Month End Sale - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65percent

Welcome To DumpsPedia

300-430 Sample Questions Answers

Questions 4

An engineer has implemented 802.1x authentication on the wireless network utilizing the internal database of a RADIUS server. Some clients reported that they are unable to connect. After troubleshooting, it is found that PEAP authentication is failing. A debug showed the server is sending an Access- Reject message. Which action must be taken to resolve authentication?

Options:

A.

Use the user password that is configured on the server.

B.

Disable the server certificate to be validated on the client.

C.

Update the client certificate to match the user account.

D.

Replace the client certificates from the CA with the server certificate.

Buy Now
Questions 5

Which statement about the VideoStream/Multicast Direct feature is true?

Options:

A.

IP multicast traffic is reliable over WLAN by default as defined by the IEEE 802.11 wireless multicast delivery mechanism.

B.

Each VideoStream client acknowledges receiving a video IP multicast stream.

C.

It converts the unicast frame to a multicast frame over the air.

D.

It makes the delivery of the IP multicast stream less reliable over the air, but reliable over Ethernet.

Buy Now
Questions 6

Which two steps are needed to complete integration of the MSE to Cisco Prime Infrastructure to track the location of clients/rogues on maps? (Choose two.)

Options:

A.

Synchronize access points with the MSE.

B.

Add the MSE to Cisco Prime Infrastructure using the CLI credentials.

C.

Add the MSE to Cisco Prime Infrastructure using the Cisco Prime Infrastructure communication credentials.

D.

Apply a valid license for Wireless Intrusion Prevention System.

E.

Apply a valid license for location tracking.

Buy Now
Questions 7

An engineer must implement a BYOD policy with these requirements:

Onboarding unknown machines

Easily scalable

Low overhead on the wireless network

Which method satisfies these requirements?

Options:

A.

triple SSID

B.

single SSID

C.

open SSID

D.

dual SSID

Buy Now
Questions 8

A network engineer must get an autonomous AP to authenticate to the upstream switch via IEEE 802.1 X. Drag and drop the commands from the left onto the right to complete the configuration.

Options:

Buy Now
Questions 9

Which feature on the Cisco Wireless LAN Controller must be present to support dynamic VLAN mapping?

Options:

A.

FlexConnect ACL

B.

VLAN name override

C.

CCKM/OKC

D.

AAA override

Buy Now
Questions 10

An IT department receives a report of a stolen laptop and has information on the MAC address of the laptop. Which two settings must be set on the wireless infrastructure to determine its location? (Choose two.)

Options:

A.

Location History for Clients must be enabled on the MSE.

B.

Client location tracking must be enabled on the MSE.

C.

Location History for Visitors must be enabled on the MSE.

D.

Location History for Rogue APs & Rogue Clients must be enabled on the MSE.

E.

Tracking optimization must be enabled on the WLC.

Buy Now
Questions 11

All APs are receiving multicast traffic, instead of only the APs that need it. What is the cause of this problem?

Options:

A.

The multicast group includes all APs

B.

The wrong multicast address was used

C.

The multicast group is assigned the wrong VLAN

D.

Multicast IGMP snooping is not enabled

Buy Now
Questions 12

Which two protocols are used to communicate between the Cisco MSE and the Cisco Prime Infrastructure network management software? (Choose two.)

Options:

A.

HTTPS

B.

Telnet

C.

SOAP

D.

SSH

E.

NMSP

Buy Now
Questions 13

You are configuring the social login for a guest network. Which three options are configurable social connectors in Cisco CMX Visitor Connect? (Chose three)

Options:

A.

Linkedn

B.

Pinterest

C.

Medium

D.

Google+

E.

Facebook

F.

Myspace

Buy Now
Questions 14

A shopping center uses AireOS controllers with Cisco Wave 2 APs. A separate WLAN named Guest-012345678-WLAN is used for guest wireless clients. Management needs location analytics to determine popular areas. CMX must track only associated clients. What must be selected on the CMX server settings?

Options:

A.

Exclude probing clients

B.

Duty Cycle Cutoff

C.

Enable Locally Administered MAC Filtering

D.

Enable Location MAC Filtering

Buy Now
Questions 15

An engineer set up identity-based networking with ISE and configured AAA override on the WLAN. Which two attributes must be used to change the client behavior from the default settings? (Choose two.)

Options:

A.

DHCP timeout

B.

DNS server

C.

IPv6 ACL

D.

DSCP value

E.

multicast address

Buy Now
Questions 16

An engineer is troubleshooting a Cisco CMX high-availability deployment and notices that the primary and backup Cisco CMX servers are both considered primary. Which command must the engineer run on the backup server?

Options:

A.

cmxha convert backup

B.

cmxha backup convert

C.

cmxha secondary convert

D.

cmxha convert secondary

Buy Now
Questions 17

Refer to the exhibit.

An engineer must provide a position of rogue APs on a floor map using Cisco PI 3.0, but no rogue AP options are showing on the left-hand navigation menu under Maps. What is the reason for this omission?

Options:

A.

An assurance license is not installed.

B.

The controller operational status background task is disabled.

C.

The Show Detected Interferers feature under the AP option is disabled.

D.

Cisco MSE has not been added to Cisco PI.

Buy Now
Questions 18

Refer to the exhibit.

An engineer is configuring a Cisco wireless LAN controller and needs wireless multicast to use the 54Mbps rates. Which action meets this requirement?

Options:

A.

Change the 24 Mpbs to Supported.

B.

Set all data rates below 54 Mbps to Supported.

C.

Change the 54 Mpbs to Mandatory.

D.

Set all data rates below 54 Mbps to Disable.

Buy Now
Questions 19

An administrator receives reports of many interferers in the wireless network and wants to get the location of these interferers from the maps in Cisco Prime Infrastructure.

When looking at the floor plans/maps, the administrator does not see any interferers, but can see all wireless clients located successfully.

Which two statements define the cause of the issue? (Choose two.)

Options:

A.

MSE is not added to Cisco Prime infrastructure and synchronized.

B.

Interferer tracking is not enabled on the MSE.

C.

SNMP between Cisco Prime Infrastructure and the WLC is failing.

D.

Context Aware Service tracking limit has already been reached with tracking other elements.

E.

NSMP communication is inactive with the WLC.

Buy Now
Questions 20

What is the maximum time range that can be viewed on the Cisco DNA Center issues and alarms page?

Options:

A.

3 hours

B.

24 hours

C.

3 days

D.

7 days

Buy Now
Questions 21

A company has a single WLAN configured for 802.1x authentication with the QoS set to Silver. This WLAN supports all corporate and BYOD access. A decision has been made to allow users to install Cisco Jabber on their personal mobile devices. Users report poor voice quality when using Jabber. QoS is being applied only as best effort. What must be configured to ensure that the WLAN remains on the Silver class and to ensure Platinum class for Jabber?

Options:

A.

Configure QoS on the mobile devices that have Jabber installed.

B.

Enable Cisco Centralized Key Management on the WLAN so that the Jabber-enabled devices will connect.

C.

Configure the WLAN to broadcast on 5 GHz radios only and allow Jabber users to connect.

D.

Configure an AVC profile for the Jabber traffic and apply it to the WLAN.

Buy Now
Questions 22

Refer to the exhibit.

An engineer is troubleshooting a client connectivity issue. The client is in the RUN state, and no traffic is passed after authenticating by using Cisco ISE. Which action resolves the problem?

Options:

A.

Configure a different client VLAN after authentication.

B.

Disable the ACL that prevents traffic from being allowed.

C.

Apply a lower WMM QoS.

D.

Enable rate-limiting to the client.

Buy Now
Questions 23

An engineer must use Cisco AVC on a Cisco WLC to prioritize Cisco IP cameras that use the wireless network. Which element do you configure in a rule?

Options:

A.

permit-ACL

B.

WMM required

C.

mark

D.

rate-limit

Buy Now
Questions 24

During the EAP process and specifically related to the client authentication session, which encrypted key is sent from the RADIUS server to the access point?

Options:

A.

WPA key

B.

session key

C.

encryption key

D.

shared-secret key

Buy Now
Questions 25

An engineer configures the wireless LAN controller to perform 802.1x user authentication. Which configuration must be enabled to ensure that client devices can connect to the wireless, even when WLC cannot communicate with the RADIUS?

Options:

A.

pre-authentication

B.

local EAP

C.

authentication caching

D.

Cisco Centralized Key Management

Buy Now
Questions 26

An enterprise has two WLANs configured on WLC. It is reported that when converting APs to FlexConnect mode, WLAN A works but WLAN B does not. When converting APs to local mode, WLAN B works, but WLAN A does not. Which action is needed to complete this configuration?

Options:

A.

Create a Cisco FlexConnect group with WLAN-VLAN mapping.

B.

Disable local switching on the WLANs.

C.

Map the AP group to the WLAN interface.

D.

Join the APs to a Cisco FlexConnect group.

Buy Now
Questions 27

Which devices can be tracked with the Cisco Context Aware Services?

Options:

A.

wired and wireless devices

B.

wireless devices

C.

wired devices

D.

Cisco certified wireless devices

Buy Now
Questions 28

An engineer configures the wireless LAN controller to perform 802.1x user authentication. Which configuration must be enabled to ensure that client devices can connect to the wireless, even when WLC cannot communicate with the RADIUS?

Options:

A.

pre-authentication

B.

local EAP

C.

authentication caching

D.

Cisco Centralized Key Management

Buy Now
Questions 29

An engineer is assembling a PCI report for compliance purposes and must include missed best practices that are related to WLAN controllers. The engineer has access to all WLCs, Cisco MSE, and Cisco Prime Infrastructure. Which method most efficiently displays a summary of inconsistencies?

Options:

A.

WLC running-config

B.

Cisco Prime Infrastructure monitoring

C.

Cisco Prime Infrastructure reporting

D.

WLC logs

Buy Now
Questions 30

An engineer must track guest traffic flow using the WLAN infrastructure. Which Cisco CMX feature must be configured and used to accomplish this tracking?

Options:

A.

analytics

B.

connect and engage

C.

presence

D.

detect and locate

Buy Now
Questions 31

A hospital wants to offer indoor directions to patient rooms utilizing its existing wireless infrastructure. The wireless network has been using location services specifications. Which two components must be installed to support this requirement? (Choose two.)

Options:

A.

WIPS

B.

Cisco MSE

C.

Cisco CMX Visitor Connect

D.

Cisco CMX AppEngage

E.

Cisco CMX Analytics

Buy Now
Questions 32

An engineer needs read/write access to rename access points and add them to the correct AP groups on a wireless controller. Using Cisco ISE TACACS, which custom attributes is the minimum required?

Options:

A.

role1=WLAN

B.

role1=WLAN role2=SECURITY

C.

role1=WLAN role2=WIRELESS

D.

role1=WIRELESS

Buy Now
Questions 33

What is the Cisco recommended configuration for a Cisco switch port connected to an AP in local mode for optimal voice over WLAN performance with an 8821 wireless phone?

Options:

A.

switchport encapsulation dot1q

switchport mode trunk

mls qos trust device cisco-phone

B.

switchport mode access

mls qos trust device cisco-phone

C.

switchport mode access mls qos trust cos

D.

switchport mode access mls qos trust dscp

Buy Now
Questions 34

A network administrator managing a Cisco Catalyst 9800 WLC must place all iOS-connected devices to the guest SSID on VLAN 101. The rest of the clients must connect on VLAN 102 to distribute load across subnets. To achieve this configuration, the administrator configures a local policy on the WLC. Which two configurations are required? (Choose two.)

Options:

A.

Assign a policy map under global security policy settings.

B.

Add local profiling policy under global security policy settings.

C.

Create a service template.

D.

Allow HTTP and DHCP profiling under policy map.

E.

Enable device classification on global wireless settings.

Buy Now
Questions 35

Refer to the exhibit.

An engineer must restrict some subnets to have access to the WLC. When the CPU ACL function is enabled, no ACLs in the drop-down list are seen. What is the cause of the problem?

Options:

A.

The ACL does not have a rule that is specified to the Management interface.

B.

No ACLs have been created under the Access Control List tab.

C.

When the ACL is created, it must be specified that it is a CPU ACL.

D.

This configuration must be performed through the CLI and not though the web GUI.

Buy Now
Questions 36

A network engineer must segregate all IPads on the guest WLAN to a separate VLAN. How does the engineer accomplish this task without using Cisco

ISE?

Options:

A.

Create a local policy on the WLC.

B.

Use 802.1x authentication to profile the devices.

C.

Use an mDNS profile for the iPad device.

D.

Enable RADIUS DHCP profiling on the WLAN.

Buy Now
Questions 37

The CTO of an organization wants to ensure that all Android devices are placed into a separate VLAN on their wireless network. However, the CTO does not want to deploy ISE. Which feature must be implemented on the Cisco WLC?

Options:

A.

WLAN local policy

B.

RADIUS server overwrite interface

C.

AAA override

D.

custom AVC profile

Buy Now
Questions 38

A FlexConnect remote office deployment is using five 2702i APs indoors and two 1532i APs outdoors. When a code upgrade is performed and FlexConnect Smart AP Image Upgrade is leveraged, but no FlexConnect Master AP has been configured, how many image transfers between the WLC and APs will occur?

Options:

A.

1

B.

2

C.

5

D.

7

Buy Now
Questions 39

An engineer has implemented advanced location services for a retail wireless deployment. The marketing department wants to collect user demographic information in exchange for guest WLAN access and to have a customized portal per location hosted by the provider. Which social connector must be tied into Cisco CMX to provide this service?

Options:

A.

Gmail

B.

Google+

C.

Facebook

D.

MySpace

Buy Now
Questions 40

After receiving an alert about a rogue AP, a network engineer logs into Cisco Prime Infrastructure and looks at the floor map where the AP that detected the rogue is located. The map is synchronized with a mobility services engine that determines that the rogue device is actually inside the campus. The engineer determines that the rogue is a security threat and decides to stop if from broadcasting inside the enterprise wireless network. What is the fastest way to disable the rogue?

Options:

A.

Go to the location where the rogue device is indicated to be and disable the power.

B.

Create an SSID similar to the rogue to disable clients from connecting to it.

C.

Update the status of the rogue in Cisco Prime Infrastructure to contained.

D.

Classify the rogue as malicious in Cisco Prime Infrastructure.

Buy Now
Questions 41

A network engineer is deploying 8865 IP phones with wireless clients connected to them. In order to apply the appropriate QoS, the IP voice traffic needs to be distinguished from client data traffic. Which switch configuration feature must be enabled?

Options:

A.

Voice VLAN

B.

QBSS

C.

WME

D.

QoS routing

Buy Now
Questions 42

An engineer must track guest traffic flow using the WLAN infrastructure. Which Cisco CMX feature must be configured and used to accomplish this tracking?

Options:

A.

analytics

B.

connect and engage

C.

presence

D.

detect and locate

Buy Now
Questions 43

A corporation has recently implemented a BYOD policy at their HQ. Which two risks should the security director be concerned about? (Choose two.)

Options:

A.

network analyzers

B.

malware

C.

lost and stolen devices

D.

keyloggers

E.

unauthorized users

Buy Now
Questions 44

Which EAP method can an AP use to authenticate to the wired network?

Options:

A.

EAP-GTC

B.

EAP-MD5

C.

EAP-TLS

D.

EAP-FAST

Buy Now
Questions 45

On a branch office deployment, it has been noted that if the FlexConnect AP is in standalone mode and loses connection to the WLC, all clients are disconnected, and the SSID is no longer advertised. Considering that FlexConnect local switching is enabled, which setting is causing this behavior?

Options:

A.

ISE NAC is enabled

B.

802.11r Fast Transition is enabled

C.

Client Exclusion is enabled

D.

FlexConnect Local Auth is disabled

Buy Now
Questions 46

A customer wants to allow employees to easily onboard their personal devices to the wireless network. The visitors also must be able to connect to the same network without the need to engage with anyone from the reception desk. Which process must be configured on Cisco ISE to support this requirement?

Options:

A.

MAC authentication bypass

B.

native supplicant provisioning

C.

local web auth

D.

self-registration guest portal

Buy Now
Questions 47

You enter the command or a Cisco Catalyst 3850 Series Switch that runs Cisco ISO XE. What does the command do?

Options:

A.

It defines the user identity or the device identity to be validated by the RADIUS server.

B.

It captures information on the length of the authorized session, as well as the bandwidth usage of the client.

C.

It defines the RADIUS server used to track which sessions are still active.

D.

It defines the level of access of the user or the device.

Buy Now
Questions 48

Where is Cisco Hyperlocation enabled on a Cisco Catalyst 9800 Series Wireless Controller web interface?

Options:

A.

Policy Profile

B.

AP Join Profile

C.

Flex Profile

D.

RF Profile

Buy Now
Questions 49

What is the maximum time range that can be viewed on the Cisco DNA Center issues and alarms page?

Options:

A.

3 hours

B.

24 hours

C.

3 days

D.

7 days

Buy Now
Questions 50

A shopping center uses AireOS controllers with Cisco Wave 2 APs. A separate WLAN named Guest-012345678-WLAN is used for guest wireless clients. Management needs location analytics to determine popular areas. CMX must track only associated clients. What must be selected on the CMX server settings?

Options:

A.

Exclude probing clients

B.

Duty Cycle Cutoff

C.

Enable Locally Administered MAC Filtering

D.

Enable Location MAC Filtering

Buy Now
Questions 51

Which three properties are used for client profiling of wireless clients? (Choose three.)

Options:

A.

HTTP user agent

B.

DHCP

C.

MAC OUI

D.

hostname

E.

OS version

F.

IP address

Buy Now
Questions 52

On a Cisco Catalyst 9800 Series Wireless Controller, an engineer wants to prevent a FlexConnect AP from allowing wireless clients to connect when its Ethernet connection is nonoperational. Which command set prevents this connection?

Options:

A.

config terminal

wireless flexconnect profile [profile name]

ethernet-fallback-enable

end

B.

config terminal

wireless flexconnect profile [profile name]

fallback-radio-shut

end

C.

config terminal

wireless profile flex [profile name]

fallback-radio-shut

end

D.

config terminal

wireless profile flex [profile name]

ethernet-fallback-enable

end

Buy Now
Questions 53

What is the default IEEE 802.1x AP authentication configuration on a Cisco Catalyst 9800 Series Wireless Controller?

Options:

A.

EAP-PEAP with 802.1x port authentication

B.

EAP-TLS with 802.1x port authentication

C.

EAP-FAST with CAPWAP DTLS + port authentication

D.

EAP-FAST with CAPWAP DTLS

Buy Now
Questions 54

A customer is concerned that their wireless network is detecting spurious threats from channels that are not being used by their wireless infrastructure. Which two technologies must they deploy? (Choose two.)

Options:

A.

FlexConnect mode

B.

monitor mode

C.

sniffer mode with no submode

D.

local mode with WIPS submode

E.

rogue detector mode

Buy Now
Questions 55

What must be configured on the Global Configuration page of the WLC for an AP to use 802.1x to authenticate to the wired infrastructure?

Options:

A.

local access point credentials

B.

RADIUS shared secret

C.

TACACS server IP address

D.

supplicant credentials

Buy Now
Questions 56

An engineer has successfully implemented 10 active RFID tags in an office environment. The tags are not visible when the location accuracy is tested on the Cisco CMX Detect and Locate window. Which setting on Cisco CMX allows the engineer to view the tags?

Options:

A.

Enable RFID tags in tracking options.

B.

Enable probing clients for active tags.

C.

Define an RFID group globally and add the tags.

D.

Enable hyperlocation services for RFID.

Buy Now
Questions 57

What is the default NMSP echo interval between Cisco MSE and a Wireless LAN Controller?

Options:

A.

10 seconds

B.

15 seconds

C.

30 seconds

D.

60 seconds

Buy Now
Questions 58

An engineer is in the process of implementing Fastiane on a wireless network with a Mobility Express AP installed and Apple end-user devices. Due to a security concern, the IT department has updated all the iPads to version 14.5.423551943. Which QoS profile must the engineer configure on the user WLAN?

Options:

A.

Platinum

B.

Best Effort

C.

Bronze

D.

Silver

Buy Now
Questions 59

A network engineer is implementing BYOD on a wireless network. Based on the customer requirements, a dual SSID approach must be taken. Which two advanced WLAN configurations must be performed? (Choose two.)

Options:

A.

Set NAC State to Radius NAC.

B.

Set Allow AAA Override to Enabled.

C.

Set DHCP Addr. Assignment to Required.

D.

Select DHCP Profiling.

E.

Select Enable Session Timeout.

Buy Now
Questions 60

Refer to the exhibit.

Which COS to DSCP map must be modified to ensure that voice traffic is tagged correctly as it traverses the network?

Options:

A.

COS of 6 to DSCP 46

B.

COS of 3 to DSCP 26

C.

COS of 7 to DSCP 48

D.

COS of 5 to DSCP 46

Buy Now
Questions 61

An engineer set up identity-based networking with ISE and configured AAA override on the WLAN. Which two attributes must be used to change the client behavior from the default settings? (Choose two.)

Options:

A.

DHCP timeout

B.

DNS server

C.

IPv6 ACL

D.

DSCP value

E.

multicast address

Buy Now
Questions 62

A network is set up to support wired and wireless clients. Both types must authenticate using 802.1X before connecting to the network. Different types of client authentication must be separated on a Cisco ISE deployment. Which two configuration items achieve this task? (Choose two.)

Options:

A.

device profiles

B.

policy sets

C.

separate networks

D.

policy groups

E.

policy results

Buy Now
Questions 63

A corporation has a wireless network where all access points are configured in FlexConnect. The WLC has a Data WLAN and a VoWiFi WLAN implemented where centrally-switched SSID is configured for the APs. Which QoS configuration must be implemented for the wireless packets to maintain the marking across the wired and wireless network?

Options:

A.

Set QoS to Platinum.

B.

Enable CAC.

C.

Allow WMM.

D.

Trust DSCP.

Buy Now
Questions 64

Which two statements about the requirements for a Cisco Hyperlocation deployment are true? (Choose two.)

Options:

A.

After enabling Cisco Hyperlocation on Cisco CMX, the APs and the wireless LAN controller must be restarted.

B.

NTP can be configured, but that is not recommended.

C.

The Cisco Hyperlocation feature must be enabled on the wireless LAN controller and Cisco CMX.

D.

The Cisco Hyperlocation feature must be enabled only on the wireless LAN controller.

E.

If the Cisco CMX server is a VM, a high-end VM is needed for Cisco Hyperlocation deployments.

Buy Now
Exam Code: 300-430
Exam Name: Implementing Cisco Enterprise Wireless Networks (300-430 ENWLSI)
Last Update: Jan 23, 2025
Questions: 216
$61.25  $174.99
$47.25  $134.99
$40.25  $114.99
buy now 300-430