Exam | Securing Wireless Enterprise Networks |
Number | 300-375 |
File Name | Cisco.CertDumps.300-375.2017-12-01.1e.53q.vcex |
Size | 5.35 Mb |
Posted | December 01, 2017 |
Downloads | 39 |
Download | Cisco.CertDumps.300-375.2017-12-01.1e.53q.vcex |
Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.
Coupon: MASTEREXAM
With discount: 20%
Which two considerations must a network engineer have when planning for voice over wireless roaming? (Choose two.)
Correct Answer: AC
Which two 802.11 methods can be configured to protect card holder data? (Choose two.)
Correct Answer: CE
An engineer is changing the authentication method of a wireless network from EAP-FAST to EAP-TLS. Which two changes are necessary? (Choose two.)
Correct Answer: CD
Which mobility mode must a Cisco 5508 Wireless Controller be in to use the MA functionality on a Cisco Catalyst 3850 Series Switch with a Cisco 5508 Wireless Controller as an MC?
Correct Answer: C
WPA2 Enterprise with 802.1x is being used for clients to authenticate to a wireless network through an ACS server. For security reasons, the network engineer wants to ensure only PEAP authentication can be used. The engineer sent instructions to clients on how to configure their supplicants, but users are still in the ACS logs authenticating using EАР-FAST. Which option describes the most efficient way the engineer can ensure these users cannot access the network unless the correct authentication mechanism is configured?
Correct Answer: D
An engineer is configuring a BYOD deployment strategy and prefers a single SSID model. Which technology is required to accomplish this configuration?
Correct Answer: C
When you configure BYOD access to the network, you face increased security risks and challenges. Which challenge is resolved by deploying digital client certificates?
Correct Answer: D
Scenario
Refer to the exhibit. The East-WLC-2504A controller has been configured for WPA2 + PSK, although it isn’t working properly. Refer to the exhibit to resolve the configuration issues.
WLAN ID: 11
Profile Name: Contractors
SSID: Contractors
VLAN: 2
Note, not all menu items, text boxes, or radio buttons are active.
Topology
Correct Answer: BFJK
Refer to the exhibit.
Correct Answer: F
A customer is concerned about denial of service attacks that impair the stable operation of the corporate wireless network. The customer wants to purchase mobile devices that will operate on the corporate wireless network. Which IEEE standard should the mobile devices support to address the customer concerns?
Correct Answer: A