Summer Special Flat 65% Limited Time Discount offer - Ends in 0d 00h 00m 00s - Coupon code: suredis

Cisco 300-430 Implementing Cisco Enterprise Wireless Networks (ENWLSI) Exam Practice Test

Demo: 32 questions
Total 216 questions

Implementing Cisco Enterprise Wireless Networks (ENWLSI) Questions and Answers

Question 1

An engineer is responsible for a wireless network for an enterprise. The enterprise has distributed offices around the globe, and all APs are configured in FlexConnect mode. The network must be configured to support 802.11r and CCKM. What needs to be implemented to accomplish this goal?

Options:

A.

Enable VLAN-based central switching.

B.

Enable FlexConnect local authentication.

C.

Enable FlexConnect local switching.

D.

Create FlexConnect groups.

Question 2

An engineer is implementing profiling for BYOD devices using Cisco ISE. When using a distributed model, which persona must the engineer configure with the profiling service?

Options:

A.

Device Admin Node

B.

Primary Admin Node

C.

Monitor Node

D.

Policy Services Node

Question 3

Refer to the exhibit.

What is the reason that the wireless client cannot get the RUN state?

Options:

A.

It has no communication with Cisco ISE.

B.

An authentication error has occurred.

C.

It is not getting the IP address.

D.

Because of central switching, the AP must reach the Cisco ISE directly.

Question 4

An engineer set up a VoWLAN with QoS on the WLC and a class map on the switch, but the markings are not being preserved correctly in the end-to- end traffic flow. Which two configurations on the wired network ensure end-to-end QoS? (Choose two.)

Options:

A.

trust boundaries

B.

access lists

C.

policy maps

D.

QoS licenses

E.

NetFlow

Question 5

An engineer needs to provision certificates on a Cisco Catalyst 9800 Series Wireless Controller. The customer uses a third-party CA server. Which protocol must be used between the controller and CA server to request and install certificates?

Options:

A.

SCEP

B.

TLS

C.

LDAP

D.

SSL

Question 6

Refer to the exhibit.

Which area indicates the greatest impact on the wireless network when viewing the Cisco CleanAir Zone of Impact map of interferers?

Options:

A.

A

B.

B

C.

C

D.

D

Question 7

An engineer must enable LSS for the AppleTV mDNS service only when ORIGIN is set to Wired. Which action meets this requirement?

Options:

A.

Set ORIGIN to Wired. Enable LSS by using the config mdns service Iss All command.

B.

Set ORIGIN to Wired. Enable LSS by using the config mdns service Iss AppleTV command.

C.

Set ORIGIN to either Wireless or All. Enable LSS by using the config mdns service Iss All command.

D.

Set ORIGIN to either Wireless or All. Enable LSS by using the config mdns service Iss enable AppleTV command.

Question 8

A wireless engineer has performed a Wireshark ccapture on an 802.1x authentication process to troubleshoot a connectivity issue.

Which two types of packet does the EAP contain? (Choose two.)

Options:

A.

EAP complete

B.

EAP response

C.

EAP failure

D.

EAP request

E.

EAP reply

Question 9

An engineer must configure Cisco OEAPs for three executives. As soon as the NAT address is configured on the management interface, it is noticed that the WLC is not responding for APs that are trying to associate to the internal IP management address. Which command should be used to reconcile this?

Options:

A.

config flexconnect office-extend nat-ip-only disable

B.

config network ap-discovery nap-ip-only enable

C.

config flexconnect office-extend nat-ip-only enable

D.

config network ap-discovery nat-ip-only disable

Question 10

Which customizable security report on Cisco Prime Infrastructure will show rogue APs detected since a point in time?

Options:

A.

Network Summary

B.

Rogue APs Events

C.

New Rogue APs

D.

Rogue APs Count Summary

Question 11

You are configuring the social login for a guest network. Which three options are configurable social connectors in Cisco CMX Visitor Connect? (Chose three)

Options:

A.

Linkedn

B.

Pinterest

C.

Medium

D.

Google+

E.

Facebook

F.

Myspace

Question 12

All APs are receiving multicast traffic, instead of only the APs that need it. What is the cause of this problem?

Options:

A.

The multicast group includes all APs

B.

The wrong multicast address was used

C.

The multicast group is assigned the wrong VLAN

D.

Multicast IGMP snooping is not enabled

Question 13

A user is trying to connect to a wireless network that is configured for WPA2-Enterprise security using a corporate laptop. The CA certificate for the authentication server has been installed on the Trusted Root Certification Authorities store on the laptop. The user has been prompted to enter the credentials multiple times, but the authentication has not succeeded. What is causing the issue?

Options:

A.

There is an IEEE invalid 802.1X authentication policy on the authentication server.

B.

The user Active Directory account is locked out after several failed attempts.

C.

There is an invalid 802.1X authentication policy on the authenticator.

D.

The laptop has not received a valid IP address from the wireless controller.

Question 14

An engineer wants to configure WebEx to adjust the precedence and override the QoS profile on the WLAN. Which configuration is needed to complete this task?

Options:

A.

Change the WLAN reserved bandwidth for WebEx

B.

Create an AVC profile for WebEx

C.

Create an ACL for WebEx

D.

Change the AVC application WebEx-app-sharing to mark

Question 15

Refer to the exhibit.

An engineer needs to manage non-802.11 interference. What is observed in the output on PI?

Options:

A.

At least one strong interferer is impacting connectivity at this site.

B.

Several light interferers are collectively impacting connectivity at this site.

C.

The three individual clusters shown indicate poor AP placement.

D.

RF at this site is unable to provide adequate wireless performance.

Question 16

An engineer is using Cisco Prime Infrastructure reporting to monitor the state of security on the WLAN. Which output is produced when the Adaptive wIPS Top 10 AP report is run?

Options:

A.

last 10 wIPS events from monitor mode APs

B.

last 10 wIPS events from sniffer mode APs

C.

last of 10 sniffer mode APs with the most wIPS events

D.

last of 10 monitor mode APs with the most wIPS events

Question 17

An engineer configures the wireless LAN controller to perform 802.1x user authentication. Which configuration must be enabled to ensure that client devices can connect to the wireless, even when WLC cannot communicate with the RADIUS?

Options:

A.

pre-authentication

B.

local EAP

C.

authentication caching

D.

Cisco Centralized Key Management

Question 18

An engineer completes the setup of a two-node Cisco ISE deployment for a guest portal. When testing the portal, the engineer notices that sometimes there is a certificate CN mismatch. Which certificate type helps resolve this issue?

Options:

A.

Public-Signed Root

B.

Public-Signed SAN

C.

Self-Signed Wildcard

D.

Self-Signed Standard

Question 19

A network engineer is deploying 8865 IP phones with wireless clients connected to them. In order to apply the appropriate QoS, the IP voice traffic needs to be distinguished from client data traffic. Which switch configuration feature must be enabled?

Options:

A.

Voice VLAN

B.

QBSS

C.

WME

D.

QoS routing

Question 20

Refer to the exhibit.

An engineer must restrict some subnets to have access to the WLC. When the CPU ACL function is enabled, no ACLs in the drop-down list are seen. What is the cause of the problem?

Options:

A.

The ACL does not have a rule that is specified to the Management interface.

B.

No ACLs have been created under the Access Control List tab.

C.

When the ACL is created, it must be specified that it is a CPU ACL.

D.

This configuration must be performed through the CLI and not though the web GUI.

Question 21

A customer managing a large network has implemented location services. Due to heavy load, it is needed to load balance the data coming through NMSP from the WLCs. Load must be spread between multiple CMX servers to help optimize the data flow for APs. Which configuration in CMX meets this requirement?

Options:

A.

cmxctl config feature flags nmsplb.cmx-ap-grouping true

B.

cmxctl config feature flags nmsplb.cmxgrouping true

C.

cmxctl config feature flags nmsplb.cmx-loadbalance true

D.

cmxctl config feature flags nmsplb.cmx-rssi-distribute true

Question 22

An engineer must track guest traffic flow using the WLAN infrastructure. Which Cisco CMX feature must be configured and used to accomplish this tracking?

Options:

A.

analytics

B.

connect and engage

C.

presence

D.

detect and locate

Question 23

A network engineer must segregate all IPads on the guest WLAN to a separate VLAN. How does the engineer accomplish this task without using Cisco

ISE?

Options:

A.

Create a local policy on the WLC.

B.

Use 802.1x authentication to profile the devices.

C.

Use an mDNS profile for the iPad device.

D.

Enable RADIUS DHCP profiling on the WLAN.

Question 24

An engineer configures a Cisco Aironet 600 Series OfficeExtend AP for a user who works remotely. What is configured on the Cisco WLC to allow the user to print a printer on his home network?

Options:

A.

split tunneling

B.

SE-connect

C.

FlexConnect

D.

AP failover priority

Question 25

An engineer has configured the wireless controller to authenticate clients on the employee SSID against Microsoft Active Directory using PEAP authentication.

Which protocol does the controller use to communicate with the authentication server?

Options:

A.

EAP

B.

802.1X

C.

RADIUS

D.

WPA2

Question 26

Refer to the exhibit.

Which COS to DSCP map must be modified to ensure that voice traffic is tagged correctly as it traverses the network?

Options:

A.

COS of 6 to DSCP 46

B.

COS of 3 to DSCP 26

C.

COS of 7 to DSCP 48

D.

COS of 5 to DSCP 46

Question 27

The security policy mandates that only controller web management traffic is allowed from the IT subnet. In testing, an engineer is trying to connect to a WLAN with Web Authentication for guest users, but the page is timing out on the wireless client browser. What is the cause of the issue?

Options:

A.

The implemented CPU ACL on the controller is blocking HTTP/HTTPS traffic from the guest clients.

B.

Web Authentication Redirect is not supported with CPU ACLs.

C.

The DNS server that is configured on the controller is incorrect.

D.

Web Authentication Redirect is supported only with Internet Explorer, and the client is using Google Chrome.

Question 28

An engineer configures a deployment to support:

Cisco CMX

licenses for at least 3000 APs

6000 wIPS licenses

The Cisco vMSE appliance must be sized for this deployment. Which Cisco vMSE Release 8 option must the engineer deploy?

Options:

A.

Large vMSE

B.

Low-End vMSE

C.

Standard vMSE

D.

High-End vMSE

Question 29

Which two statements about the requirements for a Cisco Hyperlocation deployment are true? (Choose two.)

Options:

A.

After enabling Cisco Hyperlocation on Cisco CMX, the APs and the wireless LAN controller must be restarted.

B.

NTP can be configured, but that is not recommended.

C.

The Cisco Hyperlocation feature must be enabled on the wireless LAN controller and Cisco CMX.

D.

The Cisco Hyperlocation feature must be enabled only on the wireless LAN controller.

E.

If the Cisco CMX server is a VM, a high-end VM is needed for Cisco Hyperlocation deployments.

Question 30

Refer to the exhibit.

A wireless engineer has integrated the wireless network with a RADIUS server. Although the configuration on the RADIUS is correct, users are reporting that they are unable to connect. During troubleshooting, the engineer notices that the authentication requests are being dropped. Which action will resolve the issue?

Options:

A.

Allow connectivity from the wireless controller to the IP of the RADIUS server.

B.

Provide a valid client username that has been configured on the RADIUS server.

C.

Configure the shared-secret keys on the controller and the RADIUS server.

D.

Authenticate the client using the same EAP type that has been set up on the RADIUS server.

Question 31

An engineer configured a Cisco AireOS controller with two TACACS+ servers. The engineer notices that when the primary TACACS+ server fails, the WLC starts using the secondary server as expected, but the WLC does not use the primary server again until the secondary server fails or the controller is rebooted. Which cause of this issue is true?

Options:

A.

Fallback is enabled

B.

Fallback is disabled

C.

DNS query is disabled

D.

DNS query is enabled

Question 32

Refer to the exhibit.

The security team has implemented ISE as an AAA solution for the wireless network. The wireless engineer notices that though clients are able to authenticate successfully, the ISE policies that are designed to place them on different interfaces are not working. Which configuration must be applied in the RADIUS Authentication Settings section from the ISE Network Device page?

Options:

A.

Disable KeyWrap.

B.

Use ASCII for the key input format.

C.

Change the CoA Port.

D.

Correct the shared secret.

Demo: 32 questions
Total 216 questions