Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: geek65

300-430 Implementing Cisco Enterprise Wireless Networks (300-430 ENWLSI) Questions and Answers

Questions 4

An engineer must achieve the highest level of location accuracy possible for a new mobile application. Which technology must be implemented for this use case?

Options:

A.

Time Difference of Arrival

B.

Bluetooth Low Energy

C.

RSS lateration

D.

ToA lateration

Buy Now
Questions 5

An engineer is using Cisco Prime Infrastructure reporting to monitor the state of security on the WLAN. Which output is produced when the Adaptive wIPS Top 10 AP report is run?

Options:

A.

last 10 wIPS events from monitor mode APs

B.

last 10 wIPS events from sniffer mode APs

C.

last of 10 sniffer mode APs with the most wIPS events

D.

last of 10 monitor mode APs with the most wIPS events

Buy Now
Questions 6

What two actions must be taken by an engineer configuring wireless Identity-Based Networking for a WLAN to enable VLAN tagging? (Choose two.)

Options:

A.

enable AAA override on the WLAN

B.

create and apply the appropriate ACL to the WLAN

C.

update the RADIUS server attributes for tunnel type 64, medium type 65, and tunnel private group type 81

D.

configure RADIUS server with WLAN subnet and VLAN ID E. enable VLAN Select on the wireless LAN controller and the WLAN

Buy Now
Questions 7

An engineer must implement a BYOD policy with these requirements:

Onboarding unknown machines

Easily scalable

Low overhead on the wireless network

Which method satisfies these requirements?

Options:

A.

triple SSID

B.

single SSID

C.

open SSID

D.

dual SSID

Buy Now
Questions 8

Which two statements about the requirements for a Cisco Hyperlocation deployment are true? (Choose two.)

Options:

A.

After enabling Cisco Hyperlocation on Cisco CMX, the APs and the wireless LAN controller must be restarted.

B.

NTP can be configured, but that is not recommended.

C.

The Cisco Hyperlocation feature must be enabled on the wireless LAN controller and Cisco CMX.

D.

The Cisco Hyperlocation feature must be enabled only on the wireless LAN controller.

E.

If the Cisco CMX server is a VM, a high-end VM is needed for Cisco Hyperlocation deployments.

Buy Now
Questions 9

Refer to the exhibit.

An engineer is troubleshooting a client connectivity issue. The client is in the RUN state, and no traffic is passed after authenticating by using Cisco ISE. Which action resolves the problem?

Options:

A.

Configure a different client VLAN after authentication.

B.

Disable the ACL that prevents traffic from being allowed.

C.

Apply a lower WMM QoS.

D.

Enable rate-limiting to the client.

Buy Now
Questions 10

Which devices can be tracked with the Cisco Context Aware Services?

Options:

A.

wired and wireless devices

B.

wireless devices

C.

wired devices

D.

Cisco certified wireless devices

Buy Now
Questions 11

An administrator receives reports of many interferers in the wireless network and wants to get the location of these interferers from the maps in Cisco Prime Infrastructure.

When looking at the floor plans/maps, the administrator does not see any interferers, but can see all wireless clients located successfully.

Which two statements define the cause of the issue? (Choose two.)

Options:

A.

MSE is not added to Cisco Prime infrastructure and synchronized.

B.

Interferer tracking is not enabled on the MSE.

C.

SNMP between Cisco Prime Infrastructure and the WLC is failing.

D.

Context Aware Service tracking limit has already been reached with tracking other elements.

E.

NSMP communication is inactive with the WLC.

Buy Now
Questions 12

An engineer is troubleshooting a Cisco CMX high-availability deployment and notices that the primary and backup Cisco CMX servers are both considered primary. Which command must the engineer run on the backup server?

Options:

A.

cmxha convert backup

B.

cmxha backup convert

C.

cmxha secondary convert

D.

cmxha convert secondary

Buy Now
Questions 13

Refer to the exhibit.

An engineer must restrict some subnets to have access to the WLC. When the CPU ACL function is enabled, no ACLs in the drop-down list are seen. What is the cause of the problem?

Options:

A.

The ACL does not have a rule that is specified to the Management interface.

B.

No ACLs have been created under the Access Control List tab.

C.

When the ACL is created, it must be specified that it is a CPU ACL.

D.

This configuration must be performed through the CLI and not though the web GUI.

Buy Now
Questions 14

An IT administrator deploys Cisco 2802i APs in all office locations, including main campus and branch offices. The WLC that manages the APs is located at the data center on the main campus. The APs on the main campus are configured to use Local mode and the APs in the branches use FlexConnect mode. Which configuration must be applied to the APs for corporate devices on the main campus to be mapped to the local LAN switch on different VLANs according to the VLAN tag ID and WLAN?

Options:

A.

Enable Central DHCP Processing.

B.

Disable FlexConnect Local Auth

C.

Enable FlexConnect Local Switching.

D.

Disable VLAN-based Central Switching.

Buy Now
Questions 15

Refer to the exhibit.

Which two items must be supported on the VoWLAN phones to take full advantage of this WLAN configuration? (Choose two.)

Options:

A.

TSPEC

B.

SIFS

C.

802.11e

D.

WMM

E.

APSD

Buy Now
Questions 16

On a Cisco Catalyst 9800 Series Wireless Controller, an engineer wants to prevent a FlexConnect AP from allowing wireless clients to connect when its Ethernet connection is nonoperational. Which command set prevents this connection?

Options:

A.

config terminal

wireless flexconnect profile [profile name]

ethernet-fallback-enable

end

B.

config terminal

wireless flexconnect profile [profile name]

fallback-radio-shut

end

C.

config terminal

wireless profile flex [profile name]

fallback-radio-shut

end

D.

config terminal

wireless profile flex [profile name]

ethernet-fallback-enable

end

Buy Now
Questions 17

Refer to the exhibit.

An engineer deployed a Cisco WLC using local EAP. Users who are configured for EAP-PEAP cannot connect to the network. Based on the local EAP debug on the controller provided, why is the client unable to connect?

Options:

A.

The client is failing to accept certificate.

B.

The Cisco WLC is configured for the incorrect date.

C.

The Cisco WLC local EAP profile is misconfigured.

D.

The user is using invalid credentials.

Buy Now
Questions 18

An engineer needs to provision certificates on a Cisco Catalyst 9800 Series Wireless Controller. The customer uses a third-party CA server. Which protocol must be used between the controller and CA server to request and install certificates?

Options:

A.

SCEP

B.

TLS

C.

LDAP

D.

SSL

Buy Now
Questions 19

Refer to the exhibit.

The image shows a packet capture that was taken at the CLI of the Cisco CMX server. It shows UDP traffic from the WLC coming into the server. What does the capture prove?

Options:

A.

The Cisco CMX server receives NetFlow data from the WLC.

B.

The Cisco CMX server receives NMSP traffic from the WLC.

C.

The Cisco CMX server receives SNMP traffic from the WLC.

D.

The Cisco CMX server receives Angle-of-Arrival data from the WLC.

Buy Now
Questions 20

An engineer is performing a Cisco Hyperlocation accuracy test and executes the cmxloc start command on Cisco CMX. Which two parameters are

relevant? (Choose two.)

Options:

A.

X, Y real location

B.

client description

C.

AP name

D.

client MAC address

E.

WLC IP address

Buy Now
Questions 21

An engineer is implementing a FlexConnect group for access points at a remote location using local switching but central DHCP. Which client feature becomes available only if this configuration is changed?

Options:

A.

multicast

B.

static IP

C.

fast roaming

D.

mDNS

Buy Now
Questions 22

An engineer must implement Cisco Identity-Based Networking Services at a remote site using ISE to dynamically assign groups of users to specific IP subnets. If the subnet assigned to a client is available at the remote site, then traffic must be offloaded locally, and subnets are unavailable at the remote site must be tunneled back to the WLC. Which feature meets these requirements?

Options:

A.

learn client IP address

B.

FlexConnect local authentication

C.

VLAN-based central switching

D.

central DHCP processing

Buy Now
Questions 23

A network engineer wants to implement QoS across the network that supports multiple VLANs. All the APs are connected to switch ports and are configured in local mode. Which trust model must be configured on the switch ports to which the APs are connected?

Options:

A.

CoS

B.

WMM UP

C.

DSCP

D.

IPP

Buy Now
Questions 24

What must be configured on ISE version 2.1 BYOD when using Single SSID?

Options:

A.

open authentication

B.

802.1x

C.

no authentication

D.

WPA2

Buy Now
Questions 25

An engineer must track guest traffic flow using the WLAN infrastructure. Which Cisco CMX feature must be configured and used to accomplish this tracking?

Options:

A.

analytics

B.

connect and engage

C.

presence

D.

detect and locate

Buy Now
Questions 26

A network engineer is deploying 8865 IP phones with wireless clients connected to them. In order to apply the appropriate QoS, the IP voice traffic needs to be distinguished from client data traffic. Which switch configuration feature must be enabled?

Options:

A.

Voice VLAN

B.

QBSS

C.

WME

D.

QoS routing

Buy Now
Questions 27

Which condition introduce security risk to a BYOD policy?

Options:

A.

enterprise-managed MDM platform used for personal devices

B.

access to LAN without implementing MDM solution

C.

enforcement of BYOD access to internet only network

D.

enterprise life-cycle enforcement of personal device refresh

Buy Now
Questions 28

An engineer configures a deployment to support:

Cisco CMX

licenses for at least 3000 APs

6000 wIPS licenses

The Cisco vMSE appliance must be sized for this deployment. Which Cisco vMSE Release 8 option must the engineer deploy?

Options:

A.

Large vMSE

B.

Low-End vMSE

C.

Standard vMSE

D.

High-End vMSE

Buy Now
Questions 29

An engineer is considering an MDM integration with Cisco ISE to assist with security for lost devices.

Which two functions of MDM increase security for lost devices that access data from the network? (Choose two.)

Options:

A.

PIN enforcement

B.

Jailbreak/root detection

C.

data wipe

D.

data encryption

E.

data loss prevention

Buy Now
Questions 30

An engineer needs read/write access to rename access points and add them to the correct AP groups on a wireless controller. Using Cisco ISE TACACS, which custom attributes is the minimum required?

Options:

A.

role1=WLAN

B.

role1=WLAN role2=SECURITY

C.

role1=WLAN role2=WIRELESS

D.

role1=WIRELESS

Buy Now
Questions 31

Refer to the exhibit.

An engineer needs to manage non-802.11 interference. What is observed in the output on PI?

Options:

A.

At least one strong interferer is impacting connectivity at this site.

B.

Several light interferers are collectively impacting connectivity at this site.

C.

The three individual clusters shown indicate poor AP placement.

D.

RF at this site is unable to provide adequate wireless performance.

Buy Now
Questions 32

Refer to the exhibit.

The security team has implemented ISE as an AAA solution for the wireless network. The wireless engineer notices that though clients are able to authenticate successfully, the ISE policies that are designed to place them on different interfaces are not working. Which configuration must be applied in the RADIUS Authentication Settings section from the ISE Network Device page?

Options:

A.

Disable KeyWrap.

B.

Use ASCII for the key input format.

C.

Change the CoA Port.

D.

Correct the shared secret.

Buy Now
Questions 33

A customer is concerned that their wireless network is detecting spurious threats from channels that are not being used by their wireless infrastructure. Which two technologies must they deploy? (Choose two.)

Options:

A.

FlexConnect mode

B.

monitor mode

C.

sniffer mode with no submode

D.

local mode with WIPS submode

E.

rogue detector mode

Buy Now
Questions 34

What is the default NMSP echo interval between Cisco MSE and a Wireless LAN Controller?

Options:

A.

10 seconds

B.

15 seconds

C.

30 seconds

D.

60 seconds

Buy Now
Questions 35

A network administrator managing a Cisco Catalyst 9800 WLC must place all iOS-connected devices to the guest SSID on VLAN 101. The rest of the clients must connect on VLAN 102 to distribute load across subnets. To achieve this configuration, the administrator configures a local policy on the WLC. Which two configurations are required? (Choose two.)

Options:

A.

Assign a policy map under global security policy settings.

B.

Add local profiling policy under global security policy settings.

C.

Create a service template.

D.

Allow HTTP and DHCP profiling under policy map.

E.

Enable device classification on global wireless settings.

Buy Now
Questions 36

A network engineer must get an autonomous AP to authenticate to the upstream switch via IEEE 802.1 X. Drag and drop the commands from the left onto the right to complete the configuration.

Options:

Buy Now
Questions 37

A network engineer observes a spike in controller CPU overhead and overall network utilization after multicast is enabled on a controller with 500 APs. Which feature corrects the issue?

Options:

A.

controller IGMP snooping

B.

multicast AP multicast mode

C.

broadcast forwarding

D.

unicast AP multicast mode

Buy Now
Questions 38

A wireless engineer deployed all remote sites as FlexConnect. The client VLAN assignment on these sites is configured manually mapped by WLAN and using local switching. Dynamic VLAN assignment is provided by the newly deployed Cisco ISE. Which IETF attribute must be configured on the AAA server to send that VLAN ID?

Options:

A.

Tunnel-Medium-Type

B.

Tunnel-Client-Endpoint

C.

Tunnel-Assignment-ID

D.

Tunnel-Private-Group-ID

Buy Now
Questions 39

An engineer must configure a Cisco WLC to support Cisco Aironet 600 Series OfficeExtend APs. Which two Layer 2 security options are supported in this environment? (Choose two.)

Options:

A.

Static WEP + 802.1X

B.

WPA+WPA2

C.

Static WEP

D.

CKIP

E.

802.1X

Buy Now
Questions 40

A network is set up to support wired and wireless clients. Both types must authenticate using 802.1X before connecting to the network. Different types of client authentication must be separated on a Cisco ISE deployment. Which two configuration items achieve this task? (Choose two.)

Options:

A.

device profiles

B.

policy sets

C.

separate networks

D.

policy groups

E.

policy results

Buy Now
Questions 41

A wireless network has been implemented to enable multicast video to be streamed reliably over the wireless link to the wireless users. After a client reports that the video is unable to stream, the administrator determines that the client is connecting at a data rate of 12 Mbps and is trying to stream to a valid multicast address on the network. Which two actions must be applied? (Choose two.)

Options:

A.

Turn off IGMP snooping for all the configured WLANs on the controller.

B.

Implement video-stream for the multicast video on the controller.

C.

Allow multicast-direct to work correctly and multicast-direct to be enabled globally.

D.

Change the WLAN QoS value to Bronze for the WLAN that multicast will be enabled.

E.

Allow RTSP to stream the video due to wireless multicast not using acknowledgements.

Buy Now
Questions 42

An engineer is configuring multicast for two WLCs. The controllers are in different physical locations and each handles around 500 wireless clients. How should the CAPWAP multicast group address be assigned during configuration?

Options:

A.

Each WLC must be assigned a unique multicast group address.

B.

Each WLC management address must be in the same multicast group.

C.

Both WLCs must be assigned the same multicast group address.

D.

Each WLC management address must be in a different multicast group.

Buy Now
Questions 43

An engineer just added a new MSE to Cisco Prime Infrastructure and wants to synchronize the MSE with the Cisco 5520 WLC, located behind a firewall in a DMZ. It is noticed that NMSP messages are failing between the two devices. Which traffic must be allowed on the firewall to ensure that the MSE and WLC are able to communicate using NMSP?

Options:

A.

TCP 1613

B.

UDP 16113

C.

UDP 1613

D.

TCP 16113

Buy Now
Questions 44

Refer to the exhibit.

A network administrator deploys the DHCP profiler service in two ISE servers: 10.3.10.101 and 10.3.10.102. All BYOD devices connecting to WLAN on VLAN63 have been incorrectly profiled and are assigned as unknown profiled endpoints. Which action efficiently rectifies the issue according to Cisco recommendations?

Options:

A.

Nothing needed to be added on the Cisco WLC or VLAN interface. The ISE configuration must be fixed.

B.

Disable DHCP proxy on the Cisco WLC.

C.

Disable DHCP proxy on the Cisco WLC and run the ip helper-address command under the VLAN interface to point to DHCP and the two ISE servers.

D.

Keep DHCP proxy enabled on the Cisco WLC and define helper-address under the VLAN interface to point to the two ISE servers.

Buy Now
Questions 45

A network administrator just completed the basic implementation of Cisco CMX and tries to implement location tracking. The administrator is having trouble establishing connectivity between one of the WLCs through NMSP. What must be configured to establish this connectivity? (Choose two.)

Options:

A.

Add permanent licenses on the Cisco CMX server.

B.

Allow on the firewall port 16113 between Cisco CMX and the WLC.

C.

Enable NMSP on the WLC.

D.

Reboot Cisco CMX after adding the WLC for the first time.

E.

Add to the WLC the MAC address and SSC key for the Cisco CMX server.

Buy Now
Questions 46

A corporation has employees working from their homes. A wireless engineer must connect 1810 OEAP at remote teleworker locations. All configuration has been completed on the controller side, but the network readiness is pending. Which two configurations must be performed on the firewall to allow the AP to join the controller? (Choose two.)

Options:

A.

Block UDP ports 1812 and 1813 on the firewall.

B.

Enable NAT Address on the 5520 with an Internet-routable IP address.

C.

Configure a static IP on the OEAP 1810.

D.

Allow UDP ports 5246 and UDP port 5247 on the firewall.

E.

Allow UDP ports 12222 and 12223 on the firewall.

Buy Now
Questions 47

A wireless network engineer must present a list of all rogue APs with a high severity score to senior management. Which report must be created in Cisco Prime Infrastructure to provide this information?

Options:

A.

Rogue AP Count Summary

B.

New Rogue APs

C.

Rogue AP Events

D.

Rogue APs

Buy Now
Questions 48

Refer to the exhibit.

What is the reason that the wireless client cannot get the RUN state?

Options:

A.

It has no communication with Cisco ISE.

B.

An authentication error has occurred.

C.

It is not getting the IP address.

D.

Because of central switching, the AP must reach the Cisco ISE directly.

Buy Now
Questions 49

An engineer has successfully implemented 10 active RFID tags in an office environment. The tags are not visible when the location accuracy is tested on the Cisco CMX Detect and Locate window. Which setting on Cisco CMX allows the engineer to view the tags?

Options:

A.

Enable RFID tags in tracking options.

B.

Enable probing clients for active tags.

C.

Define an RFID group globally and add the tags.

D.

Enable hyperlocation services for RFID.

Buy Now
Questions 50

A network engineer is implementing a wireless network and is considering deploying a single SSID for device onboarding.

Which option is a benefit of using dual SSIDs with a captive portal on the onboard SSID compared to a single SSID solution?

Options:

A.

limit of a single device per user

B.

restrict allowed devices types

C.

allow multiple devices per user

D.

minimize client configuration errors

Buy Now
Questions 51

Which AP model of the Cisco Aironet Active Sensor is used with Cisco DNA Center?

Options:

A.

1800s

B.

3600e

C.

3800s

D.

4800i

Buy Now
Questions 52

Which two events are outcomes of a successful RF jamming attack? (Choose two.)

Options:

A.

disruption of WLAN services

B.

unauthentication association

C.

deauthentication broadcast

D.

deauthentication multicast

E.

physical damage to AP hardware

Buy Now
Questions 53

The network management team in a large shopping center has detected numerous rogue APs from local coffee shops that are broadcasting SSIDs. All of these SSIDs have names starting with ATC (for example, ATC302, ATC011, and ATC566). A wireless network engineer must appropriately classify these SSIDs using the Rogue Rules feature. Drag and drop the options from the left onto the categories in which they must be used on the right. Not all options are used.

Options:

Buy Now
Questions 54

Refer to the exhibit.

Which COS to DSCP map must be modified to ensure that voice traffic is tagged correctly as it traverses the network?

Options:

A.

COS of 6 to DSCP 46

B.

COS of 3 to DSCP 26

C.

COS of 7 to DSCP 48

D.

COS of 5 to DSCP 46

Buy Now
Questions 55

An engineer is setting up a WLAN to work with a Cisco ISE as the AAA server. The company policy requires that all users be denied access to any resources until they pass the validation. Which component must be configured to achieve this stipulation?

Options:

A.

WPA2 passkey

B.

AAA override

C.

CPU ACL

D.

preauthentication ACL

Buy Now
Questions 56

Branch wireless users report that they can no longer access services from head office but can access services locally at the site. New wireless users can associate to the wireless while the WAN is down. Which three elements (Cisco FlexConnect state, operation mode, and authentication method) are seen in this scenario? (Choose three.)

Options:

A.

authentication-local/switch-local

B.

WPA2 personal

C.

authentication-central/switch-central

D.

lightweight mode

E.

standalone mode

F.

WEB authentication

Buy Now
Questions 57

An engineer must implement a CPU ACL that blocks web management traffic to the controller, but they also must allow guests to reach a Web Authentication Redirect page. To which IP address is guest client HTTPS traffic allowed for this to work?

Options:

A.

DNS server IP

B.

controller management IP

C.

virtual interface IP

D.

client interface IP

Buy Now
Questions 58

A wireless engineer must configure access control on a WLC using a TACACS+ server for a company that is implementing centralized authentication on network devices. Which role value must be configured under the shell profile on the TACACS+ server for a user with read-only permissions?

Options:

A.

ADMIN

B.

MANAGEMENT

C.

MONITOR

D.

READ

Buy Now
Questions 59

When implementing self-registration for guest/BYOD devices, what happens when an employee tries to connect four devices to the network at the same time?

Options:

A.

The last device is removed and the newly added device is updated as active device.

B.

The registration is allowed, but only one device is connected at any given time.

C.

All devices are allowed on the network simultaneously.

D.

Purge time dictates how long a device is registered to the portal.

Buy Now
Questions 60

A network engineer must segregate all IPads on the guest WLAN to a separate VLAN. How does the engineer accomplish this task without using Cisco

ISE?

Options:

A.

Create a local policy on the WLC.

B.

Use 802.1x authentication to profile the devices.

C.

Use an mDNS profile for the iPad device.

D.

Enable RADIUS DHCP profiling on the WLAN.

Buy Now
Questions 61

Refer to the exhibit.

An engineer implemented the CPU ACL on your Cisco 5520 Series Wireless LAN Controller, and the controller is no longer manageable via the network. What must be changes on this CPU ACL to enable it to manage the controller again?

Options:

A.

Permit statements must be added to the top of the ACL in both directions, which specify the network to be managed from and the virtual interface of the controller.

B.

Line 1 must be set to a destination port of HTTP.

C.

Permit statements must be added to the top of the ACL, which specify the network to be managed from.

D.

Line 1 must be set to the inbound direction.

Buy Now
Questions 62

An engineer is in the process of implementing Fastlane on a wireless network with a Mobility Express AP installed. The network must support voice and video applications for Apple devices. Due to a security concern, all iPhones are updated to version 14.5.432302546. Which QoS profile must the engineer configure on the user WLAN?

Options:

A.

Bronze

B.

Best Effort

C.

Silver

D.

Platinum

Buy Now
Questions 63

An engineer wants to upgrade the APs in a Cisco FlexConnect group. To accomplish this upgrade, the FlexConnect AP Upgrade setting will be used. One AP of each model with the lowest MAC address in the group must receive the upgrade directly from the controller. Which action accomplishes this direct upgrade?

Options:

A.

Remove the APs from the group.

B.

Reboot all APs before the upgrade.

C.

Allocate the master APs to different groups.

D.

Do not set any master APs.

Buy Now
Questions 64

On a branch office deployment, it has been noted that if the FlexConnect AP is in standalone mode and loses connection to the WLC, all clients are disconnected, and the SSID is no longer advertised. Considering that FlexConnect local switching is enabled, which setting is causing this behavior?

Options:

A.

ISE NAC is enabled

B.

802.11r Fast Transition is enabled

C.

Client Exclusion is enabled

D.

FlexConnect Local Auth is disabled

Buy Now
Exam Code: 300-430
Exam Name: Implementing Cisco Enterprise Wireless Networks (300-430 ENWLSI)
Last Update: Jun 15, 2025
Questions: 216
300-430 pdf

300-430 PDF

$33.25  $94.99
300-430 Engine

300-430 Testing Engine

$38.5  $109.99
300-430 PDF + Engine

300-430 PDF + Testing Engine

$50.75  $144.99