ExamGecko
Home Home / Cisco / 300-430

Cisco 300-430 Practice Test - Questions Answers

Question list
Search
Search

List of questions

Search

Related questions











A customer managing a large network has implemented location services. Due to heavy load, it is needed to load balance the data coming through NMSP from the WLCs. Load must be spread between multiple CMX servers to help optimize the data flow for APs. Which configuration in CMX meets this requirement?

A.

cmxctl config feature flags nmsplb.cmx-ap-grouping true

A.

cmxctl config feature flags nmsplb.cmx-ap-grouping true

Answers
B.

cmxctl config feature flags nmsplb.cmxgrouping true

B.

cmxctl config feature flags nmsplb.cmxgrouping true

Answers
C.

cmxctl config feature flags nmsplb.cmx-loadbalance true

C.

cmxctl config feature flags nmsplb.cmx-loadbalance true

Answers
D.

cmxctl config feature flags nmsplb.cmx-rssi-distribute true

D.

cmxctl config feature flags nmsplb.cmx-rssi-distribute true

Answers
Suggested answer: B

Explanation:

Reference: https://www.cisco.com/c/en/us/td/docs/wireless/mse/10-6/cmx_command/cmxcli106/cmxcli1051_chapter_010.html#wp7273815000

https://www.cisco.com/c/en/us/support/docs/wireless/connected-mobile-experiences/214894-optimize-cmx-performance.html

An engineer needs to provision certificates on a Cisco Catalyst 9800 Series Wireless Controller. The customer uses a third-party CA server. Which protocol must be used between the controller and CA server to request and install certificates?

A.

SCEP

A.

SCEP

Answers
B.

TLS

B.

TLS

Answers
C.

LDAP

C.

LDAP

Answers
D.

SSL

D.

SSL

Answers
Suggested answer: A

Explanation:

Reference: https://www.cisco.com/c/en/us/td/docs/wireless/controller/9800/configguide/trustpoints/b-configuring-trustpoints-on-cisco-catalyst-9800- series-controllers/c-workflow-toconfigure-a-trustpoint-for-a-third-party-certificate-on-catalyst-9800.html

A corporation has recently implemented a BYOD policy at their HQ. Which two risks should the security director be concerned about? (Choose two.)

A.

network analyzers

A.

network analyzers

Answers
B.

malware

B.

malware

Answers
C.

lost and stolen devices

C.

lost and stolen devices

Answers
D.

keyloggers

D.

keyloggers

Answers
E.

unauthorized users

E.

unauthorized users

Answers
Suggested answer: B, C

When implementing self-registration for guest/BYOD devices, what happens when an employee tries to connect four devices to the network at the same time?

A.

The last device is removed and the newly added device is updated as active device.

A.

The last device is removed and the newly added device is updated as active device.

Answers
B.

The registration is allowed, but only one device is connected at any given time.

B.

The registration is allowed, but only one device is connected at any given time.

Answers
C.

All devices are allowed on the network simultaneously.

C.

All devices are allowed on the network simultaneously.

Answers
D.

Purge time dictates how long a device is registered to the portal.

D.

Purge time dictates how long a device is registered to the portal.

Answers
Suggested answer: B

What is an important consideration when implementing a dual SSID design for BYOD?

A.

After using the provisioning SSID, an ACL that used to make the client switch SSIDs forces the user to associate and traverse the network by MAC filtering.

A.

After using the provisioning SSID, an ACL that used to make the client switch SSIDs forces the user to associate and traverse the network by MAC filtering.

Answers
B.

If multiple WLCs are used, the WLAN IDs must be exact for the clients to be provisioned and traverse the network correctly.

B.

If multiple WLCs are used, the WLAN IDs must be exact for the clients to be provisioned and traverse the network correctly.

Answers
C.

SSIDs for this setup must be configured with NAC State-RADIUS NAC for the clients to authenticate with Cisco ISE, or with NAC State-ISE NAC for Cisco ISE to associate the client.

C.

SSIDs for this setup must be configured with NAC State-RADIUS NAC for the clients to authenticate with Cisco ISE, or with NAC State-ISE NAC for Cisco ISE to associate the client.

Answers
D.

One SSID is for provisioning and the other SSID is for gaining access to the network. The use of an ACL should not be enforced to make the client connect to the REAL SSID after provisioning.

D.

One SSID is for provisioning and the other SSID is for gaining access to the network. The use of an ACL should not be enforced to make the client connect to the REAL SSID after provisioning.

Answers
Suggested answer: D

Refer to the exhibit.

A network administrator deploys the DHCP profiler service in two ISE servers: 10.3.10.101 and 10.3.10.102. All BYOD devices connecting to WLAN on VLAN63 have been incorrectly profiled and are assigned as unknown profiled endpoints. Which action efficiently rectifies the issue according to Cisco recommendations?

A.

Nothing needed to be added on the Cisco WLC or VLAN interface. The ISE configuration must be fixed.

A.

Nothing needed to be added on the Cisco WLC or VLAN interface. The ISE configuration must be fixed.

Answers
B.

Disable DHCP proxy on the Cisco WLC.

B.

Disable DHCP proxy on the Cisco WLC.

Answers
C.

Disable DHCP proxy on the Cisco WLC and run the ip helper-address command under the VLAN interface to point to DHCP and the two ISE servers.

C.

Disable DHCP proxy on the Cisco WLC and run the ip helper-address command under the VLAN interface to point to DHCP and the two ISE servers.

Answers
D.

Keep DHCP proxy enabled on the Cisco WLC and define helper-address under the VLAN interface to point to the two ISE servers.

D.

Keep DHCP proxy enabled on the Cisco WLC and define helper-address under the VLAN interface to point to the two ISE servers.

Answers
Suggested answer: C

On a branch office deployment, it has been noted that if the FlexConnect AP is in standalone mode and loses connection to the WLC, all clients are disconnected, and the SSID is no longer advertised.

Considering that FlexConnect local switching is enabled, which setting is causing this behavior?

A.

ISE NAC is enabled

A.

ISE NAC is enabled

Answers
B.

802.11r Fast Transition is enabled

B.

802.11r Fast Transition is enabled

Answers
C.

Client Exclusion is enabled

C.

Client Exclusion is enabled

Answers
D.

FlexConnect Local Auth is disabled

D.

FlexConnect Local Auth is disabled

Answers
Suggested answer: D

An engineer must implement intrusion protection on the WLAN. The AP coverage is adequate and on-channel attacks are the primary concern. The building is historic, which makes adding APs difficult. Which AP mode and submode must be implemented?

A.

AP mode: local, AP submode: none

A.

AP mode: local, AP submode: none

Answers
B.

AP mode: monitor, AP submode: WIPS

B.

AP mode: monitor, AP submode: WIPS

Answers
C.

AP mode: monitor, AP submode: none

C.

AP mode: monitor, AP submode: none

Answers
D.

AP mode: local, AP submode: WIPS

D.

AP mode: local, AP submode: WIPS

Answers
Suggested answer: D

An engineer is implementing a FlexConnect group for access points at a remote location using local switching but central DHCP. Which client feature becomes available only if this configuration is changed?

A.

multicast

A.

multicast

Answers
B.

static IP

B.

static IP

Answers
C.

fast roaming

C.

fast roaming

Answers
D.

mDNS

D.

mDNS

Answers
Suggested answer: B

A FlexConnect remote office deployment is using five 2702i APs indoors and two 1532i APs outdoors.

When a code upgrade is performed and FlexConnect Smart AP Image Upgrade is leveraged, but no FlexConnect Master AP has been configured, how many image transfers between the WLC and APs will occur?

A.

1

A.

1

Answers
B.

2

B.

2

Answers
C.

5

C.

5

Answers
D.

7

D.

7

Answers
Suggested answer: B
Total 216 questions
Go to page: of 22