Cisco Wireless Controller Questions 3

Cisco Wireless Controller Questions 3

Assessment

Quiz

Information Technology (IT)

Professional Development

Medium

Created by

Everaldo Bispo

Used 10+ times

FREE Resource

Student preview

quiz-placeholder

69 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An engineer configures the wireless LAN controller to perform 802.1x user authentication. Which configuration must be enabled to ensure that client devices can connect to the wireless, even when WLC cannot communicate with the RADIUS?

pre-authentication

local EAP

authentication caching

Cisco Centralized Key Management

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An IT team is growing quickly and needs a solution for management device access. The solution must authenticate users from an external repository instead of the current local on the WLC, and it must also identify the user and determine what level of access users should have. Which protocol do you recommend to achieve these goals?

network policy server

RADIUS

TACACS+

LDAP

3.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Media Image

Refer to the exhibit. An engineer must connect a fork lift via a WGB to a wireless network and must authenticate the WGB certificate against the RADIUS server. Which three steps are required for this configuration? (Choose three.)

• A. Configure the certificate, WLAN, and radio interface on WGB.

• B. Configure the certificate on the WLC.

• C. Configure WLAN to authenticate using ISE.

• D. Configure the access point with the root certificate from ISE.

• F. Configure a policy on ISE to allow devices to connect that validate the certificate.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

During the EAP process and specifically related to the client authentication session, which encrypted key is sent from the RADIUS server to the access point?

WPA key

session key

encryption key

shared-secret key

5.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

A network is set up to support wired and wireless clients. Both types must authenticate using 802.1X before connecting to the network. Different types of client authentication must be separated on a Cisco ISE deployment. Which two configuration items achieve this task? (Choose two.)

A. device profiles

B. policy sets

C. separate networks

D. policy groups

E. policy results

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An engineer is troubleshooting a Cisco CMX high-availability deployment and notices that the primary and backup Cisco CMX servers are both considered primary. Which command must the engineer run on the backup server?

cmxha convert backup

cmxha backup convert

cmxha secondary convert

cmxha convert secondary

7.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

A network administrator managing a Cisco Catalyst 9800-80 WLC must place all iOS connected devices to the guest SSID on VLAN 101. The rest of the clients must connect on VLAN 102 distribute load across subnets. To achieve this configuration, the administrator configures a local policy on the WLC. Which two configurations are required? (Choose two.)

A. Assign a policy map under global security policy settings.

B. Add local profiling policy under global security policy settings.

C. Create a service template.

D. Allow HTTP and DHCP profiling under policy map.

E. Enable device classification on global wireless settings.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?