Labour Day Special Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

Cisco 300-430 Implementing Cisco Enterprise Wireless Networks (ENWLSI) Exam Practice Test

Page: 1 / 22
Total 216 questions

Implementing Cisco Enterprise Wireless Networks (ENWLSI) Questions and Answers

Question 1

An engineer just added a new MSE to Cisco Prime Infrastructure and wants to synchronize the MSE with the Cisco 5520 WLC, located behind a firewall in a DMZ. It is noticed that NMSP messages are failing between the two devices. Which traffic must be allowed on the firewall to ensure that the MSE and WLC are able to communicate using NMSP?

Options:

A.

TCP 1613

B.

UDP 16113

C.

UDP 1613

D.

TCP 16113

Question 2

An engineer has implemented 802.1x authentication on the wireless network utilizing the internal database of a RADIUS server. Some clients reported that they are unable to connect. After troubleshooting, it is found that PEAP authentication is failing. A debug showed the server is sending an Access- Reject message. Which action must be taken to resolve authentication?

Options:

A.

Use the user password that is configured on the server.

B.

Disable the server certificate to be validated on the client.

C.

Update the client certificate to match the user account.

D.

Replace the client certificates from the CA with the server certificate.

Question 3

When using a Cisco Catalyst 9800 Series Wireless Controller, which statement about AutoQoS is true?

Options:

A.

It has a set of predefined profiles that you cannot modify further

B.

It matches traffic and assigns each matched packet to QoS groups

C.

It automates deployment of wired QoS and makes wireless QoS implementation easier

D.

It allows the output policy map to put specific QoS queues into specific subgroups

Question 4

An engineer must control administrative access to the WLC using their Active Directory without being concerned about RBAC after the admin user is authenticated. Which two features does the engineer configure to accomplish this task? (Choose two.)

Options:

A.

Device Admin Policy Set

B.

User Access Mode: ReadWrite

C.

ACL

D.

RADIUS server

E.

TACACS server

Question 5

An engineer has configured Media Stream on the WLC and must guarantee at least 2 Mbps stream per user. Which RRC template should the engineer use?

Options:

A.

coarse

B.

medium

C.

low

D.

ordinary

Question 6

A wireless engineer needs to implement client tracking. Which method does the angle of arrival use to determine the location of a wireless device?

Options:

A.

received signal strength

B.

triangulation

C.

time distance of arrival

D.

angle of incidence

Question 7

A user is trying to connect to a wireless network that is configured for WPA2-Enterprise security using a corporate laptop. The CA certificate for the authentication server has been installed on the Trusted Root Certification Authorities store on the laptop. The user has been prompted to enter the credentials multiple times, but the authentication has not succeeded. What is causing the issue?

Options:

A.

There is an IEEE invalid 802.1X authentication policy on the authentication server.

B.

The user Active Directory account is locked out after several failed attempts.

C.

There is an invalid 802.1X authentication policy on the authenticator.

D.

The laptop has not received a valid IP address from the wireless controller.

Question 8

An engineer is configuring multicast for two WLCs. The controllers are in different physical locations and each handles around 500 wireless clients. How should the CAPWAP multicast group address be assigned during configuration?

Options:

A.

Each WLC must be assigned a unique multicast group address.

B.

Each WLC management address must be in the same multicast group.

C.

Both WLCs must be assigned the same multicast group address.

D.

Each WLC management address must be in a different multicast group.

Question 9

An engineer is using Cisco Prime Infrastructure reporting to monitor the state of security on the WLAN. Which output is produced when the Adaptive wIPS Top 10 AP report is run?

Options:

A.

last 10 wIPS events from monitor mode APs

B.

last 10 wIPS events from sniffer mode APs

C.

last of 10 sniffer mode APs with the most wIPS events

D.

last of 10 monitor mode APs with the most wIPS events

Question 10

An engineer is setting up a new unique NAD on a Cisco ISE.

Which two parameters must be configured? (Choose two.)

Options:

A.

device host name

B.

device password

C.

RADIUS fallback

D.

device IP address

E.

RADIUS shared secret

Question 11

A wireless engineer is configuring LWA using ISE. The customer is a startup company and requested the wireless users to authenticate against a directory, but LDAP is unavailable. Which solution should be proposed in order to have the same security and user experience?

Options:

A.

Use SAML.

B.

Use the internal database of the RADIUS server.

C.

Use a preshared key on the corporate WLAN.

D.

Use Novell eDirectory.

Question 12

An engineer must implement rogue containment for an SSID. What is the maximum number of APs that should be used for containment?

Options:

A.

1

B.

2

C.

3

D.

4

Question 13

What must be configured on the Global Configuration page of the WLC for an AP to use 802.1x to authenticate to the wired infrastructure?

Options:

A.

local access point credentials

B.

RADIUS shared secret

C.

TACACS server IP address

D.

supplicant credentials

Question 14

All APs are receiving multicast traffic, instead of only the APs that need it. What is the cause of this problem?

Options:

A.

The multicast group includes all APs

B.

The wrong multicast address was used

C.

The multicast group is assigned the wrong VLAN

D.

Multicast IGMP snooping is not enabled

Question 15

An engineer must track guest traffic flow using the WLAN infrastructure. Which Cisco CMX feature must be configured and used to accomplish this tracking?

Options:

A.

analytics

B.

connect and engage

C.

presence

D.

detect and locate

Question 16

An IT department receives a report of a stolen laptop and has information on the MAC address of the laptop. Which two settings must be set on the wireless infrastructure to determine its location? (Choose two.)

Options:

A.

Location History for Clients must be enabled on the MSE.

B.

Client location tracking must be enabled on the MSE.

C.

Location History for Visitors must be enabled on the MSE.

D.

Location History for Rogue APs & Rogue Clients must be enabled on the MSE.

E.

Tracking optimization must be enabled on the WLC.

Question 17

Refer to the exhibit.

Question # 17

A network administrator deploys the DHCP profiler service in two ISE servers: 10.3.10.101 and 10.3.10.102. All BYOD devices connecting to WLAN on VLAN63 have been incorrectly profiled and are assigned as unknown profiled endpoints. Which action efficiently rectifies the issue according to Cisco recommendations?

Options:

A.

Nothing needed to be added on the Cisco WLC or VLAN interface. The ISE configuration must be fixed.

B.

Disable DHCP proxy on the Cisco WLC.

C.

Disable DHCP proxy on the Cisco WLC and run the ip helper-address command under the VLAN interface to point to DHCP and the two ISE servers.

D.

Keep DHCP proxy enabled on the Cisco WLC and define helper-address under the VLAN interface to point to the two ISE servers.

Question 18

Which CLI command do you use to shut down the 2.4 GHz radio of the Floor1_AP1 AP on a Cisco 3850 Switch?

Options:

A.

ap name Floor1_AP1 dot11 shutdown 24ghz

B.

ap name Floor1_AP1 dot11 5ghz shutdown

C.

ap name Floor1 AP1 dot11 24ghz shutdown

D.

ap name Floor1_AP1 shutdown dot11 24ghz

Question 19

An engineer has configured passive fallback mode for RADIUS with default timer settings. What will occur when the primary RADIUS fails then recovers?

Options:

A.

RADIUS requests will be sent to the secondary RADIUS server until the secondary fails to respond.

B.

The controller will immediately revert back after it receives a RADIUS probe from the primary server.

C.

After the inactive time expires the controller will send RADIUS to the primary.

D.

Once RADIUS probe messages determine the primary controller is active the controller will revert back to the primary RADIUS.

Question 20

Refer to the exhibit.

Question # 20

Which COS to DSCP map must be modified to ensure that voice traffic is tagged correctly as it traverses the network?

Options:

A.

COS of 6 to DSCP 46

B.

COS of 3 to DSCP 26

C.

COS of 7 to DSCP 48

D.

COS of 5 to DSCP 46

Question 21

What is the difference between PIM sparse mode and PIM dense mode?

Options:

A.

Sparse mode supports only one switch. Dense mode supports multiswitch networks.

B.

Sparse mode floods. Dense mode uses distribution trees.

C.

Sparse mode uses distribution trees. Dense mode floods.

D.

Sparse mode supports multiswitch networks. Dense mode supports only one switch.

Question 22

A corporation has recently implemented a BYOD policy at their HQ. Which two risks should the security director be concerned about? (Choose two.)

Options:

A.

network analyzers

B.

malware

C.

lost and stolen devices

D.

keyloggers

E.

unauthorized users

Question 23

An engineer set up a VoWLAN with QoS on the WLC and a class map on the switch, but the markings are not being preserved correctly in the end-to- end traffic flow. Which two configurations on the wired network ensure end-to-end QoS? (Choose two.)

Options:

A.

trust boundaries

B.

access lists

C.

policy maps

D.

QoS licenses

E.

NetFlow

Question 24

Which QoS level is recommended for guest services?

Options:

A.

gold

B.

bronze

C.

platinum

D.

silver

Question 25

Where is a Cisco OEAP enabled on a Cisco Catalyst 9800 Series Wireless Controller?

Options:

A.

RF Profile

B.

Flex Profile

C.

Policy Profile

D.

AP Join Profile

Question 26

After looking in the logs, an engineer notices that RRM keeps changing the channels for non-IEEE 802.11 interferers. After surveying the area, it has been decided that RRM should not change the channel. Which feature must be enabled to ignore non-802.11 interference?

Options:

A.

Avoid Cisco AP Load

B.

Avoid Non-802.11 Noise

C.

Avoid Persistent Non-WiFi Interference

D.

Avoid Foreign AP Interference

Question 27

Refer to the exhibit.

Question # 27

An engineer must provide a position of rogue APs on a floor map using Cisco PI 3.0, but no rogue AP options are showing on the left-hand navigation menu under Maps. What is the reason for this omission?

Options:

A.

An assurance license is not installed.

B.

The controller operational status background task is disabled.

C.

The Show Detected Interferers feature under the AP option is disabled.

D.

Cisco MSE has not been added to Cisco PI.

Question 28

What is the default NMSP echo interval between Cisco MSE and a Wireless LAN Controller?

Options:

A.

10 seconds

B.

15 seconds

C.

30 seconds

D.

60 seconds

Question 29

Refer to the exhibit.

Question # 29

An engineer implemented the CPU ACL on your Cisco 5520 Series Wireless LAN Controller, and the controller is no longer manageable via the network. What must be changes on this CPU ACL to enable it to manage the controller again?

Options:

A.

Permit statements must be added to the top of the ACL in both directions, which specify the network to be managed from and the virtual interface of the controller.

B.

Line 1 must be set to a destination port of HTTP.

C.

Permit statements must be added to the top of the ACL, which specify the network to be managed from.

D.

Line 1 must be set to the inbound direction.

Question 30

An engineer must configure Cisco OEAPs for three executives. As soon as the NAT address is configured on the management interface, it is noticed that the WLC is not responding for APs that are trying to associate to the internal IP management address. Which command should be used to reconcile this?

Options:

A.

config flexconnect office-extend nat-ip-only disable

B.

config network ap-discovery nap-ip-only enable

C.

config flexconnect office-extend nat-ip-only enable

D.

config network ap-discovery nat-ip-only disable

Question 31

An engineer must use Cisco AVC on a Cisco WLC to prioritize Cisco IP cameras that use the wireless network. Which element do you configure in a rule?

Options:

A.

permit-ACL

B.

WMM required

C.

mark

D.

rate-limit

Question 32

An engineer is configuring multicast for wireless for an all-company video meeting on a network using EIGRP and BGP within a single domain from a single source. Which type of multicast routing should be implemented?

Options:

A.

Protocol Independent Multicast Dense Mode

B.

Source Specific Multicast

C.

Multicast Source Discovery Protocol

D.

Protocol Independent Multicast Sparse Mode

Page: 1 / 22
Total 216 questions