An engineer set up a VoWLAN with QoS on the WLC and a class map on the switch, but the markings are not being preserved correctly in the end-to-end traffic flow. Which two configurations on the wired network ensure end-to-end QoS? (Choose two.)
Atrust boundaries
Baccess lists
Cpolicy maps
DQoS licenses
ENetFlow
For security purposes, an engineer enables CPU ACL and chooses an ACL on the Security > Access Control Lists > CPU Access Control Lists menu. Which kind of traffic does this change apply to as soon as the change is made?
Awireless traffic only
Bwired traffic only
CVPN traffic
Dwireless and wired traffic
A new MSE with wIPS service has been installed and no alarm information appears to be reaching the MSE from controllers. Which protocol must be allowed to reach the MSE from the controllers?
ASOAP/XML
BNMSP
CCAPWAP
DSNMP
Which three properties are used for client profiling of wireless clients? (Choose three.)
AHTTP user agent
BDHCP
CMAC OUI
Dhostname
EOS version
FIP address
What is the difference between PIM sparse mode and PIM dense mode?
ASparse mode supports only one switch. Dense mode supports multiswitch networks.
BSparse mode floods. Dense mode uses distribution trees.
CSparse mode uses distribution trees. Dense mode floods.
DSparse mode supports multiswitch networks. Dense mode supports only one switch.
A user is trying to connect to a wireless network that is configured for WPA2-Enterprise security using a corporate laptop. The CA certificate for the authentication server has been installed on the Trusted Root Certification Authorities store on the laptop. The user has been prompted to enter the credentials multiple times, but the authentication has not succeeded. What is causing the issue?
AThere is an IEEE invalid 802.1X authentication policy on the authentication server.
BThe user Active Directory account is locked out after several failed attempts.
CThere is an invalid 802.1X authentication policy on the authenticator.
DThe laptop has not received a valid IP address from the wireless controller.
An engineer completed the basic installation for two Cisco CMX servers and is in the process of configuring high availability, but it fails. Which two statements about the root of the issue are true? (Choose two.)
AThe Cisco CMX instances are installed in the same subnet.
BThe types of the primary and secondary Cisco CMX installations differ.
CThe delay between the primary and secondary instance is 200 ms.
DThe sizes of the primary and secondary Cisco CMX installations differ.
EBoth Cisco CMX installations are virtual.
Refer to the exhibit. Which two items must be supported on the VoWLAN phones to take full advantage of this WLAN configuration? (Choose two.)
ATSPEC
BSIFS
C802.11e
DWMM
EAPSD
The IT manager is asking the wireless team to get a report for all guest user associations during the past two weeks. In which two formats can Cisco Prime save this report? (Choose two.)
ACSV
BPDF
CXLS
DDOC
Eplain text
Which command set configures a Cisco Catalyst 9800 Series Wireless Controller so that the client traffic enters the network at the AP switch port?
A.
B.
C.
D.
An engineer must implement Cisco Identity-Based Networking Services at a remote site using ISE to dynamically assign groups of users to specific IP subnets. If the subnet assigned to a client is available at the remote site, then traffic must be offloaded locally, and subnets are unavailable at the remote site must be tunneled back to the WLC. Which feature meets these requirements?
Alearn client IP address
BFlexConnect local authentication
CVLAN-based central switching
Dcentral DHCP processing
What is the maximum time range that can be viewed on the Cisco DNA Center issues and alarms page?
A3 hours
B24 hours
C3 days
D7 days
Which three characteristics of a rogue AP pose a high security risk? (Choose three.)
Aopen authentication
Bhigh RSSI
Cforeign SSID
Daccepts clients
Elow RSSI
Fdistant location
During the EAP process and specifically related to the client authentication session, which encrypted key is sent from the RADIUS server to the access point?
AWPA key
Bsession key
Cencryption key
Dshared-secret key
What is an important consideration when implementing a dual SSID design for BYOD?
AAfter using the provisioning SSID, an ACL that used to make the client switch SSIDs forces the user to associate and traverse the network by MAC filtering.
BIf multiple WLCs are used, the WLAN IDs must be exact for the clients to be provisioned and traverse the network correctly.
CSSIDs for this setup must be configured with NAC State-RADIUS NAC for the clients to authenticate with Cisco ISE, or with NAC State-ISE NAC for Cisco ISE to associate the client.
DOne SSID is for provisioning and the other SSID is for gaining access to the network. The use of an ACL should not be enforced to make the client connect to the REAL SSID after provisioning.
Which two protocols are used to communicate between the Cisco MSE and the Cisco Prime Infrastructure network management software? (Choose two.)
AHTTPS
BTelnet
CSOAP
DSSH
ENMSP
An engineer is configuring multicast for wireless for an all-company video meeting on a network using EIGRP and BGP within a single domain from a single source. Which type of multicast routing should be implemented?
AProtocol Independent Multicast Dense Mode
BSource Specific Multicast
CMulticast Source Discovery Protocol
DProtocol Independent Multicast Sparse Mode
Which component must be integrated with Cisco DNA Center to display the location of a client that is experiencing connectivity issues?
ACisco Hyperlocation Module
BWireless Intrusion Prevention System
CCisco Connected Mobile Experiences
DCisco Mobility Services Engine
Which statement about the VideoStream/Multicast Direct feature is true?
AIP multicast traffic is reliable over WLAN by default as defined by the IEEE 802.11 wireless multicast delivery mechanism.
BEach VideoStream client acknowledges receiving a video IP multicast stream.
CIt converts the unicast frame to a multicast frame over the air.
DIt makes the delivery of the IP multicast stream less reliable over the air, but reliable over Ethernet.
Which two statements about the requirements for a Cisco Hyperlocation deployment are true? (Choose two.)
AAfter enabling Cisco Hyperlocation on Cisco CMX, the APs and the wireless LAN controller must be restarted.
BNTP can be configured, but that is not recommended.
CThe Cisco Hyperlocation feature must be enabled on the wireless LAN controller and Cisco CMX.
DThe Cisco Hyperlocation feature must be enabled only on the wireless LAN controller.
EIf the Cisco CMX server is a VM, a high-end VM is needed for Cisco Hyperlocation deployments.
When implementing self-registration for guest/BYOD devices, what happens when an employee tries to connect four devices to the network at the same time?
AThe last device is removed and the newly added device is updated as active device.
BThe registration is allowed, but only one device is connected at any given time.
CAll devices are allowed on the network simultaneously.
DPurge time dictates how long a device is registered to the portal.
Which two restrictions are in place with regards to configuring mDNS? (Choose two.)
AmDNS uses only UDP port 5436 as a destination port.
BmDNS cannot use UDP port 5353 as the destination port.
CmDNS is not supported on FlexConnect APs with a locally switched WLAN.
DController software must be newer than 7.0.6+.
EmDNS is not supported over IPv6.
A FlexConnect remote office deployment is using five 2702i APs indoors and two 1532i APs outdoors. When a code upgrade is performed and FlexConnect Smart
AP Image Upgrade is leveraged, but no FlexConnect Master AP has been configured, how many image transfers between the WLC and APs will occur?
A1
B2
C5
D7
An engineer must configure a Cisco WLC to support Cisco Aironet 600 Series OfficeExtend APs. Which two Layer 2 security options are supported in this environment? (Choose two.)
AStatic WEP + 802.1X
BWPA+WPA2
CStatic WEP
DCKIP
E802.1X
Which devices can be tracked with the Cisco Context Aware Services?