Cisco 300-430 Practice Test - Questions Answers, Page 9

List of questions
Question 81

A wireless engineer must implement a corporate wireless network for a large company in the most efficient way possible. The wireless network must support 32 VLANs for 300 employees in different departments. Which solution must the engineer choose?
Question 82

Which feature on the Cisco Wireless LAN Controller must be present to support dynamic VLAN mapping?
Question 83

Which three properties are used for client profiling of wireless clients? (Choose three.)
Question 84

Which command set configures a Cisco Catalyst 9800 Series Wireless Controller so that the client traffic enters the network at the AP switch port?
Question 85

What is the default IEEE 802.1x AP authentication configuration on a Cisco Catalyst 9800 Series Wireless Controller?
Question 86

An engineer must implement rogue containment for an SSID. What is the maximum number of APs that should be used for containment?
Question 87

An engineer is following the proper upgrade path to upgrade a Cisco AireOS WLC from version 7.3 to 8.9. Which two ACLs for Cisco CWA must be configured when upgrading from the specified codes?
(Choose two.)
Question 88

CMX Facebook Wi-Fi allows access to the network before authentication. Which two elements are available? (Choose two.)
Question 89

An engineer is implementing Cisco Identity-Based Networking on a Cisco AireOS controller. The engineer has two ACLs on the controller. The first ACL, named BASE_ACL, is applied to the corporate_clients interface on the WLC, which is used for all corporate clients. The second ACL, named HR_ACL, is referenced by ISE in the Human Resources group policy. What is the resulting ACL when a Human Resources user connects?
Question 90

Branch wireless users report that they can no longer access services from head office but can access services locally at the site. New wireless users can associate to the wireless while the WAN is down.
Which three elements (Cisco FlexConnect state, operation mode, and authentication method) are seen in this scenario? (Choose three.)
Question