ExamGecko
Home Home / Cisco / 300-430

Cisco 300-430 Practice Test - Questions Answers, Page 14

Question list
Search
Search

List of questions

Search

Related questions











An engineer is implementing RADIUS to restrict administrative control to the network with the WLC management IP address of 192.168.1.10 and an AP subnet of 192.168.2.0/24. Which entry does the engineer define in the RADIUS server?

A.

administrative access defined on the WLC and the network range 192.168.2.0/255.255.254.0

A.

administrative access defined on the WLC and the network range 192.168.2.0/255.255.254.0

Answers
B.

NAS entry of the virtual interface and the network range 192.168.2.0/255.255.255.0

B.

NAS entry of the virtual interface and the network range 192.168.2.0/255.255.255.0

Answers
C.

shared secret defined on the WLC and the network range 192.168.1.0/255.255.254.0

C.

shared secret defined on the WLC and the network range 192.168.1.0/255.255.254.0

Answers
D.

WLC roles for commands and the network range 192.168.1.0/255.255.255.0

D.

WLC roles for commands and the network range 192.168.1.0/255.255.255.0

Answers
Suggested answer: A

A customer requires wireless traffic from the branch to be routed through the firewall at corporate headquarters. A RADIUS server is in each branch location. Which Cisco FlexConnect configuration must be used?

A.

central authentication and local switching

A.

central authentication and local switching

Answers
B.

central authentication and central switching

B.

central authentication and central switching

Answers
C.

local authentication and local switching

C.

local authentication and local switching

Answers
D.

local authentication and central switching

D.

local authentication and central switching

Answers
Suggested answer: D

Refer to the exhibit.

An engineer must restrict some subnets to have access to the WLC. When the CPU ACL function is enabled, no ACLs in the drop-down list are seen. What is the cause of the problem?

A.

The ACL does not have a rule that is specified to the Management interface.

A.

The ACL does not have a rule that is specified to the Management interface.

Answers
B.

No ACLs have been created under the Access Control List tab.

B.

No ACLs have been created under the Access Control List tab.

Answers
C.

When the ACL is created, it must be specified that it is a CPU ACL.

C.

When the ACL is created, it must be specified that it is a CPU ACL.

Answers
D.

This configuration must be performed through the CLI and not though the web GUI.

D.

This configuration must be performed through the CLI and not though the web GUI.

Answers
Suggested answer: B

An engineer configures the wireless LAN controller to perform 802.1x user authentication. Which configuration must be enabled to ensure that client devices can connect to the wireless, even when WLC cannot communicate with the RADIUS?

A.

pre-authentication

A.

pre-authentication

Answers
B.

local EAP

B.

local EAP

Answers
C.

authentication caching

C.

authentication caching

Answers
D.

Cisco Centralized Key Management

D.

Cisco Centralized Key Management

Answers
Suggested answer: B


An IT team is growing quickly and needs a solution for management device access. The solution must authenticate users from an external repository instead of the current local on the WLC, and it must also identify the user and determine what level of access users should have. Which protocol do you recommend to achieve these goals?

A.

network policy server

A.

network policy server

Answers
B.

RADIUS

B.

RADIUS

Answers
C.

TACACS+

C.

TACACS+

Answers
D.

LDAP

D.

LDAP

Answers
Suggested answer: C

Refer to the exhibit.

An engineer must connect a fork lift via a WGB to a wireless network and must authenticate the WGB certificate against the RADIUS server. Which three steps are required for this configuration?

(Choose three.)

A.

Configure the certificate, WLAN, and radio interface on WGB.

A.

Configure the certificate, WLAN, and radio interface on WGB.

Answers
B.

Configure the certificate on the WLC.

B.

Configure the certificate on the WLC.

Answers
C.

Configure WLAN to authenticate using ISE.

C.

Configure WLAN to authenticate using ISE.

Answers
D.

Configure the access point with the root certificate from ISE.

D.

Configure the access point with the root certificate from ISE.

Answers
E.

Configure WGB as a network device in ISE.

E.

Configure WGB as a network device in ISE.

Answers
F.

Configure a policy on ISE to allow devices to connect that validate the certificate.

F.

Configure a policy on ISE to allow devices to connect that validate the certificate.

Answers
Suggested answer: C, D, E

During the EAP process and specifically related to the client authentication session, which encrypted key is sent from the RADIUS server to the access point?

A.

WPA key

A.

WPA key

Answers
B.

session key

B.

session key

Answers
C.

encryption key

C.

encryption key

Answers
D.

shared-secret key

D.

shared-secret key

Answers
Suggested answer: B

A network is set up to support wired and wireless clients. Both types must authenticate using 802.1X before connecting to the network. Different types of client authentication must be separated on a Cisco ISE deployment. Which two configuration items achieve this task? (Choose two.)

A.

device profiles

A.

device profiles

Answers
B.

policy sets

B.

policy sets

Answers
C.

separate networks

C.

separate networks

Answers
D.

policy groups

D.

policy groups

Answers
E.

policy results

E.

policy results

Answers
Suggested answer: B, D

An engineer is troubleshooting a Cisco CMX high-availability deployment and notices that the primary and backup Cisco CMX servers are both considered primary. Which command must the engineer run on the backup server?

A.

cmxha convert backup

A.

cmxha convert backup

Answers
B.

cmxha backup convert

B.

cmxha backup convert

Answers
C.

cmxha secondary convert

C.

cmxha secondary convert

Answers
D.

cmxha convert secondary

D.

cmxha convert secondary

Answers
Suggested answer: B

A network administrator managing a Cisco Catalyst 9800-80 WLC must place all iOS connected devices to the guest SSID on VLAN 101. The rest of the clients must connect on VLAN 102 distribute load across subnets. To achieve this configuration, the administrator configures a local policy on the WLC. Which two configurations are required? (Choose two.)

A.

Assign a policy map under global security policy settings.

A.

Assign a policy map under global security policy settings.

Answers
B.

Add local profiling policy under global security policy settings.

B.

Add local profiling policy under global security policy settings.

Answers
C.

Create a service template.

C.

Create a service template.

Answers
D.

Allow HTTP and DHCP profiling under policy map.

D.

Allow HTTP and DHCP profiling under policy map.

Answers
E.

Enable device classification on global wireless settings.

E.

Enable device classification on global wireless settings.

Answers
Suggested answer: A, E
Total 216 questions
Go to page: of 22