|Exam||Securing Wireless Enterprise Networks|
|File Name||Securing Wireless Enterprise Networks.certkey.300-375.2019-10-16.1e.75q.vcex|
|Posted||October 16, 2019|
|Download||Securing Wireless Enterprise Networks.certkey.300-375.2019-10-16.1e.75q.vcex|
Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.
With discount: 20%
Which two considerations must a network engineer have when planning for voice over wireless roaming? (Choose two.)
Correct Answer: AC
An engineer is changing the authentication method of a wireless network from EAP-FAST to EAP-TLS. Which two changes are necessary? (Choose two.)
Correct Answer: CD
WPA2 Enterprise with 802.1x is being used for clients to authenticate to a wireless network through an ACS server. For security reasons, the network engineer wants to ensure only PEAP authentication can be used. The engineer sent instructions to clients on how to configure their supplicants, but users are still in the ACS logs authenticating using EАР-FAST.
Which option describes the most efficient way the engineer can ensure these users cannot access the network unless the correct authentication mechanism is configured?
Correct Answer: D
Refer to the exhibit. The East-WLC-2504A controller has been configured for WPA2 + PSK, although it isn’t working properly. Refer to the exhibit to resolve the configuration issues.
WLAN ID: 11
Profile Name: Contractors
Note, not all menu items, text boxes, or radio buttons are active.
Correct Answer: BFJK
Refer to the exhibit.
Correct Answer: F
A customer is concerned about denial of service attacks that impair the stable operation of the corporate wireless network. The customer wants to purchase mobile devices that will operate on the corporate wireless network.
Which IEEE standard should the mobile devices support to address the customer concerns?
Correct Answer: A
After receiving an alert regarding a rogue AP, a network engineer logs into Cisco Prime and looks at the floor map where the AP that detected the rogue is located. The map is synchronized with a mobility services engine that determines the rogue device is actually inside the campus. The engineer determines the rogue to be a security threat and decides to stop it from broadcasting inside the enterprise wireless network. What is the fastest way to disable the rogue?
Correct Answer: C
An engineer is configuring client MFP. What WLAN Layer 2 security must be selected to use client MFP?
Correct Answer: C
Which two events are possible outcomes of a successful RF jamming attack? (Choose two.)
Correct Answer: DE
An engineer is configuring a new mobility anchor for a WLAN on the CLI with the config wlan mobility anchor add 3 10.10.10.10 command, but the command is failing.
Which two conditions must be met to be able to enter this command? (Choose two.)
Correct Answer: AB