarantee at least 2 Mbps stream per user. Which RRC template should the engineer use?

Options:

A.

coarse

B.

medium

C.

low

D.

ordinary

Buy Now
Questions 32

Refer to the exhibit.

A network administrator deploys the DHCP profiler service in two ISE servers: 10.3.10.101 and 10.3.10.102. All BYOD devices connecting to WLAN on VLAN63 have been incorrectly profiled and are assigned as unknown profiled endpoints. Which action efficiently rectifies the issue according to Cisco recommendations?

Options:

A.

Nothing needed to be added on the Cisco WLC or VLAN interface. The ISE configuration must be fixed.

B.

Disable DHCP proxy on the Cisco WLC.

C.

Disable DHCP proxy on the Cisco WLC and run the ip helper-address command under the VLAN interface to point to DHCP and the two ISE servers.

D.

Keep DHCP proxy enabled on the Cisco WLC and define helper-address under the VLAN interface to point to the two ISE servers.

Buy Now
Questions 33

Refer to the exhibit. A network administrator must migrate a Cisco Catalyst 9800 WLC from local client profiling to RADIUS profiling through Cisco ISE. The engineer must enable RADIUS CoA based on detecting the client type as Windows to update the access policy based on profile detection immediately. Which CoA type configuration must the engineer apply on Cisco ISE?

Options:

A.

no CoA

B.

reauth

C.

port

D.

bounce

E.

preauth

Buy Now
Questions 34

CMX Facebook Wi-Fi allows access to the network before authentication. Which two elements are available? (Choose two.)

Options:

A.

Allow HTTP traffic only before authentication and block all the traffic.

B.

Allow all the traffic before authentication and intercept HTTPS only.

C.

Allow HTTPs traffic only before authentication and block all other traffic.

D.

Allow all the traffic before authentication and intercept HTTP only.

E.

Allow SNMP traffic only before authentication and block all the traffic.

Buy Now
Questions 35

An engineer needs to provision certificates on a Cisco Catalyst 9800 Series Wireless Controller. The customer uses a third-party CA server. Which protocol must be used between the controller and CA server to request and install certificates?

Options:

A.

SCEP

B.

TLS

C.

LDAP

D.

SSL

Buy Now
Questions 36

An engineer set up a VoWLAN with QoS on the WLC and a class map on the switch, but the markings are not being preserved correctly in the end-to- end traffic flow. Which two configurations on the wired network ensure end-to-end QoS? (Choose two.)

Options:

A.

trust boundaries

B.

access lists

C.

policy maps

D.

QoS licenses

E.

NetFlow

Buy Now
Questions 37

Which three characteristics of a rogue AP pose a high security risk? (Choose three.)

Options:

A.

open authentication

B.

high RSSI

C.

foreign SSID

D.

accepts clients

E.

low RSSI

F.

distant location

Buy Now
Questions 38

A healthcare organization notices many rogue APs and is concerned about a honeypot attack. Which configuration must a wireless network engineer perform in Cisco Prime Infrastructure to prevent these attacks most efficiently upon detection?

Options:

A.

Set the auto containment level to 0 and select the Using Our SSID containment option.

B.

Set the manual containment level to 4 and select the Ad Hoc Rogue AP containment option.

C.

Set the auto containment level to 0 and select the Ad Hoc Rogue AP containment option.

D.

Set the auto containment level to 4 and select the Using Our SSID containment option.

Buy Now
Questions 39

An IT team is growing quickly and needs a solution for management device access. The solution must authenticate users from an external repository instead of the current local on the WLC, and it must also identify the user and determine what level of access users should have. Which protocol do you recommend to achieve these goals?

Options:

A.

network policy server

B.

RADIUS

C.

TACACS+

D.

LDAP

Buy Now
Questions 40

The security policy mandates that only controller web management traffic is allowed from the IT subnet. In testing, an engineer is trying to connect to a WLAN with Web Authentication for guest users, but the page is timing out on the wireless client browser. What is the cause of the issue?

Options:

A.

The implemented CPU ACL on the controller is blocking HTTP/HTTPS traffic from the guest clients.

B.

Web Authentication Redirect is not supported with CPU ACLs.

C.

The DNS server that is configured on the controller is incorrect.

D.

Web Authentication Redirect is supported only with Internet Explorer, and the client is using Google Chrome.

Buy Now
Questions 41

A customer is experiencing performance issues with its wireless network and asks a wireless engineer to provide information about all sources of interference and their impacts to the wireless network over the past few days. Where can the requested information be accessed?

Options:

A.

CleanAir reports on Cisco Prime Infrastructure

B.

Performance reports on Cisco Prime Infrastructure

C.

Interference Devices reports on Cisco Wireless LAN Controller

D.

Air Quality reports on Cisco Wireless LAN Controller

Buy Now
Questions 42

You enter the command or a Cisco Catalyst 3850 Series Switch that runs Cisco ISO XE. What does the command do?

Options:

A.

It defines the user identity or the device identity to be validated by the RADIUS server.

B.

It captures information on the length of the authorized session, as well as the bandwidth usage of the client.

C.

It defines the RADIUS server used to track which sessions are still active.

D.

It defines the level of access of the user or the device.

Buy Now
Questions 43

An engineer is adding APs to an existing VolMLAN to allow for location based services. Which option will the primary change be to the network?

Options:

A.

increased transmit power on all APs

B.

moving to a bridging model

C.

AP footprint

D.

cell overlap would decrease

E.

triangulation of devices

Buy Now
Questions 44

An engineer must control administrative access to the WLC using their Active Directory without being concerned about RBAC after the admin user is authenticated. Which two features does the engineer configure to accomplish this task? (Choose two.)

Options:

A.

Device Admin Policy Set

B.

User Access Mode: ReadWrite

C.

ACL

D.

RADIUS server

E.

TACACS server

Buy Now
Questions 45

On a branch office deployment, it has been noted that if the FlexConnect AP is in standalone mode and loses connection to the WLC, all clients are disconnected, and the SSID is no longer advertised. Considering that FlexConnect local switching is enabled, which setting is causing this behavior?

Options:

A.

ISE NAC is enabled

B.

802.11r Fast Transition is enabled

C.

Client Exclusion is enabled

D.

FlexConnect Local Auth is disabled

Buy Now
Questions 46

An engineer must implement a BYOD policy with these requirements:

Onboarding unknown machines

Easily scalable

Low overhead on the wireless network

Which method satisfies these requirements?

Options:

A.

triple SSID

B.

single SSID

C.

open SSID

D.

dual SSID

Buy Now
Questions 47

Refer to the exhibit.

What is the reason that the wireless client cannot get the RUN state?

Options:

A.

It has no communication with Cisco ISE.

B.

An authentication error has occurred.

C.

It is not getting the IP address.

D.

Because of central switching, the AP must reach the Cisco ISE directly.

Buy Now
Questions 48

An enterprise started using WebEx as a virtual meeting solution. There is a concern that the existing wireless network will not be able to support the increased amount of traffic as a result of using WebEx. An engineer needs to remark the QoS value for this application to ensure high quality in meetings. What must be implemented to accomplish this task?

Options:

A.

QoS preferred call index

B.

UP to DSCP map

C.

AVC profiles

D.

WLAN quality of service profile

Buy Now
Questions 49

The CTO of an organization wants to ensure that all Android devices are placed into a separate VLAN on their wireless network. However, the CTO does not want to deploy ISE. Which feature must be implemented on the Cisco WLC?

Options:

A.

WLAN local policy

B.

RADIUS server overwrite interface

C.

AAA override

D.

custom AVC profile

Buy Now
Questions 50

After installing and configuring Cisco CMX, an administrator must change the NTP server on the Cisco CMX server. Which action accomplishes this task?

Options:

A.

Manually edit /etc/ntp.conf using an XML editor before restarting the server by using service restart all services.

B.

Log in to the Cisco CMX CLI and issue set ntp server NTP_IP where NTP_IP is the IP of the NTP server.

C.

Manually edit /etc/ntp.conf as the admin user before restarting ntpd by using service ntpd restart.

D.

Log in to the Cisco CMX GUI as the administrator and type the IP address of the NTP server in System tab > Settings> TimeZone/NTP.

Buy Now
Questions 51

An engineer must implement Cisco Identity-Based Networking Services at a remote site using ISE to dynamically assign groups of users to specific IP subnets. If the subnet assigned to a client is available at the remote site, then traffic must be offloaded locally, and subnets are unavailable at the remote site must be tunneled back to the WLC. Which feature meets these requirements?

Options:

A.

learn client IP address

B.

FlexConnect local authentication

C.

VLAN-based central switching

D.

central DHCP processing

Buy Now
Questions 52

An IT team is growing quickly and needs a solution for management device access. The solution must authenticate users from an external repository instead of the current local on the WLC, and it must also identify the user and determine what level of access users should have. Which protocol do you recommend to achieve these goals?

Options:

A.

network policy server

B.

RADIUS

C.

TACACS+

D.

LDAP

Buy Now
Questions 53

An IT administrator is managing a wireless network in which most devices are Apple iOS. A QoS issue must be addressed on the WLANs. Which configuration must be performed?

Options:

A.

Enable Fastlane globally under Wireless > Access Points > Global Configuration.

B.

Create a new AVC Profile named AUTOQOS-AVC-PROFILE and apply to all WLANs.

C.

Enable Fastlane under each WLAN setting.

D.

Enable WMM TSPEC/TCLAS negotiation under Wireless > Advanced.

Buy Now
Questions 54

An engineer is setting up a new unique NAD on a Cisco ISE.

Which two parameters must be configured? (Choose two.)

Options:

A.

device host name

B.

device password

C.

RADIUS fallback

D.

device IP address

E.

RADIUS shared secret

Buy Now
Questions 55

Refer to the exhibit.

A customer has implemented Cisco FlexConnect deployments with different WLANs around the globe and is opening a new branch in a different location. The engineer’s task is to execute all the wireless configuration and to suggest how to configure the switch ports for new APs. Which configuration must the switching team use on the switch port?

Options:

A.

trunk mode

B.

access mode

C.

single VLAN

D.

multiple VLAN

Buy Now
Questions 56

An engineer is configuring an autonomous AP to allow 802.1X authentication for users. The policy on the RADIUS server only allows for EAP-TLS authentication. Which authentication method must the engineer select under the Client Authentication Settings for the SSID on the AP?

Options:

A.

Open

B.

Shared

C.

Web

D.

Network EAP

Buy Now
Questions 57

Refer to the exhibit.

An engineer is creating an ACL to restrict some traffic to the WLC CPU. Which selection must be made from the direction drop- down list?

Options:

A.

It must be Inbound because traffic goes to the WLC.

B.

Packet direction has no significance; it is always Any.

C.

It must be Outbound because it is traffic that is generated from the WLC.

D.

To have the complete list of options, the CPU ACL must be created only by the CLI.

Buy Now
Questions 58

Refer to the exhibit.

An engineer must restrict some subnets to have access to the WLC. When the CPU ACL function is enabled, no ACLs in the drop-down list are seen. What is the cause of the problem?

Options:

A.

The ACL does not have a rule that is specified to the Management interface.

B.

No ACLs have been created under the Access Control List tab.

C.

When the ACL is created, it must be specified that it is a CPU ACL.

D.

This configuration must be performed through the CLI and not though the web GUI.

Buy Now
Questions 59

What must be configured on the Global Configuration page of the WLC for an AP to use 802.1x to authenticate to the wired infrastructure?

Options:

A.

local access point credentials

B.

RADIUS shared secret

C.

TACACS server IP address

D.

supplicant credentials

Buy Now
Questions 60

Refer to the exhibit.

An engineer implemented the CPU ACL on your Cisco 5520 Series Wireless LAN Controller, and the controller is no longer manageable via the network. What must be changes on this CPU ACL to enable it to manage the controller again?

Options:

A.

Permit statements must be added to the top of the ACL in both directions, which specify the network to be managed from and the virtual interface of the controller.

B.

Line 1 must be set to a destination port of HTTP.

C.

Permit statements must be added to the top of the ACL, which specify the network to be managed from.

D.

Line 1 must be set to the inbound direction.

Buy Now
Questions 61

A company is concerned about unauthorized APs on their wired and wireless networks. The company implements a Cisco Catalyst Center (formerly DNA Center) solution. Which feature must be enabled?

Options:

A.

Rogue Management application package

B.

Neighbor Assisted Roaming

C.

Sniffer package

D.

Monitor Mode package

Buy Now
Questions 62

An engineer is implementing profiling for BYOD devices using Cisco ISE. When using a distributed model, which persona must the engineer configure with the profiling service?

Options:

A.

Device Admin Node

B.

Primary Admin Node

C.

Monitor Node

D.

Policy Services Node

Buy Now
Questions 63

An engineer configured a Cisco AireOS controller with two TACACS+ servers. The engineer notices that when the primary TACACS+ server fails, the WLC starts using the secondary server as expected, but the WLC does not use the primary server again until the secondary server fails or the controller is rebooted. Which cause of this issue is true?

Options:

A.

Fallback is enabled

B.

Fallback is disabled

C.

DNS query is disabled

D.

DNS query is enabled

Buy Now
Questions 64

An engineer is in the process of implementing Fastlane on a wireless network with a Mobility Express AP installed. The network must support voice and video applications for Apple devices. Due to a security concern, all iPhones are updated to version 14.5.432302546. Which QoS profile must the engineer configure on the user WLAN?

Options:

A.

Bronze

B.

Best Effort

C.

Silver

D.

Platinum

Buy Now
Questions 65

A corporation has a wireless network where all access points are configured in FlexConnect. The WLC has a Data WLAN and a VoWiFi WLAN implemented where centrally-switched SSID is configured for the APs. Which QoS configuration must be implemented for the wireless packets to maintain the marking across the wired and wireless network?

Options:

A.

Set QoS to Platinum.

B.

Enable CAC.

C.

Allow WMM.

D.

Trust DSCP.

Buy Now
Questions 66

An engineer must achieve the highest level of location accuracy possible for a new mobile application. Which technology must be implemented for this use case?

Options:

A.

Time Difference of Arrival

B.

Bluetooth Low Energy

C.

RSS lateration

D.

ToA lateration

Buy Now
Questions 67

The network management team in a large shopping center has detected numerous rogue APs from local coffee shops that are broadcasting SSIDs. All of these SSIDs have names starting with ATC (for example, ATC302, ATC011, and ATC566). A wireless network engineer must appropriately classify these SSIDs using the Rogue Rules feature. Drag and drop the options from the left onto the categories in which they must be used on the right. Not all options are used.

Options:

Buy Now
Questions 68

Refer to the exhibit.

An engineer must connect a fork lift via a WGB to a wireless network and must authenticate the WGB certificate against the RADIUS server. Which three steps are required for this configuration? (Choose three.)

Options:

A.

Configure the certificate, WLAN, and radio interface on WGB.

B.

Configure the certificate on the WLC.

C.

Configure WLAN to authenticate using ISE.

D.

Configure the access point with the root certificate from ISE.

E.

Configure WGB as a network device in ISE.

F.

Configure a policy on ISE to allow devices to connect that validate the certificate.

Buy Now
Questions 69

A healthcare organization notices many rogue APs and is concerned about a honeypot attack. Which configuration must a wireless network engineer perform in Cisco Prime Infrastructure to prevent these attacks most efficiently upon detection?

Options:

A.

Set the auto containment level to 0 and select the Using Our SSID containment option.

B.

Set the manual containment level to 4 and select the Ad Hoc Rogue AP containment option.

C.

Set the auto containment level to 0 and select the Ad Hoc Rogue AP containment option.

D.

Set the auto containment level to 4 and select the Using Our SSID containment option.

Buy Now
Questions 70

An engineer wants the wireless voice traffic class of service to be used to determine the queue order for packets received, and then have the differentiated services code point set to match when it is resent to another port on the switch. Which configuration is required in the network?

Options:

A.

Platinum QoS configured on the WLAN

B.

WMM set to required on the WLAN

C.

msl qos trust dscp configured on the controller switch port

D.

msl qos trust cos configured on the controller switch port

Buy Now
Questions 71

Company XYZ recently migrated from AireOS to IOS XE 9800 WLCs. The Internet bandwidth must be limited to 5 Mbps for each guest client as per the global standard. In which configuration on the Cisco Catalyst 9800 WLC must the QoS requirement be added?

Options:

A.

table map

B.

policy map

C.

service policy

D.

class map

Buy Now
Questions 72

A company wants to utilize the wireless network to push videos to wireless clients. An engineer has been hired to configure a Cisco WLC to notify users when it cannot provide a video stream while using the Multicast Direct Feature. Which settings must be enabled for this functionality?

Options:

A.

Session Announcement State

B.

Message of the Day

C.

SNMP Trap log

D.

Northbound Notification

Buy Now
Questions 73

An engineer completes the setup of a two-node Cisco ISE deployment for a guest portal. When testing the portal, the engineer notices that sometimes there is a certificate CN mismatch. Which certificate type helps resolve this issue?

Options:

A.

Public-Signed Root

B.

Public-Signed SAN

C.

Self-Signed Wildcard

D.

Self-Signed Standard

Buy Now
Questions 74

Refer to the exhibit.

An engineer must provide a position of rogue APs on a floor map using Cisco PI 3.0, but no rogue AP options are showing on the left-hand navigation menu under Maps. What is the reason for this omission?

Options:

A.

An assurance license is not installed.

B.

The controller operational status background task is disabled.

C.

The Show Detected Interferers feature under the AP option is disabled.

D.

Cisco MSE has not been added to Cisco PI.

Buy Now
Questions 75

When implementing self-registration for guest/BYOD devices, what happens when an employee tries to connect four devices to the network at the same time?

Options:

A.

The last device is removed and the newly added device is updated as active device.

B.

The registration is allowed, but only one device is connected at any given time.

C.

All devices are allowed on the network simultaneously.

D.

Purge time dictates how long a device is registered to the portal.

Buy Now
Questions 76

Which QoS level is recommended for guest services?

Options:

A.

gold

B.

bronze

C.

platinum

D.

silver

Buy Now
Questions 77

A customer managing a large network has implemented location services. Due to heavy load, it is needed to load balance the data coming through NMSP from the WLCs. Load must be spread between multiple CMX servers to help optimize the data flow for APs. Which configuration in CMX meets this requirement?

Options:

A.

cmxctl config feature flags nmsplb.cmx-ap-grouping true

B.

cmxctl config feature flags nmsplb.cmxgrouping true

C.

cmxctl config feature flags nmsplb.cmx-loadbalance true

D.

cmxctl config feature flags nmsplb.cmx-rssi-distribute true

Buy Now
Questions 78

An engineer is troubleshooting a Cisco CMX high-availability deployment and notices that the primary and backup Cisco CMX servers are both considered primary. Which command must the engineer run on the backup server?

Options:

A.

cmxha convert backup

B.

cmxha backup convert

C.

cmxha secondary convert

D.

cmxha convert secondary

Buy Now
Questions 79

An engineer is troubleshooting rogue access points that are showing up in Cisco Prime Infrastructure.

What is maximum number of APS the engineer can use to contain an identified rogue access point in the WLC?

Options:

A.

3

B.

4

C.

6

D.

5

Buy Now
Questions 80

Refer to the exhibit.

An engineer is creating an ACL to restrict some traffic to the WLC CPU. Which selection must be made from the direction drop- down list?

Options:

A.

It must be Inbound because traffic goes to the WLC.

B.

Packet direction has no significance; it is always Any.

C.

It must be Outbound because it is traffic that is generated from the WLC.

D.

To have the complete list of options, the CPU ACL must be created only by the CLI.

Buy Now
Questions 81

A company is deploying wireless PCs on forklifts within its new 10,000-square-foot(3048-square-rneter) facility.

The clients are configured for PEAP-MS-CHAPv2 with WPA TKIP. Users report that applications frequently drop when the clients roam between access points on the floor. A professional site survey was completed.

Which configuration change is recommended to improve the speed of client roaming?

Options:

A.

EAP-FAST

B.

EAP-TLS

C.

WPAAES

D.

WPA2AES

Buy Now
Questions 82

A network engineer created a new wireless network that will be used for guest access. The corporate network must utilize all rates. The guest network must use only lower rates instead of 802.11n data rates. To what must the WMM policy of the WLAN be set to accomplish this task?

Options:

A.

required

B.

allowed

C.

disabled

D.

mandatory

Buy Now
Questions 83

Which configuration is applied to prevent the network from a Layer 2 flooding of multicast frames with a seamless transfer of multicast data to the client when roaming from one controller to another?

Options:

A.

Enable IGMPv3 on the central Layer 3 switch.

B.

Enable IGMP snooping on the WLC.

C.

Enable multicast mode on the WLC.

D.

Create multicast groups on the central Layer 3 switch.

Buy Now
Exam Code: 300-430
Exam Name: Implementing Cisco Enterprise Wireless Networks (300-430 ENWLSI)
Last Update: Jan 21, 2026
Questions: 277
$70  $174.99
$54  $134.99
$46  $114.99
buy now 300-430