Download Securing Wireless Enterprise Networks.certkey.300-375.2019-10-16.1e.75q.vcex

Download Exam

File Info

Exam Securing Wireless Enterprise Networks
Number 300-375
File Name Securing Wireless Enterprise Networks.certkey.300-375.2019-10-16.1e.75q.vcex
Size 2.97 Mb
Posted October 16, 2019
Downloads 14
Download Securing Wireless Enterprise Networks.certkey.300-375.2019-10-16.1e.75q.vcex

How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.

Purchase

Coupon: MASTEREXAM
With discount: 20%



 
 



Demo Questions

Question 1

Which two considerations must a network engineer have when planning for voice over wireless roaming? (Choose two.)

  • A: Roaming with only 802.1x authentication requires full reauthentication.
  • B: Roaming time increases when using 802.1x + Cisco Centralized Key Management.
  • C: Full reauthentication introduces gaps in a voice conversation.
  • D: Roaming occurs when the phone has reached -80 dBs or below.
  • E: Roaming occurs when the phone has seen at least four APs.

Correct Answer: AC

In the absence of CCKM, a WPA/WPA2 client must perform a full EAP authentication to a remote AAA/RADIUS server, followed by a WPA/WPA2 4-way handshake whenever it roams. This process can take more than one second. With CCKM, the roaming client and WLC can use pre-established keying material to immediately establish a PTK—normally within a few ten of milliseconds.




Question 2

An engineer is changing the authentication method of a wireless network from EAP-FAST to EAP-TLS. Which two changes are necessary? (Choose two.)

  • A: Cisco Secure ACS is required.
  • B: A Cisco NAC server is required.
  • C: All authenticating clients require their own certificates.
  • D: The authentication server now requires a certificate.
  • E: The users require the Cisco AnyConnect client.

Correct Answer: CD

Reference: http://www.cisco.com/c/en/us/products/collateral/wireless/aironet-1300-series/prod_qas09186a00802030dc.html




Question 3

WPA2 Enterprise with 802.1x is being used for clients to authenticate to a wireless network through an ACS server. For security reasons, the network engineer wants to ensure only PEAP authentication can be used. The engineer sent instructions to clients on how to configure their supplicants, but users are still in the ACS logs authenticating using EАР-FAST.  
Which option describes the most efficient way the engineer can ensure these users cannot access the network unless the correct authentication mechanism is configured?

  • A: Enable AAA override on the SSID, gather the usernames of these users, and disable their RADIUS accounts until they make sure they correctly configured their devices.
  • B: Enable AAA override on the SSID and configure an access policy in ACS that denies access to the list of MACs that have used EAP-FAST.
  • C: Enable АAА override on the SSID and configure an access policy in ACS that allows access only when the EAP authentication method is PEAP.
  • D: Enable AAA override on the SSID and configure an access policy in ACS that puts clients that authenticated using EАР-FAST into a quarantine VLAN.

Correct Answer: D




Question 4

Scenario 
Refer to the exhibit. The East-WLC-2504A controller has been configured for WPA2 + PSK, although it isn’t working properly. Refer to the exhibit to resolve the configuration issues. 
WLAN ID: 11
Profile Name: Contractors
SSID: Contractors
VLAN: 2
Note, not all menu items, text boxes, or radio buttons are active. 
Topology 

  

Virtual Terminal 

  

  

  

  

  

Which configuration changes need to be made to allow WPA2 + PSK to operate properly on the East-WLC-2504A controller? (Choose four.)

  • A: Disable Dynamic AP Management.
  • B: Click on the Status Enabled radio button.
  • C: Change the Layer 3 Security to Web Policy.
  • D: Change the WPA + WPA2 Parameters to WPA2 Policy-AES.
  • E: Change the PSK Format to HEX.
  • F: Change the WLAN ID.
  • G: Change the VLAN Identifier.
  • H: Change the IP Address of the Virtual interface.
  • I: Change the IP Address of the Virtual interface.
  • J: Change the SSID name of the WLAN.
  • K: Click on the PSK radio button and add the password in the text box.

Correct Answer: BFJK




Question 5

Refer to the exhibit. 

  

What is the 1.1.1.1 IP address?

  • A: the wireless client IP address
  • B: the RADIUS server IP address
  • C: the controller management IP address
  • D: the lightweight AP IP address
  • E: the controller AР-manager IP address
  • F: the controller virtual interface IP address

Correct Answer: F

Web Authentication Process 
This is what occurs when a user connects to a WLAN configured for web authentication:
The user opens a web browser and enters a URL, for example, http://www.cisco.com. The client sends out a DNS request for this URL to get the IP for the destination. The WLC bypasses the DNS request to the DNS server and the DNS server responds back with a DNS reply, which contains the IP address of the destination www.cisco.com. This, in turn, is forwarded to the wireless clients.
 The client then tries to open a TCP connection with the destination IP address. It sends out a TCP SYN packet destined to the IP address of www.cisco.com. 
The WLC has rules configured for the client and hence can act as a proxy for www.cisco.com. It sends back a TCP SYN-ACK packet to the client with source as the IP address of www.cisco.com. The client sends back a TCP ACK packet in order to complete the three way TCP handshake and the TCP connection is fully established. 
The client sends an HTTP GET packet destined to www.cisco.com. The WLC intercepts this packet and sends it for redirection handling. The HTTP application gateway prepares a HTML body and sends it back as the reply to the HTTP GET requested by the client. This HTML makes the client go to the default webpage URL of the WLC, for example, http://<Virtual-Server-IP>/login.html.
The client closes the TCP connection with the IP address, for example, www.cisco.com. 
Now the client wants to go to http://1.1.1.1/login.html. Therefore, the client tries to open a TCP connection with the virtual IP address of the WLC. It sends a TCP SYN packet for 1.1.1.1 to the WLC.
The WLC responds back with a TCP SYN-ACK and the client sends back a TCP ACK to the WLC in order to complete the handshake. 
The client sends a HTTP GET for /login.html destined to 1.1.1.1 in order to request for the login page. 
This request is allowed up to the Web Server of the WLC, and the server responds back with the default login page. The client receives the login page on the browser window where the user can go ahead and log in. 
Reference: http://www.cisco.com/c/en/us/support/docs/wireless-mobility/wlan-security/69340-web-auth-config.html#backinfo




Question 6

A customer is concerned about denial of service attacks that impair the stable operation of the corporate wireless network. The customer wants to purchase mobile devices that will operate on the corporate wireless network. 
Which IEEE standard should the mobile devices support to address the customer concerns?

  • A: 802.11w
  • B: 802.11k
  • C: 802.11r
  • D: 802.11h

Correct Answer: A

The IEEE goal with 802.11w is to protect management frames in 802.11 networks. This therefore provides wireless networks within organisations the protection against numerous DoS attacks targeted at the Media Access Control (MAC) layer 2. The 802.11w standard will look to provide protection in the following ways: 
Protecting unicast management frames from forgery and disclosure attacks by encrypting the unicast management frames between an access point and the client. • Protecting broadcast management frames from forgery attacks.  
Protecting broadcast deauthentication and disassociation frames from forgery attacks. 
Reference: https://www.sans.org/reading-room/whitepapers/wireless/80211-denial-service-attacks-mitigation-2108 (Please refer to section “802.11w to the rescue”)




Question 7

After receiving an alert regarding a rogue AP, a network engineer logs into Cisco Prime and looks at the floor map where the AP that detected the rogue is located. The map is synchronized with a mobility services engine that determines the rogue device is actually inside the campus. The engineer determines the rogue to be a security threat and decides to stop it from broadcasting inside the enterprise wireless network. What is the fastest way to disable the rogue?

  • A: Go to the location the rogue device is indicated to be and disable the power.
  • B: Create an SSID on the WLAN controller resembling the SSID of the rogue to spoof it and disable clients from connecting to it.
  • C: Classify the rogue as malicious in Cisco Prime.
  • D: Update the status of the rogue in Cisco Prime to contained.

Correct Answer: C

Please refer to the step 10 of the topic “Configuring Rouge Detection” of the reference link. 
Reference: http://www.cisco.com/c/en/us/td/docs/wireless/controller/7-4/configuration/guides/consolidated/b_cg74_CONSOLIDATED/b_cg74_CONSOLIDATED_chapter_0111101.pdf




Question 8

An engineer is configuring client MFP. What WLAN Layer 2 security must be selected to use client MFP?

  • A: Static WEP
  • B: CKIP
  • C: WPA + WPA2
  • D: 802.1x

Correct Answer: C

In 802.11, management frames such as (de)authentication, (dis)association, beacons, and probes are always unauthenticated and unencrypted. In other words, 802.11 management frames are always sent in an unsecured manner, unlike the data traffic, which are encrypted with protocols such as WPA, WPA2, or, at least, WEP, and so forth. 
Reference: http://www.cisco.com/c/en/us/support/docs/wireless-mobility/wlan-security/82196-mfp.html#climfp




Question 9

Which two events are possible outcomes of a successful RF jamming attack? (Choose two.)

  • A: unauthentication association
  • B: deauthentication multicast
  • C: deauthentication broadcast
  • D: disruption of WLAN services
  • E: physical damage to AP hardware

Correct Answer: DE

WLAN reliability and efficiency depend on the quality of the radio frequency (RF) media. Each RF is susceptible to RF noise impact. An attacker using this WLAN vulnerability can perform two types of DoS attacks:
Disrupt WLAN service — At the 2.4 GHz unlicensed spectrum, the attack may be unintentional. A cordless phone, Bluetooth devices, microwave, wireless surveillance video camera, or baby monitor can all emit RF energy to disrupt WLAN service. Malicious attacks can manipulate the RF power at 2.4 GHz or 5 GHz spectrum with a high-gain directional antenna to amplify the attack impact from a distance. With free-space and indoor attenuation, a 1-kW jammer 300 feet away from a building can jam 50 to 100 feet into the office area. The same 1-kW jammer located inside a building can jam 180 feet into the office area. During the attack, WLAN devices in the target area are out of wireless service. 
Physically damage AP hardware — An attacker using a high-output transmitter with directional high gain antenna 30 yards away from an access point can pulse enough RF power to damage electronics in the access point putting it being permanently out of service. Such High Energy RF (HERF) guns are effective and are inexpensive to build. 
Reference: http://www.cisco.com/c/en/us/td/docs/wireless/mse/3350/5-2/wIPS/configuration/guide/msecg_wIPS/msecg_appA_wIPS.html




Question 10

An engineer is configuring a new mobility anchor for a WLAN on the CLI with the config wlan mobility anchor add 3 10.10.10.10 command, but the command is failing. 
Which two conditions must be met to be able to enter this command? (Choose two.)

  • A: The anchor controller IP address must be within the management interface subnet.
  • B: The anchor controller must be in the same mobility group.
  • C: The WLAN ID must be enabled.
  • D: The mobility group keepalive must be configured.
  • E: The indicated WLAN ID must be present on the controller.

Correct Answer: AB










CONNECT US

Facebook

Twitter

PROFEXAM WITH A 20% DISCOUNT

You can buy ProfExam with a 20% discount!



HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files