Search Header Logo

Cisco Wireless Controller Questions 3

Authored by Everaldo Bispo

Information Technology (IT)

Professional Development

Used 10+ times

Cisco Wireless Controller Questions 3
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

69 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An engineer configures the wireless LAN controller to perform 802.1x user authentication. Which configuration must be enabled to ensure that client devices can connect to the wireless, even when WLC cannot communicate with the RADIUS?

pre-authentication

local EAP

authentication caching

Cisco Centralized Key Management

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An IT team is growing quickly and needs a solution for management device access. The solution must authenticate users from an external repository instead of the current local on the WLC, and it must also identify the user and determine what level of access users should have. Which protocol do you recommend to achieve these goals?

network policy server

RADIUS

TACACS+

LDAP

3.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Media Image

Refer to the exhibit. An engineer must connect a fork lift via a WGB to a wireless network and must authenticate the WGB certificate against the RADIUS server. Which three steps are required for this configuration? (Choose three.)

• A. Configure the certificate, WLAN, and radio interface on WGB.

• B. Configure the certificate on the WLC.

• C. Configure WLAN to authenticate using ISE.

• D. Configure the access point with the root certificate from ISE.

• F. Configure a policy on ISE to allow devices to connect that validate the certificate.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

During the EAP process and specifically related to the client authentication session, which encrypted key is sent from the RADIUS server to the access point?

WPA key

session key

encryption key

shared-secret key

5.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

A network is set up to support wired and wireless clients. Both types must authenticate using 802.1X before connecting to the network. Different types of client authentication must be separated on a Cisco ISE deployment. Which two configuration items achieve this task? (Choose two.)

A. device profiles

B. policy sets

C. separate networks

D. policy groups

E. policy results

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An engineer is troubleshooting a Cisco CMX high-availability deployment and notices that the primary and backup Cisco CMX servers are both considered primary. Which command must the engineer run on the backup server?

cmxha convert backup

cmxha backup convert

cmxha secondary convert

cmxha convert secondary

7.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

A network administrator managing a Cisco Catalyst 9800-80 WLC must place all iOS connected devices to the guest SSID on VLAN 101. The rest of the clients must connect on VLAN 102 distribute load across subnets. To achieve this configuration, the administrator configures a local policy on the WLC. Which two configurations are required? (Choose two.)

A. Assign a policy map under global security policy settings.

B. Add local profiling policy under global security policy settings.

C. Create a service template.

D. Allow HTTP and DHCP profiling under policy map.

E. Enable device classification on global wireless settings.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?