View: 688|Reply: 0

300-430

[Copy link]

0

Threads

0

Posts

0

Credits

Guest

Credits
0
Post time 30-6-2021 16:31:48 | Show all posts |Read mode
This post was last edited by ryukifaiz on June 30, 2021 at 00:42

I‘m preparing 300-430. I have some doubts about the following questions. Please give me some advice. thank you

An engineer configures a Cisco Aironet 600 SeriesOfficeExtend AP for a user who works remotely. What is configured on the CiscoWLC to allow the user to print a printer on his home network?
A. split tunneling
B. SE-connect
C. FlexConnect
D. AP failover priority
Answer: A / C?


Anengineer wants to configure WebEx to adjust the precedence and override the QoSprofile on the WLAN.
Whichconfiguration is needed to complete this task?
A.Change the WLAN reserved bandwidth for WebEx
B.Create an AVC profile for WebEx
C.Create an ACL for WebEx
D.Change the AVC application WebEx-app-sharing to mark
Answer: B / D?


Anengineer is configuring multicast for wireless for an all-company video meetingon a network using EIGRP and BGP
withina single domain from a single source.
Whichtype of multicast routing should be implemented?
A.Protocol Independent Multicast Dense Mode
B.Source Specific Multicast
C.Multicast Source Discovery Protocol
D.Protocol Independent Multicast Sparse Mode
Answer: D / B?

Forsecurity purposes, an engineer enables CPU ACL and chooses an ACL on theSecurity > AccessControl Lists >  CPU Access Control Lists menu.Whichkind of traffic does this change apply to, as soon as the change is made?A.wireless traffic only
B.wired traffic only
C.VPN traffic
D.wireless and wired traffic
Answer: D / A?


Whichtwo steps are needed to complete integration of the MSE to Cisco PrimeInfrastructure andbeable to track the location of clients/rogues on maps? ( Choose two.)
A.Synchronize access points with the MSE.
B.Add the MSE to Cisco Prime Infrastructure using the CLI credentials.
C.Add the MSE to Cisco Prime Infrastructure using the Cisco Prime Infrastructurecommunicationcredentials configured during set up.
D.Apply a valid license for Wireless Intrusion Prevention System.
E.Apply a valid license for location tracking.
Answer: CE?

Auser is trying to connect to a wireless network that is configured forWPA2-Enterprise securityusinga corporate laptop. The CA certificate for the authentication server has beeninstalled ontheTrusted Root Certification Authorities store on the laptop. The user has beenprompted toenterthe credentials multiple times,  but the authentication has not succeeded. What is causing the issue?
A.The user Active Directory account is locked out after several failed attempts.
B.There is an IEEE invalid 802.1X authentication policy on the authenticationserver.
C.There is an invalid 802.1X authentication policy on the authenticator.
D.The laptop has not received a valid IP address from the wireless controller.
A nswer:C /  B?

Referto the exhibit. An engineer is creating an ACL to restrict some traffic to theWLC CPU.Which selection must be made from the direction drop-downlist?
A.It must be Inbound because traffic goes to the WLC.
B.Packet direction has no significance;  it is always Any.
C.It must be Outbound because it is traffic that is generated from the WLC.
D.To have the complete list of options, the CPU ACL must be created only by theCLI.
Answer: B / A?

Whatis an important consideration when implementing a dual SSID design for BYOD?
A.After using the provisioning SSID, an ACL that used to make the client switchSSIDs forces the
user to associate and traverse the network by MAC filtering.
B.If multiple WLCs are used, the WLAN IDs must be exact for the clients to beprovisioned and
traversethe network correctly.
C.SSIDs for this setup must be configured with NAC State-RADIUS NAC for the clientsto
authenticatewith Cisco ISE, or with NAC State-ISE NAC for Cisco ISE to associate theclient.
D.One SSID is for provisioning and the other SSID is for gaining access to thenetwork. The use
ofan ACL should not be enforced to make the client connect to the REAL SSID after
provisioning.
Answer: A/ D?

Whenimplementing self-registration for guest/BYOD devices, what happens when anemployee tries to connect four
devicesto the network at the same time?
A.The last device is removed and the newly added device is updated as activedevice.
B.The registration is allowed, but only one device is connected at any giventime.
C.All devices are allowed on the network simultaneously.
D.Purge time dictates how long a device is registered to the portal.
Answer: B /A ?

Referto the exhibit. Which two items must be supported on the VoWLAN phones to takefull advantage of this WLAN
configuration? ( Choose two.)

A.TSPEC
B.SIFS
C.802.11e
D.WMM
E. APSD
Answer:AD / CD

Whichcomponent must be integrated with Cisco DNA Center to display the location of aclient that is experiencing
connectivityissues?
A.Cisco Hyperlocation Module
B.Wireless Intrusion Prevention System
C.Cisco Connected Mobile Experiences
D.Cisco Mobility Services Engine
Answer: C / A?


Whichtwo restrictions are in place with regards to configuring mDNS? ( Choose two.)A.mDNS uses only UDP port 5436 as a destination port.B.mDNS cannot use UDP port 5353 as the destination port.C. mDNS is not supported on FlexConnect APs with a locallyswitched WLAN.D. Controller software must be newer than 7.0.6+.E. mDNS is not supported over IPv6.Answer: CE?
Which two statements about the requirements for a CiscoHyperlocation deployment are true? ( Choose two.)
A. After enabling Cisco Hyperlocation on Cisco CMX, the APsand the wireless LAN controller
must be restarted.
B. NTP can be configured, but that is not recommended.
C. The Cisco Hyperlocation feature must be enabled on thewireless LAN controller and Cisco
CMX.
D. The Cisco Hyperlocation feature must be enabled only onthe wireless LAN controller.
E. If the Cisco CMX server is a VM, a high-end VM is neededfor Cisco Hyperlocation
deployments.
Answer: AC / CE?

An engineer wants the wireless voice traffic class of service tobe used to determine the queue order forpackets received, and then have the differentiated services codepoint set to match when it is resent toanother port on the switch. Which configuration is required in thenetwork?A. Platinum QoS configured on the WLANB. WMM set to required on the WLANC. msl qos trust dscp configured on the controller switch portD. msl qos trust cos configured on the controller switch portCorrect Answer: D/ C?
An engineer is implementing a FlexConnect group for access pointsat a remote location using local
switching but central DHCP. Which client feature becomes availableonly if this configuration is changed?
A. multicast
B. static IP
C. fast roaming
D. mDNS

Correct Answer: C / B?

What is the default IEEE 802.1x AP authentication configuration ona Cisco Catalyst 9800 Series Wireless
Controller?
A. EAP-PEAP with 802.1x port authentication
B. EAP-TLS with 802.1x port authentication
C. EAP-FAST with CAPWAP DTLS + port authentication
D. EAP-FAST with CAPWAP DTLS

Correct Answer: D /C ?

Anetwork engineer wants to implement QoS across the network that supportmultiple VLANs. All the Aps are
connectedto switch ports and are configured in local mode. Which trust model must beconfigured on the switch ports
towhich the Ap are connected?
A.CoS
B.IPP
C.WMM UP
D.DSCP
Answer: C / D?

Anengineer has successfully implemented 10 active RFID tags in an officeenvironment The tags are not visible when
thelocation accuracy is tested on the Cisco CMX Detect and Locate window. Whichsetting on Cisco CMX allows the
engineerto view the tags?
A.Enable hyper location services for RFID.
B.Enable RFID tags in tracking options
C.Enable probing clients for active tags.
D.Define an RFID group globally and add the tags.
Answer: C / B?

Anengineer has been hired to implement a way for users to stream video contentwithout having issues on the wireless
network.To accomplish this goal, the engineer must set up a reliable way for a MediaStream to work between Cisco
FlexConnect APs. Which feature must be enabled to guaranteedelivery?
A.Multicast-Unicast Direct
B.Multicast Direct
C.Unicast Direct
D.IGMP Direct
Answer: A / B?

Anenterprise started using WebEx as a virtual meeting solution. There is aconcern that the existing wireless network
willnot be able to support the increased amount of traffic as a result of usingWebEx. An engineering needs to remark
theQoS value for this application to ensure high quality in meetings. Which mustbe implemented to accomplish this
task?
A.WLAN quality of service profile
B.QoS preferred call index
C.AVC profiles
D. UP to DSCP map
Answer: C /D?

AnIT department receives a report of a stolen laptop and has information on theMAC address of the laptop. Which two
settingsmust be set on the wireless infrastructure to determine its location? ( Choosetwo )
A.Location History for Visitors must be enabled on the MSE.
B.Location History for Clients must be enabled on the MSE.
C.Location History for Rogue APs &  Rogue Clients must be enabled on the MSE.
D.Client location tracking must be enabled on the MSE.
E.Tracking optimization must be enabled on the WLC.
Answer:AB/ BE?


An engineer deployed aCisco WLC using local EAP.
Users who are configured for EAP-PEAP cannot connect to the network.
Based on the local EAP debug controller provided, why is the client unable toconnect?
A.  & nbsp;& nbsp;& nbsp; The client is fallingto accept certificat
B.  & nbsp;& nbsp;& nbsp; The Cisco WLC is  & nbsp;& nbsp;& nbsp; configured for the incorrect date
C.  & nbsp;& nbsp;& nbsp; The user is using invalid credentials.
Answer : A / C?

An engineer must trackguest traffic flow using the WLAN infrastructure.
Which Cisco CMX feature must be configured and used to accomplish this tracking?
A.  & nbsp;& nbsp;& nbsp; analytics
B.  & nbsp;  connect and engagewrong
C.  & nbsp; presence
D.  & nbsp; detectand locate.
Answer: C /D?

What must beconfigured on the Global Configuration page of the WLC for an access point touse 802.1x to authenticate to the wired infrastructure?
A.  & nbsp;& nbsp;& nbsp; supplicant credentials
B.  & nbsp;  RADIUSshared secret
C.  & nbsp; localaccess point credentials
D.  & nbsp; TACACSserver IP address.

Answer: B /A?

The security learn isconcerned about the access to all network devices, including the Cisco WLC. Topermit only the admin subnet to have access to management, a CPU ACL is createdand applied. However, guest users cannot get to the web portal.

What must be configured to permit only admins to have access?
A.     The guest portal mustbe configured on the CPU ACLs on the Cisco WL
B.    Accessto Cisco ISE must be allowed on the pre authentication AC
C.   Managementtraffic from the guest network must be configured on the ACL rules.
D.   Traffic toward the virtual interface must bepermitted.

Answer: D / B?

An engineertries to manage the rogues on the Cisco WLC. Based on the configuration, whichAP is
marked asmalicious by the controller?
A. rogue AP with SSlD admin seen for 4000seconds and heard at -60 dBm
B. rogue AP with SSID admin seen for 3000seconds and heard at -70 dBm
C. rogue AP with SSlD admin seen for 4000seconds and heard at -70 dBm
D. rogue AP with SSID admin seen for 3000seconds and heard at -60 dBm

Answer: A/D?

Whenimplementing self-registration for guest/BYOD devices, what happens when an
employeetries to connect four devices to the network at the same time?
A.Thelast device is removed and the newly added device is updated as active device.
B.Theregistration is allowed, but only one device is connected at any given time.
C.Alldevices are allowed on the network simultaneously.
D.Purgetime dictates how long a device is registered to the portal.

Answer:C/ B?






Reply

Use magic Report

You have to log in before you can reply Login | Register Now

Points Rules

Quick Reply Contact us with Skype Contact us with Whastsapp Contact us with Telegram To Top Return to the list