ExamGecko
Home Home / Cisco / 300-425

Cisco 300-425 Practice Test - Questions Answers, Page 4

Question list
Search
Search

List of questions

Search

Related questions











Which statement about creating a mobility group is true, excluding mobility anchors?

A.

Each WLC must use the same mobility name and be defined as a peer in each other's static mobility members list.

A.

Each WLC must use the same mobility name and be defined as a peer in each other's static mobility members list.

Answers
B.

If WLCs with HA SSO are deployed, each WLC in the WLC HA pair considered separately as a mobility peer.

B.

If WLCs with HA SSO are deployed, each WLC in the WLC HA pair considered separately as a mobility peer.

Answers
C.

The WLCs do not have to be of the same model or type to be a member of a mobility group, however each member should be running different software versions.

C.

The WLCs do not have to be of the same model or type to be a member of a mobility group, however each member should be running different software versions.

Answers
D.

A mobility groups does not require all WLCs in the group to use the same virtual IP address.

D.

A mobility groups does not require all WLCs in the group to use the same virtual IP address.

Answers
Suggested answer: B

Explanation:

A wireless network consultant must assess an existing wireless LAN controller. Which section must the consultant check before replacing the old APs with APs that are IEEE 802.11ac-capable?

A.

number of AP licenses

A.

number of AP licenses

Answers
B.

controller PSU

B.

controller PSU

Answers
C.

throughput capacity

C.

throughput capacity

Answers
D.

software version

D.

software version

Answers
Suggested answer: A

Explanation:

https://www.cisco.com/c/en/us/products/collateral/wireless/catalyst-9100ax-access-points/nb-06-802-11ax-faq-cte-en.html

A customer is concerned about mesh backhaul link security. Which level of encryption does the backhaul link use?

A.

hash

A.

hash

Answers
B.

AES

B.

AES

Answers
C.

WEP

C.

WEP

Answers
D.

3DES

D.

3DES

Answers
Suggested answer: B

Explanation:

Clustering Cisco WLCs into a single RF group enables the RRM algorithms to scale beyond the capabilities of a single Cisco WLC. How many WLC and APs in an RF group can the controller software scale up to in WLC release 8.9 depending on the platform?

A.

up to 20 WLCs and 1000 APs

A.

up to 20 WLCs and 1000 APs

Answers
B.

up to 20 WLCs and 3000 APs

B.

up to 20 WLCs and 3000 APs

Answers
C.

up to 20 WLCs and 4000 APs

C.

up to 20 WLCs and 4000 APs

Answers
D.

up to 20 WLCs and 6000 APs

D.

up to 20 WLCs and 6000 APs

Answers
Suggested answer: D

Explanation:

https://www.cisco.com/c/en/us/td/docs/wireless/controller/8-9/config-guide/b_cg89/radio_resource_management.html

An engineer must create data link redundancy for the company's Cisco Wireless LAN controller. The engineer has decided to configure LAG-based redundancy instead of port-based redundancy. Which three features of LAG-based redundancy influenced this decision? (Choose three.)

A.

Packets are always sent out on the same port they are received on.

A.

Packets are always sent out on the same port they are received on.

Answers
B.

All interface traffic passes as long as one port is up.

B.

All interface traffic passes as long as one port is up.

Answers
C.

The same port has multiple untagged dynamic interfaces.

C.

The same port has multiple untagged dynamic interfaces.

Answers
D.

Interface connection to two separate nonstacked switches is available.

D.

Interface connection to two separate nonstacked switches is available.

Answers
E.

Full bandwidth of all links is available.

E.

Full bandwidth of all links is available.

Answers
F.

Ports are grouped into multiple LAGs.

F.

Ports are grouped into multiple LAGs.

Answers
Suggested answer: A, B, F

Explanation:

https://community.cisco.com/t5/wireless-mobility-documents/lag-link-aggregation/ta-p/3128669

An engineer must speed up the reauthentication delays that are being experienced on the wireless infrastructure by deploying a key-caching mechanism. Which mechanism must be configured?

A.

PEAP

A.

PEAP

Answers
B.

FT

B.

FT

Answers
C.

PMF

C.

PMF

Answers
D.

GTK-randomization

D.

GTK-randomization

Answers
Suggested answer: B

Explanation:

A customer is running a guest WLAN with a foreign/export-anchor setup. There is one anchor WLC in the US and two in Europe. Anchor WLC priorities are used to prefer local anchors. During a routine network audit, it is discovered that a large number of guest client sessions in the US are anchored to the WLCs in Europe. Which reason explains this behavior?

A.

The foreign WLC failed and recovered.

A.

The foreign WLC failed and recovered.

Answers
B.

The US anchor WLC failed and recovered.

B.

The US anchor WLC failed and recovered.

Answers
C.

The US anchor WLC is anchored to itself with a priority value of zero.

C.

The US anchor WLC is anchored to itself with a priority value of zero.

Answers
D.

The anchor WLC is in the same mobility group.

D.

The anchor WLC is in the same mobility group.

Answers
Suggested answer: B

Explanation:

https://www.cisco.com/c/en/us/td/docs/wireless/controller/8-1/Enterprise-Mobility-8-1-Design-Guide/Enterprise_Mobility_8-1_Deployment_Guide/WirelessNetwork_GuestAccessService.html

Which non-Wi-Fi interferer can be identified by Metageek Chanalyzer?

A.

PDAs

A.

PDAs

Answers
B.

jammers

B.

jammers

Answers
C.

smartphones

C.

smartphones

Answers
D.

printers

D.

printers

Answers
Suggested answer: B

Explanation:

https://www.metageek.com/training/resources/wifi-and-non-wifi-interference

Which statement about the 9800 Series Wireless Controller mobility tunnel on a Cisco Catalyst 9800 controller is true?

A.

It is an IPsec tunnel with control path only.

A.

It is an IPsec tunnel with control path only.

Answers
B.

It is a CAPWAP tunnel with data path only.

B.

It is a CAPWAP tunnel with data path only.

Answers
C.

It is a CAPWAP tunnel with control path and data path.

C.

It is a CAPWAP tunnel with control path and data path.

Answers
D.

It is an IPsec tunnel with control path and data path.

D.

It is an IPsec tunnel with control path and data path.

Answers
Suggested answer: C

Explanation:

https://www.cisco.com/c/en/us/td/docs/wireless/controller/9800/config-guide/b_wl_16_10_cg/mobility.html

An engineer has successfully configured high availability and SSO using two Cisco 5508 Wireless LAN Controllers. The engineer can access the Active Primary WLC, but the Secondary Standby WLC is not accessible. Which two methods allow access to the standby unit? (Choose two.)

A.

via the console connection

A.

via the console connection

Answers
B.

SSH to the redundancy management interface of the primary WLC

B.

SSH to the redundancy management interface of the primary WLC

Answers
C.

SSH to the service port interface

C.

SSH to the service port interface

Answers
D.

SSH to the virtual interface of the secondary WLC

D.

SSH to the virtual interface of the secondary WLC

Answers
E.

SSH to the management interface of the primary WLC

E.

SSH to the management interface of the primary WLC

Answers
Suggested answer: A, C

Explanation:

Total 195 questions
Go to page: of 20