Month End Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the Cisco CCNP Enterprise 300-430 Questions and answers with CertsForce

Viewing page 5 out of 9 pages
Viewing questions 41-50 out of questions
Questions # 41:

An enterprise has two WLANs configured on WLC. It is reported that when converting APs to FlexConnect mode, WLAN A works but WLAN B does not. When converting APs to local mode, WLAN B works, but WLAN A does not. Which action is needed to complete this configuration?

Options:

A.

Create a Cisco FlexConnect group with WLAN-VLAN mapping.


B.

Disable local switching on the WLANs.


C.

Map the AP group to the WLAN interface.


D.

Join the APs to a Cisco FlexConnect group.


Expert Solution
Questions # 42:

Which condition introduce security risk to a BYOD policy?

Options:

A.

enterprise-managed MDM platform used for personal devices


B.

access to LAN without implementing MDM solution


C.

enforcement of BYOD access to internet only network


D.

enterprise life-cycle enforcement of personal device refresh


Expert Solution
Questions # 43:

A company is concerned about unauthorized APs on their wired and wireless networks. The company implements a Cisco Catalyst Center (formerly DNA Center) solution. Which feature must be enabled?

Options:

A.

Rogue Management application package


B.

Neighbor Assisted Roaming


C.

Sniffer package


D.

Monitor Mode package


Expert Solution
Questions # 44:

A shopping center uses AireOS controllers with Cisco Wave 2 APs. A separate WLAN named Guest-012345678-WLAN is used for guest wireless clients. Management needs location analytics to determine popular areas. CMX must track only associated clients. What must be selected on the CMX server settings?

Options:

A.

Exclude probing clients


B.

Duty Cycle Cutoff


C.

Enable Locally Administered MAC Filtering


D.

Enable Location MAC Filtering


Expert Solution
Questions # 45:

Refer to the exhibit.

Question # 45

Which two items must be supported on the VoWLAN phones to take full advantage of this WLAN configuration? (Choose two.)

Options:

A.

TSPEC


B.

SIFS


C.

802.11e


D.

WMM


E.

APSD


Expert Solution
Questions # 46:

A Cisco WLC has been added to the network and Cisco ISE as a network device, but authentication is failing. Which configuration within the network device configuration should be verified?

Options:

A.

SNMP RO community


B.

device interface credentials


C.

device ID


D.

shared secret


Expert Solution
Questions # 47:

An enterprise has recently deployed a voice and video solution available to all employees using AireOS controllers. The employees must use this service over their laptops, but users report poor service when connected to the wireless network. The programs that consume bandwidth must be identified and restricted. Which configuration on the WLAN aids in recognizing the traffic?

Options:

A.

NetFlow Monitor


B.

AVC Profile


C.

QoS Profile


D.

Application Visibility


Expert Solution
Questions # 48:

An engineer configures a Cisco Aironet 600 Series OfficeExtend AP for a user who works remotely. What is configured on the Cisco WLC to allow the user to print a printer on his home network?

Options:

A.

split tunneling


B.

SE-connect


C.

FlexConnect


D.

AP failover priority


Expert Solution
Questions # 49:

An engineer must enable LSS for the AppleTV mDNS service only when ORIGIN is set to Wired. Which action meets this requirement?

Options:

A.

Set ORIGIN to Wired. Enable LSS by using the config mdns service Iss All command.


B.

Set ORIGIN to Wired. Enable LSS by using the config mdns service Iss AppleTV command.


C.

Set ORIGIN to either Wireless or All. Enable LSS by using the config mdns service Iss All command.


D.

Set ORIGIN to either Wireless or All. Enable LSS by using the config mdns service Iss enable AppleTV command.


Expert Solution
Questions # 50:

You enter the command or a Cisco Catalyst 3850 Series Switch that runs Cisco ISO XE. What does the command do?

Options:

A.

It defines the user identity or the device identity to be validated by the RADIUS server.


B.

It captures information on the length of the authorized session, as well as the bandwidth usage of the client.


C.

It defines the RADIUS server used to track which sessions are still active.


D.

It defines the level of access of the user or the device.


Expert Solution
Viewing page 5 out of 9 pages
Viewing questions 41-50 out of questions