Pre-Summer Sale Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

Cisco 350-101 Implementing and Operating Cisco Wireless Core Technologies (350-101 WLCOR)v1.0 Exam Practice Test

Page: 1 / 10
Total 102 questions

Implementing and Operating Cisco Wireless Core Technologies (350-101 WLCOR)v1.0 Questions and Answers

Question 1

A university is deploying Cisco Catalyst 9176 APs at several satellite campuses, each with its own subnet and DNS services. The APs will be shipped with only their MAC addresses preregistered on the WLC. The satellite campuses do not use DHCP option 43, but they have access to a central DNS server. IT staff want APs to discover and join the Catalyst 9800 WLC automatically without site visits. Which solution must the IT staff implement?

Options:

A.

Assign static IP addresses to all 9176 APs and configure the controller to be the DNS server.

B.

Set up a multicast group on each different AP subnet to enable automatic controller discovery.

C.

Create DNS entrycisco-capwap-controller.localdomainthat resolves to the WLC management IP address.

D.

Configure a DNS recordap-discoverywith the controller virtual IP address.

Question 2

How does the optimized roaming function operate in a WLC implementation?

Options:

A.

It disassociates clients when the RSSI is lower than the set threshold.

B.

It is integrated with external services for client wireless experience.

C.

Device locations are determined through peer-to-peer beacons.

D.

Load balancing is statically defined for all locations.

Question 3

How does the optimized roaming function operate in a WLC implementation?

Options:

A.

It disassociates clients when the RSSI is lower than the set threshold.

B.

It is integrated with external services for client wireless experience.

C.

Device locations are determined through peer-to-peer beacons.

D.

Load balancing is statically defined for all locations.

Question 4

A network engineer must ensure that guest users connecting to a Cisco 9800 WLC are assigned IP addresses from a specific subnet that is separate from corporate users. The guest network must support at least 200 simultaneous connections and isolate traffic from internal devices. The DHCP server must allocate addresses only within the 10.20.30.0/24 subnet. Which action must the network engineer take to accomplish this task?

Options:

A.

Set up a unique policy tag on the guest WLAN and use a shared DHCP pool.

B.

Create a dedicated guest interface and map it to the guest policy profile for the guest WLAN.

C.

Assign a unique policy tag to the guest WLAN and use a shared DHCP pool with DHCP option 43.

D.

Use static IP address assignment for the guest WLAN interface and use ACLs for separation.

Question 5

Question # 5

Refer to the exhibit. A network engineer must create a PSK WLAN that will be anchored to the DMZ. After this WLAN is created, users cannot connect to it. Based on the output from the RA trace, which action must the engineer take to resolve the issue?

Options:

A.

Disable fast transition 802.11r on the WLAN.

B.

Configure matching passwords on the client and the WLAN.

C.

Remove the anchor WLC from the mobility group.

D.

Configure matching WLANs on the foreign and the anchor.

Question 6

What is a benefit of applying TACACS authentication for device access?

Options:

A.

static user grouping without role differentiation

B.

fragmented statistics across controllers and devices

C.

streamlined administrator access across platforms

D.

single user for device and network access

Question 7

What defines RSSI in radio signal measurements?

Options:

A.

Detected amplitude level at radio receiver

B.

Noise generated by interference

C.

QoS network packet marking method

D.

Wireless radio signal service ID

Question 8

Refer to the exhibit.

Question # 8

An engineer must configure wireless guest networking for a deployment at site A, which requires support for guest VLAN assignment and assignment for wlan guest-network 20. The controller will provide network segregation and restrict access to internal resources. Based on the configuration commands, which action meets the requirements?

Options:

A.

Establish a mesh bridge connection for the guest VLAN and assign logical interface for isolation.

B.

Create a policy profile for the guest VLAN and a policy tag to map the WLAN to the policy profile.

C.

Assign a policy tag to map the to WLAN and assign a physical interface for isolation.

D.

Implement the Spanning Tree Protocol and assign an AP group name.

Question 9

Which Cisco technology leverages machine learning methods and a cloud learning platform that helps to identify critical issues?

Options:

A.

Catalyst Center Assurance

B.

Network Services

C.

Catalyst Center LLM Insights

D.

AI Network Analytics

Question 10

Question # 10

Refer to the exhibit. An engineer must configure a wireless guest WLAN, which requires clients to use VLAN 10 for a deployment at site A. Based on the configuration commands shown, which additional configuration meets the requirements?

Options:

A.

wlan guest-ssid 4 guest-ssidaccess vlan 10no shutdown

B.

wlan guest-ssid 4 guest-ssidvlan 10no shutdown

C.

wlan policy profile guest-policyaccess vlan 10no shutdown

D.

wireless profile policy guest-policyvlan 10no shutdown

Question 11

Refer to the exhibit.

Question # 11 A wireless controller is deployed at a branch location to facilitate guest client connectivity. A network engineer configures one WLAN using Web authentication and activates web-based method to align with company security policies. Which configuration enables client authentication for this WLAN?

Options:

A.

security web-auth

B.

wlan webauth 2 webauth

C.

no security wpa wpa2

D.

no security wpa akm dot1x

Question 12

A network engineer has been tasked with migrating the management mode of a Cisco 9176 AP named "Cisco-AP053540555" in a large enterprise wireless deployment. The AP is currently managed by a Cisco Catalyst 9800 Series WLC, but the organization is transitioning to Meraki cloud management for centralized control and monitoring. To complete this migration, the engineer needs to change the AP's management mode to Meraki with force and noprompt to skip validations using the CLI on the wireless controller. What command must the engineer use?

Options:

A.

management meraki force noprompt mode

B.

ap management mode meraki force noprompt

C.

ap management meraki force noprompt mode

D.

management-mode meraki force noprompt

Question 13

What is a benefit of network adaptability in terms of improved operational outcomes when using AI-RRM in Cisco Catalyst Center?

Options:

A.

provisioning of static device addresses

B.

reduction of co-channel interference

C.

transmission of regular software update schedules

D.

categorization of users by authentication type

Question 14

A medium-sized enterprise must provide wireless internet to visitors in their lobby using a Cisco 9800 WLC. The solution must meet these requirements:

Ensure that guests cannot access the corporate LAN.

Guests are redirected to a login page before browsing.

The guest network must use a separate VLAN from internal users.

Access must be limited to web browsing only.

Guest access does not require any preshared keys or certificates.

Which two actions must be taken to achieve this solution? (Choose two.)

Options:

A.

Create a WLAN that uses a web policy and points to a consent parameter map.

B.

Apply a webauth WLAN with mDNS mode set to drop.

C.

Configure a policy profile that uses an external only ACL and guest VLAN.

D.

Implement a policy profile with p2p blocking enabled and a guest VLAN.

E.

Deploy a WLAN policy that points wireless users to a webauth parameter map.

Question 15

Refer to the exhibit.

Question # 15

An engineer must configure wireless guest networking for a deployment at site A, which requires support for guest VLAN assignment and assignment for wlan guest-network 20. The controller will provide network segregation and restrict access to internal resources. Based on the configuration commands, which action meets the requirements?

Options:

A.

Establish a mesh bridge connection for the guest VLAN and assign logical interface for isolation.

B.

Create a policy profile for the guest VLAN and a policy tag to map the WLAN to the policy profile.

C.

Assign a policy tag to map the to WLAN and assign a physical interface for isolation.

D.

Implement the Spanning Tree Protocol and assign an AP group name.

Question 16

Which process is managed by Ministry of Internal Affairs and Communications in Japan?

Options:

A.

RF technical standards

B.

manufacturing batch inspection

C.

customer onboarding documentation

D.

supplier chain evaluation

Question 17

Question # 17

A wireless controller is deployed at a branch location to facilitate secure client connectivity. A network engineer configures one WLAN using WPA2 Personal authentication and activates the preshared key method to align with company security policies. Which action must be taken to enable the client to connect to the WLAN?

Options:

A.

Enter the preshared key at the WLAN security configuration prompt

B.

Enable MAC filtering for security group assignment

C.

Configure Active Directory integration for WLAN authentication

D.

Import a client certificate for WPA2 authentication

Question 18

Which process is managed by Ministry of Internal Affairs and Communications in Japan?

Options:

A.

RF technical standards

B.

manufacturing batch inspection

C.

customer onboarding documentation

D.

supplier chain evaluation

Question 19

A hotel wants to provide guests with wireless connectivity via a captive portal using a Cisco 9800 WLC. The solution must meet these requirements:

• Ensure that guests are redirected to a custom web page for login and after authentication must have only internet access.

• The guest SSID must not require a password and must be visible to all clients.

• Network segmentation between staff and guests is required at the VLAN level.

What must the IT team configure on the WLAN?

Options:

A.

central web authentication with WPA2-PSK security and a DNS ACL assigned to the WLAN profile

B.

open authentication with a local web server for the guest WLAN

C.

PSK WLAN with VLAN override and enable mDNS for guest users

D.

central web authentication and assign a policy with ACLs restricting access to internal networks

Question 20

What does a low SNR value result in?

Options:

A.

Scheduling of firmware maintenance windows

B.

Activation of automatic failover features

C.

Improved channel reliability

D.

Decreased data integrity with possible errors

Question 21

A network administrator at a marketing company is deploying a Cisco Catalyst 9800 Series Wireless Controller running Cisco IOS XE 17.x. The corporate WLAN named XYZ-Guest supports visitor devices. To address intermittent connectivity issues due to client association limits and short session timeouts, the network administrator must optimize the WLAN to allow more client connections and extend session timeouts for the devices. The administrator must set the maximum number of clients for the XYZ-Guest WLAN to 50 and must set a session timeout to prevent frequent device disconnections. Which two commands must be configured on the controller? (Choose two.)

Options:

A.

wlan XYZ-Guest 1 XYZ-Guest client max-association 50

B.

wireless profile policy XYZ-Guest-Pol client session timeout 2800

C.

wlan XYZ-Guest 1 XYZ-Guest client session timeout 2800

D.

wireless profile policy XYZ-Guest-Pol session timeout 2800

E.

wlan XYZ-Guest 1 XYZ-Guest client association limit 50

Question 22

Question # 22

A network administrator is working on a Cisco Catalyst 9800 WLC running Cisco IOS XE Software to enable user access for staff smartphones using WPA2-Enterprise with RADIUS. The administrator verifies the external authentication configuration and plans to test network connectivity. Which configuration command must be added to the box in the code to configure the WLC to support authentication with an external server?

Options:

A.

security wpa enable

B.

security dot1x authentication-list rad-group

C.

security dot1x method-list rad-group

D.

security wpa wpa2 akm dot1x

Question 23

A hotel wants to provide guests with wireless connectivity via a captive portal using a Cisco 9800 WLC. The solution must meet these requirements:

• Ensure that guests are redirected to a custom web page for login and after authentication must have only internet access.

• The guest SSID must not require a password and must be visible to all clients.

• Network segmentation between staff and guests is required at the VLAN level.

What must the IT team configure on the WLAN?

Options:

A.

central web authentication with WPA2-PSK security and a DNS ACL assigned to the WLAN profile

B.

open authentication with a local web server for the guest WLAN

C.

PSK WLAN with VLAN override and enable mDNS for guest users

D.

central web authentication and assign a policy with ACLs restricting access to internal networks

Question 24

Question # 24

Refer to the exhibit. An engineer is configuring a switch port for a Cisco Spaces deployment at a new branch site. The Spaces connector requires access to the management VLAN 30. The network team plans to add more analytics services in the future, so the configuration must also allow for easy scalability and avoid service interruption for currently connected devices and default switch VLAN settings. Which set of commands must be added to the box in the CLI to complete the configuration?

Options:

A.

switchport mode accessswitchport access vlan 30

B.

switchport mode accessswitchport trunk allowed vlan 30switchport access native vlan

C.

switchport mode accessswitchport trunk allowed vlan 30switchport trunk native vlan none

D.

switchport mode trunkswitchport trunk allowed vlan 30

Question 25

Which role does a fabric edge node perform in a Cisco wireless fabric architecture?

Options:

A.

Authenticating TLS connections for management

B.

Enabling multicast snooping on edge switches

C.

Terminating user data

D.

Converting Layer 2 to Layer 3 addresses

Question 26

Refer to the exhibit.

Question # 26 A wireless controller is deployed at a branch location to facilitate guest client connectivity. A network engineer configures one WLAN using Web authentication and activates web-based method to align with company security policies. Which configuration enables client authentication for this WLAN?

Options:

A.

security web-auth

B.

wlan webauth 2 webauth

C.

no security wpa wpa2

D.

no security wpa akm dot1x

Question 27

What is the main benefit of using AI Enhanced RRM on the Cisco Catalyst 9800 wireless controller?

Options:

A.

It is an automatic tuning tool that is used to adjust RF parameters based on static thresholds.

B.

It focuses on increasing the transmit power of access points to maximize coverage regardless of interference.

C.

It disables dynamic channel assignment and power control to maintain a fixed wireless environment for stability.

D.

It uses machine learning and cloud analytics to proactively optimize RF parameters.

Question 28

Question # 28

Refer to the exhibit. A JSON response from a wireless management API contains access point inventory and interface state information. Which JSON expression retrieves the MAC address of the second interface on the first access point?

Options:

A.

accessPoints[0].interfaces[1] .macAddress

B.

accessPoints[1].interfaces[0] .macAddress

C.

accessPoints[0].interfaces[0] .macAddress

D.

accessPoints[1].interfaces[1] .macAddress

Question 29

What is a benefit of network adaptability in terms of improved operational outcomes when using AI-RRM in Cisco Catalyst Center?

Options:

A.

provisioning of static device addresses

B.

reduction of co-channel interference

C.

transmission of regular software update schedules

D.

categorization of users by authentication type

Question 30

Exhibit:

Question # 30

Refer to the exhibit. An organization wants to use Cisco Spaces for location analytics, and an engineer is setting up the Cisco Catalyst 9800 WLC to send location data. The Spaces connector has already been configured and is operational on the WLC. The engineer must now configure the controller to forward telemetry data to the correct Spaces cloud endpoint using TLS to complete the integration. Which CLI command must be added to the box in the code?

Options:

A.

profile spaces-profile ip address 198.51.100.10 receiver tls-native

B.

receiver protocol tls-native profile spaces-profile ip address 198.51.100.10 57555

C.

receiver ip address 198.51.100.10 57555 protocol tls-native profile spaces-profile

D.

profile spaces-profile receiver 198.51.100.10 57555 protocol tls-native

Page: 1 / 10
Total 102 questions