ExamGecko
Home Home / Cisco / 300-430

Cisco 300-430 Practice Test - Questions Answers, Page 20

Question list
Search
Search

List of questions

Search

Related questions











Which condition introduce security risk to a BYOD policy?

A.

enterprise-managed MDM platform used for personal devices

A.

enterprise-managed MDM platform used for personal devices

Answers
B.

access to LAN without implementing MDM solution

B.

access to LAN without implementing MDM solution

Answers
C.

enforcement of BYOD access to internet only network

C.

enforcement of BYOD access to internet only network

Answers
D.

enterprise life-cycle enforcement of personal device refresh

D.

enterprise life-cycle enforcement of personal device refresh

Answers
Suggested answer: B

An engineer has configured the wireless controller to authenticate clients on the employee SSID against Microsoft Active Directory using PEAP authentication.

Which protocol does the controller use to communicate with the authentication server?

A.

EAP

A.

EAP

Answers
B.

802.1X

B.

802.1X

Answers
C.

RADIUS

C.

RADIUS

Answers
D.

WPA2

D.

WPA2

Answers
Suggested answer: C

An engineer is setting up a new unique NAD on a Cisco ISE.

Which two parameters must be configured? (Choose two.)

A.

device host name

A.

device host name

Answers
B.

device password

B.

device password

Answers
C.

RADIUS fallback

C.

RADIUS fallback

Answers
D.

device IP address

D.

device IP address

Answers
E.

RADIUS shared secret

E.

RADIUS shared secret

Answers
Suggested answer: A, D


An engineer is considering an MDM integration with Cisco ISE to assist with security for lost devices.

Which two functions of MDM increase security for lost devices that access data from the network?

(Choose two.)

A.

PIN enforcement

A.

PIN enforcement

Answers
B.

Jailbreak/root detection

B.

Jailbreak/root detection

Answers
C.

data wipe

C.

data wipe

Answers
D.

data encryption

D.

data encryption

Answers
E.

data loss prevention

E.

data loss prevention

Answers
Suggested answer: A, C

An engineer is adding APs to an existing VolMLAN to allow for location based services. Which option will the primary change be to the network?

A.

increased transmit power on all APs

A.

increased transmit power on all APs

Answers
B.

moving to a bridging model

B.

moving to a bridging model

Answers
C.

AP footprint

C.

AP footprint

Answers
D.

cell overlap would decrease

D.

cell overlap would decrease

Answers
E.

triangulation of devices

E.

triangulation of devices

Answers
Suggested answer: C

A network engineer is configuring a Cisco AireOS WLC environment for central web authentication using Cisco ISE.

The controllers are configured using auto-anchor for the guest network.

Which three components must be implemented for the foreign WLC?(Choose three.)

A.

DHCP RADIUS profiling enabled.

A.

DHCP RADIUS profiling enabled.

Answers
B.

HTTP RADIUS profiling enabled.

B.

HTTP RADIUS profiling enabled.

Answers
C.

UDP/1812-1813 open to ISE

C.

UDP/1812-1813 open to ISE

Answers
D.

downloadable preauth ACL on ISE

D.

downloadable preauth ACL on ISE

Answers
E.

local preauth ACL on WLC

E.

local preauth ACL on WLC

Answers
F.

WLAN Layer 2 security

F.

WLAN Layer 2 security

Answers
Suggested answer: A, C, F

An engineer is troubleshooting rogue access points that are showing up in Cisco Prime Infrastructure.

What is maximum number of APS the engineer can use to contain an identified rogue access point in the WLC?

A.

3

A.

3

Answers
B.

4

B.

4

Answers
C.

6

C.

6

Answers
D.

5

D.

5

Answers
Suggested answer: B

A company is deploying wireless PCs on forklifts within its new 10,000-square-foot(3048-squarerneter) facility.

The clients are configured for PEAP-MS-CHAPv2 with WPA TKIP. Users report that applications frequently drop when the clients roam between access points on the floor. A professional site survey was completed.

Which configuration change is recommended to improve the speed of client roaming?

A.

EAP-FAST

A.

EAP-FAST

Answers
B.

EAP-TLS

B.

EAP-TLS

Answers
C.

WPAAES

C.

WPAAES

Answers
D.

WPA2AES

D.

WPA2AES

Answers
Suggested answer: D

An engineer has configured passive fallback mode for RADIUS with default timer settings. What will occur when the primary RADIUS fails then recovers?

A.

RADIUS requests will be sent to the secondary RADIUS server until the secondary fails to respond.

A.

RADIUS requests will be sent to the secondary RADIUS server until the secondary fails to respond.

Answers
B.

The controller will immediately revert back after it receives a RADIUS probe from the primary server.

B.

The controller will immediately revert back after it receives a RADIUS probe from the primary server.

Answers
C.

After the inactive time expires the controller will send RADIUS to the primary.

C.

After the inactive time expires the controller will send RADIUS to the primary.

Answers
D.

Once RADIUS probe messages determine the primary controller is active the controller will revert back to the primary RADIUS.

D.

Once RADIUS probe messages determine the primary controller is active the controller will revert back to the primary RADIUS.

Answers
Suggested answer: C

You are configuring the social login for a guest network. Which three options are configurable social connectors in Cisco CMX Visitor Connect? (Chose three)

A.

Linkedn

A.

Linkedn

Answers
B.

Pinterest

B.

Pinterest

Answers
C.

Medium

C.

Medium

Answers
D.

Google+

D.

Google+

Answers
E.

Facebook

E.

Facebook

Answers
F.

Myspace

F.

Myspace

Answers
Suggested answer: A, D, E
Total 216 questions
Go to page: of 22