Cisco 300-430 Practice Test - Questions Answers, Page 14
List of questions
Related questions
An engineer is implementing RADIUS to restrict administrative control to the network with the WLC management IP address of 192.168.1.10 and an AP subnet of 192.168.2.0/24. Which entry does the engineer define in the RADIUS server?
administrative access defined on the WLC and the network range 192.168.2.0/255.255.254.0
NAS entry of the virtual interface and the network range 192.168.2.0/255.255.255.0
shared secret defined on the WLC and the network range 192.168.1.0/255.255.254.0
WLC roles for commands and the network range 192.168.1.0/255.255.255.0
A customer requires wireless traffic from the branch to be routed through the firewall at corporate headquarters. A RADIUS server is in each branch location. Which Cisco FlexConnect configuration must be used?
central authentication and local switching
central authentication and central switching
local authentication and local switching
local authentication and central switching
Refer to the exhibit.
An engineer must restrict some subnets to have access to the WLC. When the CPU ACL function is enabled, no ACLs in the drop-down list are seen. What is the cause of the problem?
The ACL does not have a rule that is specified to the Management interface.
No ACLs have been created under the Access Control List tab.
When the ACL is created, it must be specified that it is a CPU ACL.
This configuration must be performed through the CLI and not though the web GUI.
An engineer configures the wireless LAN controller to perform 802.1x user authentication. Which configuration must be enabled to ensure that client devices can connect to the wireless, even when WLC cannot communicate with the RADIUS?
pre-authentication
local EAP
authentication caching
Cisco Centralized Key Management
An IT team is growing quickly and needs a solution for management device access. The solution must authenticate users from an external repository instead of the current local on the WLC, and it must also identify the user and determine what level of access users should have. Which protocol do you recommend to achieve these goals?
network policy server
RADIUS
TACACS+
LDAP
Refer to the exhibit.
An engineer must connect a fork lift via a WGB to a wireless network and must authenticate the WGB certificate against the RADIUS server. Which three steps are required for this configuration?
(Choose three.)
Configure the certificate, WLAN, and radio interface on WGB.
Configure the certificate on the WLC.
Configure WLAN to authenticate using ISE.
Configure the access point with the root certificate from ISE.
Configure WGB as a network device in ISE.
Configure a policy on ISE to allow devices to connect that validate the certificate.
During the EAP process and specifically related to the client authentication session, which encrypted key is sent from the RADIUS server to the access point?
WPA key
session key
encryption key
shared-secret key
A network is set up to support wired and wireless clients. Both types must authenticate using 802.1X before connecting to the network. Different types of client authentication must be separated on a Cisco ISE deployment. Which two configuration items achieve this task? (Choose two.)
device profiles
policy sets
separate networks
policy groups
policy results
An engineer is troubleshooting a Cisco CMX high-availability deployment and notices that the primary and backup Cisco CMX servers are both considered primary. Which command must the engineer run on the backup server?
cmxha convert backup
cmxha backup convert
cmxha secondary convert
cmxha convert secondary
A network administrator managing a Cisco Catalyst 9800-80 WLC must place all iOS connected devices to the guest SSID on VLAN 101. The rest of the clients must connect on VLAN 102 distribute load across subnets. To achieve this configuration, the administrator configures a local policy on the WLC. Which two configurations are required? (Choose two.)
Assign a policy map under global security policy settings.
Add local profiling policy under global security policy settings.
Create a service template.
Allow HTTP and DHCP profiling under policy map.
Enable device classification on global wireless settings.
Question