Cisco 300-425 Practice Test - Questions Answers, Page 4
Related questions
Which statement about creating a mobility group is true, excluding mobility anchors?
Each WLC must use the same mobility name and be defined as a peer in each other's static mobility members list.
If WLCs with HA SSO are deployed, each WLC in the WLC HA pair considered separately as a mobility peer.
The WLCs do not have to be of the same model or type to be a member of a mobility group, however each member should be running different software versions.
A mobility groups does not require all WLCs in the group to use the same virtual IP address.
A wireless network consultant must assess an existing wireless LAN controller. Which section must the consultant check before replacing the old APs with APs that are IEEE 802.11ac-capable?
number of AP licenses
controller PSU
throughput capacity
software version
A customer is concerned about mesh backhaul link security. Which level of encryption does the backhaul link use?
hash
AES
WEP
3DES
Clustering Cisco WLCs into a single RF group enables the RRM algorithms to scale beyond the capabilities of a single Cisco WLC. How many WLC and APs in an RF group can the controller software scale up to in WLC release 8.9 depending on the platform?
up to 20 WLCs and 1000 APs
up to 20 WLCs and 3000 APs
up to 20 WLCs and 4000 APs
up to 20 WLCs and 6000 APs
An engineer must create data link redundancy for the company's Cisco Wireless LAN controller. The engineer has decided to configure LAG-based redundancy instead of port-based redundancy. Which three features of LAG-based redundancy influenced this decision? (Choose three.)
Packets are always sent out on the same port they are received on.
All interface traffic passes as long as one port is up.
The same port has multiple untagged dynamic interfaces.
Interface connection to two separate nonstacked switches is available.
Full bandwidth of all links is available.
Ports are grouped into multiple LAGs.
An engineer must speed up the reauthentication delays that are being experienced on the wireless infrastructure by deploying a key-caching mechanism. Which mechanism must be configured?
PEAP
FT
PMF
GTK-randomization
A customer is running a guest WLAN with a foreign/export-anchor setup. There is one anchor WLC in the US and two in Europe. Anchor WLC priorities are used to prefer local anchors. During a routine network audit, it is discovered that a large number of guest client sessions in the US are anchored to the WLCs in Europe. Which reason explains this behavior?
The foreign WLC failed and recovered.
The US anchor WLC failed and recovered.
The US anchor WLC is anchored to itself with a priority value of zero.
The anchor WLC is in the same mobility group.
Which non-Wi-Fi interferer can be identified by Metageek Chanalyzer?
PDAs
jammers
smartphones
printers
Which statement about the 9800 Series Wireless Controller mobility tunnel on a Cisco Catalyst 9800 controller is true?
It is an IPsec tunnel with control path only.
It is a CAPWAP tunnel with data path only.
It is a CAPWAP tunnel with control path and data path.
It is an IPsec tunnel with control path and data path.
An engineer has successfully configured high availability and SSO using two Cisco 5508 Wireless LAN Controllers. The engineer can access the Active Primary WLC, but the Secondary Standby WLC is not accessible. Which two methods allow access to the standby unit? (Choose two.)
via the console connection
SSH to the redundancy management interface of the primary WLC
SSH to the service port interface
SSH to the virtual interface of the secondary WLC
SSH to the management interface of the primary WLC
Question