Summer Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

300-430 PDF

$49

$139.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

300-430 PDF + Testing Engine

$66.5

$189.99

3 Months Free Update

  • Exam Name: Implementing Cisco Enterprise Wireless Networks (300-430 ENWLSI)
  • Last Update: Sep 12, 2025
  • Questions and Answers: 216
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

300-430 Engine

$56

$159.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

300-430 Practice Exam Questions with Answers Implementing Cisco Enterprise Wireless Networks (300-430 ENWLSI) Certification

Question # 6

All APs are receiving multicast traffic, instead of only the APs that need it. What is the cause of this problem?

A.

The multicast group includes all APs

B.

The wrong multicast address was used

C.

The multicast group is assigned the wrong VLAN

D.

Multicast IGMP snooping is not enabled

Full Access
Question # 7

What is an important consideration when implementing a dual SSID design for BYOD?

A.

After using the provisioning SSID, an ACL that used to make the client switch SSIDs forces the user to associate and traverse the network by MAC filtering.

B.

If multiple WLCs are used, the WLAN IDs must be exact for the clients to be provisioned and traverse the network correctly.

C.

SSIDs for this setup must be configured with NAC State-RADIUS NAC for the clients to authenticate with Cisco ISE, or with NAC State-ISE NAC for Cisco ISE to associate the client.

D.

One SSID is for provisioning and the other SSID is for gaining access to the network. The use of an ACL should not be enforced to make the client connect to the REAL SSID after provisioning.

Full Access
Question # 8

A wireless engineer has performed a Wireshark ccapture on an 802.1x authentication process to troubleshoot a connectivity issue.

Which two types of packet does the EAP contain? (Choose two.)

A.

EAP complete

B.

EAP response

C.

EAP failure

D.

EAP request

E.

EAP reply

Full Access
Question # 9

What must be configured on ISE version 2.1 BYOD when using Single SSID?

A.

open authentication

B.

802.1x

C.

no authentication

D.

WPA2

Full Access
Question # 10

An engineer must provide a graphical report with summary grouped data of the total number of wireless clients on the network. Which Cisco Prime Infrastructure report provides the required data?

A.

Client Traffic Stream Metrics

B.

Client Summary

C.

Posture Status Count

D.

Mobility Client Summary

Full Access
Question # 11

A wireless administrator must assess the different client types connected to Cisco Catalyst 9800 Series Wireless Controller without using any external servers. Which configuration must be added to the controller to achieve this assessment?

A.

native profile

B.

MAC classification

C.

local profile

D.

device classification

Full Access
Question # 12

An engineer is deploying a virtual MSE. The network has 3000 APs and needs 7000 IPS licenses.

To which size server does the engineer scale it?

A.

virtual

B.

standard

C.

high end

D.

low end

Full Access
Question # 13

Refer to the exhibit.

300-430 question answer

A network architect configured the Cisco Catalyst 9800 Series Controller to find out information on client types in the wireless network. RADIUS profiling is enabled so that the controller forwards the information about clients to a Cisco ISE server through vendor-specific RADIUS attributes. The ISE server is not profiling any data from the controller. Which configuration must be added in the blank in the code to accomplish the profiling on the Cisco 9800 Series controller?

A.

aaa accounting identity acct_method start-stop group rad-group

B.

aaa accounting network acct_method start-stop group rad-group

C.

aaa accounting exec acct_method start-stop group rad-group

D.

aaa accounting commands acct_method start-stop group rad-group

Full Access
Question # 14

What are two considerations when deploying a Cisco Hyperlocation? (Choose two.)

A.

NTP configuration is available, but not recommended.

B.

The Cisco Hyperlocation feature must be enabled only on the wireless LAN controller.

C.

After enabling Cisco Hyperlocation on Cisco CMX, the APs and the wireless LAN controller must be restarted.

D.

The Cisco Hyperlocation feature must be enabled on the wireless LAN controller and Cisco CMX.

E.

If the Cisco CMX server is a VM, a high-end VM is needed for Cisco Hyperlocation deployments.

Full Access
Question # 15

Refer to the exhibit.

300-430 question answer

An engineer tries to manage the rogues on the Cisco WLC. Based on the configuration, which AP is marked as malicious by the controller?

A.

rogue AP with SSID admin seen for 4000 seconds and heard at -70dBm

B.

rogue AP with SSID admin seen for 3000 seconds and heard at -60dBm

C.

rogue AP with SSID admin seen for 4000 seconds and heard at -60dBm

D.

rogue AP with SSID admin seen for 3000 seconds and heard at -70dBm

Full Access
Question # 16

Refer to the exhibit.

300-430 question answer

An engineer needs to manage non-802.11 interference. What is observed in the output on PI?

A.

At least one strong interferer is impacting connectivity at this site.

B.

Several light interferers are collectively impacting connectivity at this site.

C.

The three individual clusters shown indicate poor AP placement.

D.

RF at this site is unable to provide adequate wireless performance.

Full Access
Question # 17

A network engineer is configuring a Cisco AireOS WLC environment for central web authentication using Cisco ISE.

The controllers are configured using auto-anchor for the guest network.

Which three components must be implemented for the foreign WLC?(Choose three.)

A.

DHCP RADIUS profiling enabled.

B.

HTTP RADIUS profiling enabled.

C.

UDP/1812-1813 open to ISE

D.

downloadable preauth ACL on ISE

E.

local preauth ACL on WLC

F.

WLAN Layer 2 security

Full Access
Question # 18

Which component must be integrated with Cisco DNA Center to display the location of a client that is experiencing connectivity issues?

A.

Cisco Hyperlocation Module

B.

Wireless Intrusion Prevention System

C.

Cisco Connected Mobile Experiences

D.

Cisco Mobility Services Engine

Full Access
Question # 19

A Cisco 8540 WLC manages Cisco Aironet 4800 Series Aps and sends AoA data to a Cisco CMX 3375 Appliance for Hyperlocation. The load from the WLC is distributed to another virtual CMX server using CMX grouping. The virtual CMX server shows location RSSI data and not Hyperlocation. No AoA metrics are shown on the metrics page of the CMX virtual appliance under System > Metrics > Location Metrics. How must the network administrator resolve this issue?

A.

Enable Wireless > Access Points > Global Configuration> Enable Hyperlocation on the WLC.

B.

Enable the HALO module on the CMX appliance for the data collection.

C.

Allow port 2003 for AoA packets to flow through between the CMX appliances.

D.

Use one Hyperlocation-enabled WLC and CMX for AoA data.

Full Access
Question # 20

When using a Cisco Catalyst 9800 Series Wireless Controller, which statement about AutoQoS is true?

A.

It has a set of predefined profiles that you cannot modify further

B.

It matches traffic and assigns each matched packet to QoS groups

C.

It automates deployment of wired QoS and makes wireless QoS implementation easier

D.

It allows the output policy map to put specific QoS queues into specific subgroups

Full Access
Question # 21

Refer to the exhibit.

300-430 question answer

An engineer configured a BYOD policy that allows for printing on the WLAN using Bonjour services. However, the engineer cannot get printing to work. The WLC firmware is 8.x. What must be implemented on the controller?

A.

Enable mDNS and IGMP snooping.

B.

Activate location-specific services.

C.

Configure Secure Web Mode Cipher-Option SSLv2.

D.

Increase the IGMP Query Interval value

Full Access
Question # 22

Which condition introduce security risk to a BYOD policy?

A.

enterprise-managed MDM platform used for personal devices

B.

access to LAN without implementing MDM solution

C.

enforcement of BYOD access to internet only network

D.

enterprise life-cycle enforcement of personal device refresh

Full Access
Question # 23

An engineer must control administrative access to the WLC using their Active Directory without being concerned about RBAC after the admin user is authenticated. Which two features does the engineer configure to accomplish this task? (Choose two.)

A.

Device Admin Policy Set

B.

User Access Mode: ReadWrite

C.

ACL

D.

RADIUS server

E.

TACACS server

Full Access
Question # 24

Which three characteristics of a rogue AP pose a high security risk? (Choose three.)

A.

open authentication

B.

high RSSI

C.

foreign SSID

D.

accepts clients

E.

low RSSI

F.

distant location

Full Access
Question # 25

A wireless engineer is configuring LWA using ISE. The customer is a startup company and requested the wireless users to authenticate against a directory, but LDAP is unavailable. Which solution should be proposed in order to have the same security and user experience?

A.

Use SAML.

B.

Use the internal database of the RADIUS server.

C.

Use a preshared key on the corporate WLAN.

D.

Use Novell eDirectory.

Full Access
Question # 26

An engineer is configuring multicast for wireless for an all-company video meeting on a network using EIGRP and BGP within a single domain from a single source. Which type of multicast routing should be implemented?

A.

Protocol Independent Multicast Dense Mode

B.

Source Specific Multicast

C.

Multicast Source Discovery Protocol

D.

Protocol Independent Multicast Sparse Mode

Full Access
Question # 27

Branch wireless users report that they can no longer access services from head office but can access services locally at the site. New wireless users can associate to the wireless while the WAN is down. Which three elements (Cisco FlexConnect state, operation mode, and authentication method) are seen in this scenario? (Choose three.)

A.

authentication-local/switch-local

B.

WPA2 personal

C.

authentication-central/switch-central

D.

lightweight mode

E.

standalone mode

F.

WEB authentication

Full Access
Question # 28

The security learn is concerned about the access to all network devices, including the Cisco WLC. To permit only the admin subnet to have access to management, a CPU ACL is created and applied. However, guest users cannot get to the web portal. What must be configured to permit only admins to have access?

A.

The guest portal must be configured on the CPU ACLs on the Cisco WLC.

B.

Access to Cisco ISE must be allowed on the pre authentication ACL.

C.

Management traffic from the guest network must be configured on the ACL rules. D. Traffic toward the virtual interface must be permitted.

Full Access
Question # 29

An engineer just added a new MSE to Cisco Prime Infrastructure and wants to synchronize the MSE with the Cisco 5520 WLC, located behind a firewall in a DMZ. It is noticed that NMSP messages are failing between the two devices. Which traffic must be allowed on the firewall to ensure that the MSE and WLC are able to communicate using NMSP?

A.

TCP 1613

B.

UDP 16113

C.

UDP 1613

D.

TCP 16113

Full Access
Question # 30

A customer has a distributed wireless deployment model where the WLCs are located in the data centers. Because the file servers are located in the data center, the traffic from the corporate WLAN “Corp-401266017” must go through the controllers, where the guest WLAN “Guest-19283746” traffic must use the local Internet line installed in each office. Which configuration will accomplish this task?

A.

Disable Local Switching for the corporate and guest WLAN.

B.

Disable Local Switching for the corporate WLAN and enable it for the guest WLAN.

C.

Enable Local Switching for the corporate and guest WLAN.

D.

Enable Local Switching for the corporate WLAN and disable it for the guest WLAN.

Full Access
Question # 31

Where is a Cisco OEAP enabled on a Cisco Catalyst 9800 Series Wireless Controller?

A.

RF Profile

B.

Flex Profile

C.

Policy Profile

D.

AP Join Profile

Full Access
Question # 32

A wireless engineer wants to schedule monthly security reports in Cisco Prime infrastructure. Drag and drop the report the from the left onto the expected results when the report is generated on the right.

300-430 question answer

Full Access
Question # 33

Refer to the exhibit.

300-430 question answer

An administrator notices slower location updates from the controller to Cisco CMX. Which command must be configured to get an update every 5 seconds for rogues?

A.

config location notification interval rssi rogues 5

B.

config nmsp notification interval rssi rogues 5

C.

config subscription notification interval rssi rogues 5

D.

config cmx notification interval rssi rogues 5

Full Access
Question # 34

Refer to the exhibit.

300-430 question answer

An engineer needs to configure location services in an office. The requirement is to use FastLocate and achieve higher locations refresh rates. Which location-based technique should be implemented?

A.

probe-based

B.

location patterning

C.

data packet-based

D.

angulation

Full Access
Question # 35

A network engineer must segregate all IPads on the guest WLAN to a separate VLAN. How does the engineer accomplish this task without using Cisco

ISE?

A.

Create a local policy on the WLC.

B.

Use 802.1x authentication to profile the devices.

C.

Use an mDNS profile for the iPad device.

D.

Enable RADIUS DHCP profiling on the WLAN.

Full Access
Question # 36

A corporation is spread across different countries and uses MPLS to connect the offices. The senior management wants to utilize the wireless network for all the employees. To ensure strong connectivity and minimize delays, an engineer needs to control the amount of traffic that is traversing between the APs and the central WLC. Which configuration should be used to accomplish this goal?

A.

FlexConnect mode with central switching enabled

B.

FlexConnect mode with central authentication

C.

FlexConnect mode with OfficeExtend enabled

D.

FlexConnect mode with local authentication

Full Access
Question # 37

A customer is concerned that their wireless network is detecting spurious threats from channels that are not being used by their wireless infrastructure. Which two technologies must they deploy? (Choose two.)

A.

FlexConnect mode

B.

monitor mode

C.

sniffer mode with no submode

D.

local mode with WIPS submode

E.

rogue detector mode

Full Access
Question # 38

A network engineer created a new wireless network that will be used for guest access. The corporate network must utilize all rates. The guest network must use only lower rates instead of 802.11n data rates. To what must the WMM policy of the WLAN be set to accomplish this task?

A.

required

B.

allowed

C.

disabled

D.

mandatory

Full Access
Question # 39

On a Cisco Catalyst 9800 Series Wireless Controller, an engineer wants to prevent a FlexConnect AP from allowing wireless clients to connect when its Ethernet connection is nonoperational. Which command set prevents this connection?

A.

config terminal

wireless flexconnect profile [profile name]

ethernet-fallback-enable

end

B.

config terminal

wireless flexconnect profile [profile name]

fallback-radio-shut

end

C.

config terminal

wireless profile flex [profile name]

fallback-radio-shut

end

D.

config terminal

wireless profile flex [profile name]

ethernet-fallback-enable

end

Full Access
Question # 40

What is configured to use more than one port on the OEAP to extend the wired network?

A.

remote LAN ACL

B.

AAA override

C.

client load balancing

D.

remote LAN

Full Access
Question # 41

An engineer must implement Cisco Identity-Based Networking Services at a remote site using ISE to dynamically assign groups of users to specific IP subnets. If the subnet assigned to a client is available at the remote site, then traffic must be offloaded locally, and subnets are unavailable at the remote site must be tunneled back to the WLC. Which feature meets these requirements?

A.

learn client IP address

B.

FlexConnect local authentication

C.

VLAN-based central switching

D.

central DHCP processing

Full Access
Question # 42

WPA2 Enterprise with 802.1X is being used for clients to authenticate to a wireless network through a Cisco ISE server. For security reasons, the network engineer wants to ensure that only PEAP authentication is used. The engineer sent instructions to clients on how to configure the supplicants, but the ISE logs still show users authenticating using EAP-FAST. Which action ensures that access to the network is restricted for these users unless the correct authentication mechanism is configured?

A.

Enable AAA override on the SSID, gather the usernames of these users, and disable the RADIUS accounts until the devices are correctly configured.

B.

Enable AAA override on the SSID and configure an ACL on the WLC that allows access to users with IP addresses from a specific subnet.

C.

Enable AAA override on the SSID and configure an access policy in Cisco ISE that denies access to the list of MACs that have used EAP-FAST.

D.

Enable AAA override on the SSID and configure an access policy in Cisco ISE that allows access only when the EAP authentication method is PEAP.

Full Access
Question # 43

The IT manager is asking the wireless team to get a report for all guest user associations during the past two weeks. In which two formats can Cisco Prime save this report? (Choose two.)

A.

CSV

B.

PDF

C.

XLS

D.

DOC

E.

plain text

Full Access
Question # 44

Which two statements about the requirements for a Cisco Hyperlocation deployment are true? (Choose two.)

A.

After enabling Cisco Hyperlocation on Cisco CMX, the APs and the wireless LAN controller must be restarted.

B.

NTP can be configured, but that is not recommended.

C.

The Cisco Hyperlocation feature must be enabled on the wireless LAN controller and Cisco CMX.

D.

The Cisco Hyperlocation feature must be enabled only on the wireless LAN controller.

E.

If the Cisco CMX server is a VM, a high-end VM is needed for Cisco Hyperlocation deployments.

Full Access
Question # 45

An engineer has implemented advanced location services for a retail wireless deployment. The marketing department wants to collect user demographic information in exchange for guest WLAN access and to have a customized portal per location hosted by the provider. Which social connector must be tied into Cisco CMX to provide this service?

A.

Gmail

B.

Google+

C.

Facebook

D.

MySpace

Full Access
Question # 46

Refer to the exhibit.

300-430 question answer

An ACL is configured to restrict access for BYOD clients. The ACL must redirect devices to the guest portal. To which two devices on the local network must the ACL allow access other than the DHCP server? (Choose two.)

A.

RADIUS server

B.

DNS server

C.

Cisco ISE

D.

SNMP server

E.

WLC

Full Access
Question # 47

A company is deploying wireless PCs on forklifts within its new 10,000-square-foot(3048-square-rneter) facility.

The clients are configured for PEAP-MS-CHAPv2 with WPA TKIP. Users report that applications frequently drop when the clients roam between access points on the floor. A professional site survey was completed.

Which configuration change is recommended to improve the speed of client roaming?

A.

EAP-FAST

B.

EAP-TLS

C.

WPAAES

D.

WPA2AES

Full Access
Question # 48

A Cisco CMX 3375 appliance on the 10.6.1 version code counts duplicate client entries, which creates wrong location analytics. The issue is primarily from iOS clients with the private MAC address feature enabled. Enabling this feature requires an upgrade of the Cisco CMX 3375 appliance in a high availability pair to version 10.6.3. SCP transfers the Cisco CMX image, but the upgrade script run fails. Which configuration change resolves this issue?

A.

Upgrade the high availability pair to version 10.6.2 image first and then upgrade to version 10.6.3.

B.

Save configuration and use the upgrade script to upgrade the high availability pair without breaking the high availability.

C.

Break the high availability using the cmxha config disable command and upgrade the primary and secondary individuality.

D.

Run root patch to first upgrade to version 10.6.2 and then migrate to version 10.6.3.

Full Access
Question # 49

A company has a single WLAN configured for 802.1x authentication with the QoS set to Silver. This WLAN supports all corporate and BYOD access. A decision has been made to allow users to install Cisco Jabber on their personal mobile devices. Users report poor voice quality when using Jabber. QoS is being applied only as best effort. What must be configured to ensure that the WLAN remains on the Silver class and to ensure Platinum class for Jabber?

A.

Configure QoS on the mobile devices that have Jabber installed.

B.

Enable Cisco Centralized Key Management on the WLAN so that the Jabber-enabled devices will connect.

C.

Configure the WLAN to broadcast on 5 GHz radios only and allow Jabber users to connect.

D.

Configure an AVC profile for the Jabber traffic and apply it to the WLAN.

Full Access
Question # 50

A wireless administrator receives this information to complete a CMX deployment in high availability by using version 10.6 to gather analytics.

IP address of the primary server

IP address of the secondary server

failover mode to be configured as automatic

root password of the secondary server

email ID for NOC notifications

Enabling high availability fails when these parameters are used. Which action resolves the issue?

A.

Insert the cmxadmin password of the secondary server.

B.

Use IP protocol 4242 for the controller to reach the CMX server.

C.

Place primary and secondary servers in different subnets.

D.

Enable the virtual IP address of the primary server.

Full Access
Question # 51

Refer to the exhibit.

300-430 question answer

An engineer must connect a fork lift via a WGB to a wireless network and must authenticate the WGB certificate against the RADIUS server. Which three steps are required for this configuration? (Choose three.)

A.

Configure the certificate, WLAN, and radio interface on WGB.

B.

Configure the certificate on the WLC.

C.

Configure WLAN to authenticate using ISE.

D.

Configure the access point with the root certificate from ISE.

E.

Configure WGB as a network device in ISE.

F.

Configure a policy on ISE to allow devices to connect that validate the certificate.

Full Access
Question # 52

Refer to the exhibit.

300-430 question answer

Which area indicates the greatest impact on the wireless network when viewing the Cisco CleanAir Zone of Impact map of interferers?

A.

A

B.

B

C.

C

D.

D

Full Access
Question # 53

Refer to the exhibit.

300-430 question answer

The security team has implemented ISE as an AAA solution for the wireless network. The wireless engineer notices that though clients are able to authenticate successfully, the ISE policies that are designed to place them on different interfaces are not working. Which configuration must be applied in the RADIUS Authentication Settings section from the ISE Network Device page?

A.

Disable KeyWrap.

B.

Use ASCII for the key input format.

C.

Change the CoA Port.

D.

Correct the shared secret.

Full Access
Question # 54

A Cisco WLC has been added to the network and Cisco ISE as a network device, but authentication is failing. Which configuration within the network device configuration should be verified?

A.

SNMP RO community

B.

device interface credentials

C.

device ID

D.

shared secret

Full Access
Question # 55

An engineer has configured passive fallback mode for RADIUS with default timer settings. What will occur when the primary RADIUS fails then recovers?

A.

RADIUS requests will be sent to the secondary RADIUS server until the secondary fails to respond.

B.

The controller will immediately revert back after it receives a RADIUS probe from the primary server.

C.

After the inactive time expires the controller will send RADIUS to the primary.

D.

Once RADIUS probe messages determine the primary controller is active the controller will revert back to the primary RADIUS.

Full Access
Question # 56

Which two restrictions are in place with regards to configuring mDNS? (Choose two.)

A.

mDNS uses only UDP port 5436 as a destination port.

B.

mDNS cannot use UDP port 5353 as the destination port.

C.

mDNS is not supported on FlexConnect APs with a locally switched WLAN.

D.

Controller software must be newer than 7.0.6+.

E.

mDNS is not supported over IPv6.

Full Access
Question # 57

A wireless engineer deployed all remote sites as FlexConnect. The client VLAN assignment on these sites is configured manually mapped by WLAN and using local switching. Dynamic VLAN assignment is provided by the newly deployed Cisco ISE. Which IETF attribute must be configured on the AAA server to send that VLAN ID?

A.

Tunnel-Medium-Type

B.

Tunnel-Client-Endpoint

C.

Tunnel-Assignment-ID

D.

Tunnel-Private-Group-ID

Full Access
Question # 58

What is the default NMSP echo interval between Cisco MSE and a Wireless LAN Controller?

A.

10 seconds

B.

15 seconds

C.

30 seconds

D.

60 seconds

Full Access
Question # 59

After installing and configuring Cisco CMX, an administrator must change the NTP server on the Cisco CMX server. Which action accomplishes this task?

A.

Manually edit /etc/ntp.conf using an XML editor before restarting the server by using service restart all services.

B.

Log in to the Cisco CMX CLI and issue set ntp server NTP_IP where NTP_IP is the IP of the NTP server.

C.

Manually edit /etc/ntp.conf as the admin user before restarting ntpd by using service ntpd restart.

D.

Log in to the Cisco CMX GUI as the administrator and type the IP address of the NTP server in System tab > Settings> TimeZone/NTP.

Full Access
Question # 60

When implementing self-registration for guest/BYOD devices, what happens when an employee tries to connect four devices to the network at the same time?

A.

The last device is removed and the newly added device is updated as active device.

B.

The registration is allowed, but only one device is connected at any given time.

C.

All devices are allowed on the network simultaneously.

D.

Purge time dictates how long a device is registered to the portal.

Full Access
Question # 61

A network engineer has been hired to perform a new MSE implementation on an existing network. The MSE must be installed in a different network than the Cisco WLC. Which configuration allows the devices to communicate over NMSP?

A.

Allow UDP/16113 port on the central switch.

B.

Allow TCP/16113 port on the firewall.

C.

Allow UDP/16666 port on the VPN router.

D.

Allow TCP/16666 port on the router.

Full Access
Question # 62

A network administrator just completed the basic implementation of Cisco CMX and tries to implement location tracking. The administrator is having trouble establishing connectivity between one of the WLCs through NMSP. What must be configured to establish this connectivity? (Choose two.)

A.

Add permanent licenses on the Cisco CMX server.

B.

Allow on the firewall port 16113 between Cisco CMX and the WLC.

C.

Enable NMSP on the WLC.

D.

Reboot Cisco CMX after adding the WLC for the first time.

E.

Add to the WLC the MAC address and SSC key for the Cisco CMX server.

Full Access
Question # 63

An IT team is growing quickly and needs a solution for management device access. The solution must authenticate users from an external repository instead of the current local on the WLC, and it must also identify the user and determine what level of access users should have. Which protocol do you recommend to achieve these goals?

A.

network policy server

B.

RADIUS

C.

TACACS+

D.

LDAP

Full Access
Question # 64

You plan to implement Cisco Identity Based Networking Services on a Cisco Catalyst 3850 Series Switch. Which switch command is required when configuring downloadable ACLs?

A.

authentication display new-style

B.

ip device tracking

C.

dot1x system-auth-control

D.

aaa session-id common

Full Access