Cisco 300-430 Practice Test - Questions Answers, Page 20
List of questions
Related questions
Which condition introduce security risk to a BYOD policy?
enterprise-managed MDM platform used for personal devices
access to LAN without implementing MDM solution
enforcement of BYOD access to internet only network
enterprise life-cycle enforcement of personal device refresh
An engineer has configured the wireless controller to authenticate clients on the employee SSID against Microsoft Active Directory using PEAP authentication.
Which protocol does the controller use to communicate with the authentication server?
EAP
802.1X
RADIUS
WPA2
An engineer is setting up a new unique NAD on a Cisco ISE.
Which two parameters must be configured? (Choose two.)
device host name
device password
RADIUS fallback
device IP address
RADIUS shared secret
An engineer is considering an MDM integration with Cisco ISE to assist with security for lost devices.
Which two functions of MDM increase security for lost devices that access data from the network?
(Choose two.)
PIN enforcement
Jailbreak/root detection
data wipe
data encryption
data loss prevention
An engineer is adding APs to an existing VolMLAN to allow for location based services. Which option will the primary change be to the network?
increased transmit power on all APs
moving to a bridging model
AP footprint
cell overlap would decrease
triangulation of devices
A network engineer is configuring a Cisco AireOS WLC environment for central web authentication using Cisco ISE.
The controllers are configured using auto-anchor for the guest network.
Which three components must be implemented for the foreign WLC?(Choose three.)
DHCP RADIUS profiling enabled.
HTTP RADIUS profiling enabled.
UDP/1812-1813 open to ISE
downloadable preauth ACL on ISE
local preauth ACL on WLC
WLAN Layer 2 security
An engineer is troubleshooting rogue access points that are showing up in Cisco Prime Infrastructure.
What is maximum number of APS the engineer can use to contain an identified rogue access point in the WLC?
3
4
6
5
A company is deploying wireless PCs on forklifts within its new 10,000-square-foot(3048-squarerneter) facility.
The clients are configured for PEAP-MS-CHAPv2 with WPA TKIP. Users report that applications frequently drop when the clients roam between access points on the floor. A professional site survey was completed.
Which configuration change is recommended to improve the speed of client roaming?
EAP-FAST
EAP-TLS
WPAAES
WPA2AES
An engineer has configured passive fallback mode for RADIUS with default timer settings. What will occur when the primary RADIUS fails then recovers?
RADIUS requests will be sent to the secondary RADIUS server until the secondary fails to respond.
The controller will immediately revert back after it receives a RADIUS probe from the primary server.
After the inactive time expires the controller will send RADIUS to the primary.
Once RADIUS probe messages determine the primary controller is active the controller will revert back to the primary RADIUS.
You are configuring the social login for a guest network. Which three options are configurable social connectors in Cisco CMX Visitor Connect? (Chose three)
Linkedn
Medium
Google+
Myspace
Question