New Year Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: clap70

300-430 Implementing Cisco Enterprise Wireless Networks (300-430 ENWLSI) Questions and Answers

Questions 4

An engineer must implement intrusion protection on the WLAN. The AP coverage is adequate and on-channel attacks are the primary concern. The building is historic, which makes adding APs difficult. Which AP mode and submode must be implemented?

Options:

A.

AP mode: local, AP submode: none

B.

AP mode: monitor, AP submode: WIPS

C.

AP mode: monitor, AP submode: none

D.

AP mode: local, AP submode: WIPS

Buy Now
Questions 5

A network engineer must get an autonomous AP to authenticate to the upstream switch via IEEE 802.1 X. Drag and drop the commands from the left onto the right to complete the configuration.

Options:

Buy Now
Questions 6

Refer to the exhibit.

An engineer tries to manage the rogues on the Cisco WLC. Based on the configuration, which AP is marked as malicious by the controller?

Options:

A.

rogue AP with SSID admin seen for 4000 seconds and heard at -70dBm

B.

rogue AP with SSID admin seen for 3000 seconds and heard at -60dBm

C.

rogue AP with SSID admin seen for 4000 seconds and heard at -60dBm

D.

rogue AP with SSID admin seen for 3000 seconds and heard at -70dBm

Buy Now
Questions 7

An SSID is set up with central web authentication using Cisco ISE The new SSID uses guest tunneling from the foreign controller to the anchor controller. Which device must be configured ISE as the one performing the RADIUS authentication requests for the web authentication method?

Options:

A.

APs

B.

authentication server

C.

anchor controller

D.

foreign controller

Buy Now
Questions 8

An engineer has configured the wireless controller to authenticate clients on the employee SSID against Microsoft Active Directory using PEAP authentication.

Which protocol does the controller use to communicate with the authentication server?

Options:

A.

EAP

B.

802.1X

C.

RADIUS

D.

WPA2

Buy Now
Questions 9

What is the Cisco recommended configuration for a Cisco switch port connected to an AP in local mode for optimal voice over WLAN performance with an 8821 wireless phone?

Options:

A.

switchport encapsulation dot1q

switchport mode trunk

mls qos trust device cisco-phone

B.

switchport mode access

mls qos trust device cisco-phone

C.

switchport mode access mls qos trust cos

D.

switchport mode access mls qos trust dscp

Buy Now
Questions 10

Refer to the exhibit.

An engineer needs to configure location services in an office. The requirement is to use FastLocate and achieve higher locations refresh rates. Which location-based technique should be implemented?

Options:

A.

probe-based

B.

location patterning

C.

data packet-based

D.

angulation

Buy Now
Questions 11

An engineer must configure MSE to provide guests access using social media authentication. Which service does the engineer configure so that guests use Facebook credentials to authenticate?

Options:

A.

Social Connect

B.

Client Connect

C.

Visitor Connect

D.

Guest Connect

Buy Now
Questions 12

An organization is supporting remote workers in different locations. In order to provide wireless network connectivity and services, OfficeExtend has been implemented. The wireless connectivity is working, but users report losing connectivity to their local network printers. Which solution must be used to address this issue?

Options:

A.

OEAP gateway override

B.

OEAP split tunnel

C.

WLAN static IP tunneling

D.

FlexConnect local switching

Buy Now
Questions 13

A network is set up to support wired and wireless clients. Both types must authenticate using 802.1X before connecting to the network. Different types of client authentication must be separated on a Cisco ISE deployment. Which two configuration items achieve this task? (Choose two.)

Options:

A.

device profiles

B.

policy sets

C.

separate networks

D.

policy groups

E.

policy results

Buy Now
Questions 14

An engineer is troubleshooting a Cisco CMX high-availability deployment and notices that the primary and backup Cisco CMX servers are both considered primary. Which command must the engineer run on the backup server?

Options:

A.

cmxha convert backup

B.

cmxha backup convert

C.

cmxha secondary convert

D.

cmxha convert secondary

Buy Now
Questions 15

An engineer is setting up a WLAN to work with a Cisco ISE as the AAA server. The company policy requires that all users be denied access to any resources until they pass the validation. Which component must be configured to achieve this stipulation?

Options:

A.

WPA2 passkey

B.

AAA override

C.

CPU ACL

D.

preauthentication ACL

Buy Now
Questions 16

A wireless engineer has performed a Wireshark ccapture on an 802.1x authentication process to troubleshoot a connectivity issue.

Which two types of packet does the EAP contain? (Choose two.)

Options:

A.

EAP complete

B.

EAP response

C.

EAP failure

D.

EAP request

E.

EAP reply

Buy Now
Questions 17

An IT administrator deployed an OEAP to the home of a remote user, but the OEAP cannot reach the WLC. Which two configuration settings must be completed before an OEAP is deployed successfully? (Choose two.)

Options:

A.

Configure Secondary Controller Name and Management IP address in the High Availability tab.

B.

Configure LSC to authorize the OEAP.

C.

Configure the AP mode to FlexConnect and check the box for Office Extend AP.

D.

Configure the WLC with an external IP address on the virtual interface.

E.

Configure Primary Controller Name and Management IP address in the High Availability tab.

Buy Now
Questions 18

An engineer is configuring wireless guests using Cisco CWA. When a device connects, it must be redirected to the WebAuth, but this was failing. What must be configured for the device to be redirected correctly?

Options:

A.

Configure the ACL name on the anchor controller

B.

Enabled DHCP option 7.

C.

Remove the CN entry from the SAN

D.

Allow ICMP toward the portal

Buy Now
Questions 19

Refer to the exhibit.

An engineer deployed a Cisco WLC using local EAP. Users who are configured for EAP-PEAP cannot connect to the network. Based on the local EAP debug on the controller provided, why is the client unable to connect?

Options:

A.

The client is failing to accept certificate.

B.

The Cisco WLC is configured for the incorrect date.

C.

The Cisco WLC local EAP profile is misconfigured.

D.

The user is using invalid credentials.

Buy Now
Questions 20

A network engineer is implementing BYOD on a wireless network. Based on the customer requirements, a dual SSID approach must be taken. Which two advanced WLAN configurations must be performed? (Choose two.)

Options:

A.

Set NAC State to Radius NAC.

B.

Set Allow AAA Override to Enabled.

C.

Set DHCP Addr. Assignment to Required.

D.

Select DHCP Profiling.

E.

Select Enable Session Timeout.

Buy Now
Questions 21

An engineer is following the proper upgrade path to upgrade a Cisco AireOS WLC from version 7.3 to 8.9. Which two ACLs for Cisco CWA must be configured when upgrading from the specified codes? (Choose two.)

Options:

A.

Permit 0.0.0.0 0.0.0.0 any DNS any

B.

Permit 0.0.0.0 0.0.0.0 UDP DNS any

C.

Permit 0.0.0.0 0.0.0.0 UDP any DNS

D.

Permit any any any

E.

Permit 0.0.0.0 0.0.0.0 UDP any any

Buy Now
Questions 22

A WLAN is being configured for guest access using the portal on the Cisco CMX. Which Layer 3 security setting must be selected?

Options:

A.

Web-Policy-Conditional Redirect

B.

Web-Policy-Authentication

C.

Web-Policy-Splash Page Redirect

D.

Web-Policy-Passthrough

Buy Now
Questions 23

An enterprise has recently deployed a voice and video solution available to all employees using AireOS controllers. The employees must use this service over their laptops, but users report poor service when connected to the wireless network. The programs that consume bandwidth must be identified and restricted. Which configuration on the WLAN aids in recognizing the traffic?

Options:

A.

NetFlow Monitor

B.

AVC Profile

C.

QoS Profile

D.

Application Visibility

Buy Now
Questions 24

Refer to the exhibit.

A wireless engineer has integrated the wireless network with a RADIUS server. Although the configuration on the RADIUS is correct, users are reporting that they are unable to connect. During troubleshooting, the engineer notices that the authentication requests are being dropped. Which action will resolve the issue?

Options:

A.

Allow connectivity from the wireless controller to the IP of the RADIUS server.

B.

Provide a valid client username that has been configured on the RADIUS server.

C.

Configure the shared-secret keys on the controller and the RADIUS server.

D.

Authenticate the client using the same EAP type that has been set up on the RADIUS server.

Buy Now
Questions 25

Refer to the exhibit.

An engineer needs to manage non-802.11 interference. What is observed in the output on PI?

Options:

A.

At least one strong interferer is impacting connectivity at this site.

B.

Several light interferers are collectively impacting connectivity at this site.

C.

The three individual clusters shown indicate poor AP placement.

D.

RF at this site is unable to provide adequate wireless performance.

Buy Now
Questions 26

A wireless engineer is configuring LWA using ISE. The customer is a startup company and requested the wireless users to authenticate against a directory, but LDAP is unavailable. Which solution should be proposed in order to have the same security and user experience?

Options:

A.

Use SAML.

B.

Use the internal database of the RADIUS server.

C.

Use a preshared key on the corporate WLAN.

D.

Use Novell eDirectory.

Buy Now
Questions 27

A wireless engineer must implement a corporate wireless network for a large company in the most efficient way possible. The wireless network must support 32 VLANs for 300 employees in different departments. Which solution must the engineer choose?

Options:

A.

Configure a second WLC to support half of the APs in the deployment.

B.

Configure one single SSID and implement Cisco ISE for VLAN assignment according to different user roles.

C.

Configure different AP groups to support different VLANs, so that all of the WLANs can be broadcast on both radios.

D.

Configure 16 WLANs to be broadcast on the 2.4-GHz band and 16 WLANs to be broadcast on the 5.0-GHz band.

Buy Now
Questions 28

A company is deploying wireless PCs on forklifts within its new 10,000-square-foot(3048-square-rneter) facility.

The clients are configured for PEAP-MS-CHAPv2 with WPA TKIP. Users report that applications frequently drop when the clients roam between access points on the floor. A professional site survey was completed.

Which configuration change is recommended to improve the speed of client roaming?

Options:

A.

EAP-FAST

B.

EAP-TLS

C.

WPAAES

D.

WPA2AES

Buy Now
Questions 29

An engineer has configured Cisco Centralized Key Management for an enterprise that has remote branches. The remote offices are connected back to the data center using a VPN connection with low-bandwidth connections. The goal is to improve roaming. Which type of group must be configured?

Options:

A.

RF

B.

Cisco FlexConnect

C.

interlace

D.

AP

Buy Now
Questions 30

A network engineer must segregate all IPads on the guest WLAN to a separate VLAN. How does the engineer accomplish this task without using Cisco

ISE?

Options:

A.

Create a local policy on the WLC.

B.

Use 802.1x authentication to profile the devices.

C.

Use an mDNS profile for the iPad device.

D.

Enable RADIUS DHCP profiling on the WLAN.

Buy Now
Questions 31

An engineer is assembling a PCI report for compliance purposes and must include missed best practices that are related to WLAN controllers. The engineer has access to all WLCs, Cisco MSE, and Cisco Prime Infrastructure. Which method most efficiently displays a summary of inconsistencies?

Options:

A.

WLC running-config

B.

Cisco Prime Infrastructure monitoring

C.

Cisco Prime Infrastructure reporting

D.

WLC logs

Buy Now
Questions 32

During the EAP process and specifically related to the client authentication session, which encrypted key is sent from the RADIUS server to the access point?

Options:

A.

WPA key

B.

session key

C.

encryption key

D.

shared-secret key

Buy Now
Questions 33

After looking in the logs, an engineer notices that RRM keeps changing the channels for non-IEEE 802.11 interferers. After surveying the area, it has been decided that RRM should not change the channel. Which feature must be enabled to ignore non-802.11 interference?

Options:

A.

Avoid Cisco AP Load

B.

Avoid Non-802.11 Noise

C.

Avoid Persistent Non-WiFi Interference

D.

Avoid Foreign AP Interference

Buy Now
Questions 34

An engineer is configuring an autonomous AP to allow 802.1X authentication for users. The policy on the RADIUS server only allows for EAP-TLS authentication. Which authentication method must the engineer select under the Client Authentication Settings for the SSID on the AP?

Options:

A.

Open

B.

Shared

C.

Web

D.

Network EAP

Buy Now
Questions 35

An engineer must configure MSE to provide guests access using social media authentication. Which service does the engineer configure so that guests use Facebook credentials to authenticate?

Options:

A.

Social Connect

B.

Client Connect

C.

Visitor Connect

D.

Guest Connect

Buy Now
Questions 36

An engineer must enable LSS for the AppleTV mDNS service only when ORIGIN is set to Wired. Which action meets this requirement?

Options:

A.

Set ORIGIN to Wired. Enable LSS by using the config mdns service Iss All command.

B.

Set ORIGIN to Wired. Enable LSS by using the config mdns service Iss AppleTV command.

C.

Set ORIGIN to either Wireless or All. Enable LSS by using the config mdns service Iss All command.

D.

Set ORIGIN to either Wireless or All. Enable LSS by using the config mdns service Iss enable AppleTV command.

Buy Now
Questions 37

A user is trying to connect to a wireless network that is configured for WPA2-Enterprise security using a corporate laptop. The CA certificate for the authentication server has been installed on the Trusted Root Certification Authorities store on the laptop. The user has been prompted to enter the credentials multiple times, but the authentication has not succeeded. What is causing the issue?

Options:

A.

There is an IEEE invalid 802.1X authentication policy on the authentication server.

B.

The user Active Directory account is locked out after several failed attempts.

C.

There is an invalid 802.1X authentication policy on the authenticator.

D.

The laptop has not received a valid IP address from the wireless controller.

Buy Now
Questions 38

An engineer is configuring multicast for two WLCs. The controllers are in different physical locations and each handles around 500 wireless clients. How should the CAPWAP multicast group address be assigned during configuration?

Options:

A.

Each WLC must be assigned a unique multicast group address.

B.

Each WLC management address must be in the same multicast group.

C.

Both WLCs must be assigned the same multicast group address.

D.

Each WLC management address must be in a different multicast group.

Buy Now
Questions 39

An engineer is setting up a new unique NAD on a Cisco ISE.

Which two parameters must be configured? (Choose two.)

Options:

A.

device host name

B.

device password

C.

RADIUS fallback

D.

device IP address

E.

RADIUS shared secret

Buy Now
Questions 40

A corporation has recently implemented a BYOD policy at their HQ. Which two risks should the security director be concerned about? (Choose two.)

Options:

A.

network analyzers

B.

malware

C.

lost and stolen devices

D.

keyloggers

E.

unauthorized users

Buy Now
Questions 41

A network engineer has been hired to perform a new MSE implementation on an existing network. The MSE must be installed in a different network than the Cisco WLC. Which configuration allows the devices to communicate over NMSP?

Options:

A.

Allow UDP/16113 port on the central switch.

B.

Allow TCP/16113 port on the firewall.

C.

Allow UDP/16666 port on the VPN router.

D.

Allow TCP/16666 port on the router.

Buy Now
Questions 42

An engineer must create an account to log in to the CLI of an access point for troubleshooting. Which configuration on the WLC will accomplish this?

Options:

A.

Allow New Telnet Sessions

B.

ReadWrite User Access Mode

C.

SNMP V3 User

D.

Global Configuration Enable Password

Buy Now
Questions 43

For security purposes, an engineer enables CPU ACL and chooses an ACL on the Security > Access Control Lists > CPU Access Control Lists menu. Which kind of traffic does this change apply to as soon as the change is made?

Options:

A.

wireless traffic only

B.

wired traffic only

C.

VPN traffic

D.

wireless and wired traffic

Buy Now
Questions 44

Where is a Cisco OEAP enabled on a Cisco Catalyst 9800 Series Wireless Controller?

Options:

A.

RF Profile

B.

Flex Profile

C.

Policy Profile

D.

AP Join Profile

Buy Now
Questions 45

What must be configured on ISE version 2.1 BYOD when using Single SSID?

Options:

A.

open authentication

B.

802.1x

C.

no authentication

D.

WPA2

Buy Now
Questions 46

An engineer must implement Cisco Identity-Based Networking Services at a remote site using ISE to dynamically assign groups of users to specific IP subnets. If the subnet assigned to a client is available at the remote site, then traffic must be offloaded locally, and subnets are unavailable at the remote site must be tunneled back to the WLC. Which feature meets these requirements?

Options:

A.

learn client IP address

B.

FlexConnect local authentication

C.

VLAN-based central switching

D.

central DHCP processing

Buy Now
Questions 47

A FlexConnect remote office deployment is using five 2702i APs indoors and two 1532i APs outdoors. When a code upgrade is performed and FlexConnect Smart AP Image Upgrade is leveraged, but no FlexConnect Master AP has been configured, how many image transfers between the WLC and APs will occur?

Options:

A.

1

B.

2

C.

5

D.

7

Buy Now
Questions 48

An engineer set up a VoWLAN with QoS on the WLC and a class map on the switch, but the markings are not being preserved correctly in the end-to- end traffic flow. Which two configurations on the wired network ensure end-to-end QoS? (Choose two.)

Options:

A.

trust boundaries

B.

access lists

C.

policy maps

D.

QoS licenses

E.

NetFlow

Buy Now
Questions 49

A network engineer is implementing BYOD on a wireless network. Based on the customer requirements, a dual SSID approach must be taken. Which two advanced WLAN configurations must be performed? (Choose two.)

Options:

A.

Set NAC State to Radius NAC.

B.

Set Allow AAA Override to Enabled.

C.

Set DHCP Addr. Assignment to Required.

D.

Select DHCP Profiling.

E.

Select Enable Session Timeout.

Buy Now
Questions 50

A customer wants to allow employees to easily onboard their personal devices to the wireless network. The visitors also must be able to connect to the same network without the need to engage with anyone from the reception desk. Which process must be configured on Cisco ISE to support this requirement?

Options:

A.

MAC authentication bypass

B.

native supplicant provisioning

C.

local web auth

D.

self-registration guest portal

Buy Now
Questions 51

An engineer must achieve the highest level of location accuracy possible for a new mobile application. Which technology must be implemented for this use case?

Options:

A.

Time Difference of Arrival

B.

Bluetooth Low Energy

C.

RSS lateration

D.

ToA lateration

Buy Now
Questions 52

What is the maximum time range that can be viewed on the Cisco DNA Center issues and alarms page?

Options:

A.

3 hours

B.

24 hours

C.

3 days

D.

7 days

Buy Now
Questions 53

Refer to the exhibit. A network administrator must automate notifications for Security Advisories Data reports on the Cisco Catalyst Center v2.3.7 using the Report notification feature. Preferring a programmable approach over UI/CLI, the administrator decides to create a webhook via the Cisco DNA Center API to send real-time HTTP notifications to an external application. The webhook URL https://example.com/webhook uses HTTPS with a self-signed certificate, which requires a specific configuration in the payload to ensure the webhook functions correctly. Which code snippet must be placed onto the box in the code to complete the Python script that configures the webhook to use the self-signed certificate to extract the Security Advisories Data report?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 54

An engineer is working for an organization that recently deployed Cisco SD-Access-based network with all SSIDs working in Fabric-enabled wireless. A recent project requires third-party APs to be connected to the access switches for some interoperability testing. However, Cisco Catalyst Center (formerly DNA Center) detects these APs as rogue on the wire. Which action must the engineer take to avoid reporting third-party APs as high-threat rogue and containing them?

Options:

A.

Reduce the power on the third-party APs and create smaller broadcasting cells.

B.

Upload the MAC addresses of the third-party APs to Cisco Catalyst Center using a wl PS workflow.

C.

Remove specific switches from Cisco Catalyst Center management where third-party APs are connected.

D.

Enable Management Frame Protection on the SSIDs broadcasted using third-party APs.

Buy Now
Questions 55

You are configuring the social login for a guest network. Which three options are configurable social connectors in Cisco CMX Visitor Connect? (Chose three)

Options:

A.

Linkedn

B.

Pinterest

C.

Medium

D.

Google+

E.

Facebook

F.

Myspace

Buy Now
Questions 56

An engineer must run a Client Traffic Stream Metrics report in Cisco Prime Infrastructure. Which task must be run before the report?

Options:

A.

scheduled report

B.

radio performance

C.

client status

D.

software

Buy Now
Questions 57

CMX Facebook Wi-Fi allows access to the network before authentication. Which two elements are available? (Choose two.)

Options:

A.

Allow HTTP traffic only before authentication and block all the traffic.

B.

Allow all the traffic before authentication and intercept HTTPS only.

C.

Allow HTTPs traffic only before authentication and block all other traffic.

D.

Allow all the traffic before authentication and intercept HTTP only.

E.

Allow SNMP traffic only before authentication and block all the traffic.

Buy Now
Questions 58

An engineer must provide a graphical report with summary grouped data of the total number of wireless clients on the network. Which Cisco Prime Infrastructure report provides the required data?

Options:

A.

Client Traffic Stream Metrics

B.

Client Summary

C.

Posture Status Count

D.

Mobility Client Summary

Buy Now
Questions 59

Which statement about the VideoStream/Multicast Direct feature is true?

Options:

A.

IP multicast traffic is reliable over WLAN by default as defined by the IEEE 802.11 wireless multicast delivery mechanism.

B.

Each VideoStream client acknowledges receiving a video IP multicast stream.

C.

It converts the unicast frame to a multicast frame over the air.

D.

It makes the delivery of the IP multicast stream less reliable over the air, but reliable over Ethernet.

Buy Now
Questions 60

A healthcare organization notices many rogue APs and is concerned about a honeypot attack. Which configuration must a wireless network engineer perform in Cisco Prime Infrastructure to prevent these attacks most efficiently upon detection?

Options:

A.

Set the auto containment level to 0 and select the Using Our SSID containment option.

B.

Set the manual containment level to 4 and select the Ad Hoc Rogue AP containment option.

C.

Set the auto containment level to 0 and select the Ad Hoc Rogue AP containment option.

D.

Set the auto containment level to 4 and select the Using Our SSID containment option.

Buy Now
Questions 61

An engineer needs to provision certificates on a Cisco Catalyst 9800 Series Wireless Controller. The customer uses a third-party CA server. Which protocol must be used between the controller and CA server to request and install certificates?

Options:

A.

SCEP

B.

TLS

C.

LDAP

D.

SSL

Buy Now
Questions 62

You plan to implement Cisco Identity Based Networking Services on a Cisco Catalyst 3850 Series Switch. Which switch command is required when configuring downloadable ACLs?

Options:

A.

authentication display new-style

B.

ip device tracking

C.

dot1x system-auth-control

D.

aaa session-id common

Buy Now
Questions 63

Which two restrictions are in place with regards to configuring mDNS? (Choose two.)

Options:

A.

mDNS uses only UDP port 5436 as a destination port.

B.

mDNS cannot use UDP port 5353 as the destination port.

C.

mDNS is not supported on FlexConnect APs with a locally switched WLAN.

D.

Controller software must be newer than 7.0.6+.

E.

mDNS is not supported over IPv6.

Buy Now
Questions 64

After looking in the logs, an engineer notices that RRM keeps changing the channels for non-IEEE 802.11 interferers. After surveying the area, it has been decided that RRM should not change the channel. Which feature must be enabled to ignore non-802.11 interference?

Options:

A.

Avoid Cisco AP Load

B.

Avoid Non-802.11 Noise

C.

Avoid Persistent Non-WiFi Interference

D.

Avoid Foreign AP Interference

Buy Now
Questions 65

A customer is deploying local web authentication. Which software application must be implemented on Cisco ISE to utilize as a directory service?

Options:

A.

Solaris Directory Service

B.

LDAP

C.

SAML

D.

Novell eDirectory

Buy Now
Questions 66

A hospital wants to offer indoor directions to patient rooms utilizing its existing wireless infrastructure. The wireless network has been using location services specifications. Which two components must be installed to support this requirement? (Choose two.)

Options:

A.

WIPS

B.

Cisco MSE

C.

Cisco CMX Visitor Connect

D.

Cisco CMX AppEngage

E.

Cisco CMX Analytics

Buy Now
Questions 67

A wireless engineer must implement a corporate wireless network for a large company in the most efficient way possible. The wireless network must support 32 VLANs for 300 employees in different departments. Which solution must the engineer choose?

Options:

A.

Configure a second WLC to support half of the APs in the deployment.

B.

Configure one single SSID and implement Cisco ISE for VLAN assignment according to different user roles.

C.

Configure different AP groups to support different VLANs, so that all of the WLANs can be broadcast on both radios.

D.

Configure 16 WLANs to be broadcast on the 2.4-GHz band and 16 WLANs to be broadcast on the 5.0-GHz band.

Buy Now
Questions 68

A shopping center uses AireOS controllers with Cisco Wave 2 APs. A separate WLAN named Guest-012345678-WLAN is used for guest wireless clients. Management needs location analytics to determine popular areas. CMX must track only associated clients. What must be selected on the CMX server settings?

Options:

A.

Exclude probing clients

B.

Duty Cycle Cutoff

C.

Enable Locally Administered MAC Filtering

D.

Enable Location MAC Filtering

Buy Now
Questions 69

An engineer must use Cisco AVC on a Cisco WLC to prioritize Cisco IP cameras that use the wireless network. Which element do you configure in a rule?

Options:

A.

permit-ACL

B.

WMM required

C.

mark

D.

rate-limit

Buy Now
Questions 70

An engineer needs to configure an autonomous AP for 802.1x authentication. To achieve the highest security an authentication server is used for user authentication. During testing, the AP fails to pass the user authentication request to the authentication server. Which two details need to be configured on the AP to allow communication between the server and the AP? (Choose two.)

Options:

A.

username and password

B.

PAC encryption key

C.

RADIUS IP address

D.

shared secret

E.

group name

Buy Now
Questions 71

An engineer is configuring multicast for wireless for an all-company video meeting on a network using EIGRP and BGP within a single domain from a single source. Which type of multicast routing should be implemented?

Options:

A.

Protocol Independent Multicast Dense Mode

B.

Source Specific Multicast

C.

Multicast Source Discovery Protocol

D.

Protocol Independent Multicast Sparse Mode

Buy Now
Questions 72

Which role does an engineer configure for administrative access to the wireless infrastructure, using Cisco ISE, to allow configuration of the WLC syslog configuration?

Options:

A.

MANAGEMENT

B.

SECURITY

C.

CONTROLLER

D.

WIRELESS

Buy Now
Questions 73

An engineer is considering an MDM integration with Cisco ISE to assist with security for lost devices.

Which two functions of MDM increase security for lost devices that access data from the network? (Choose two.)

Options:

A.

PIN enforcement

B.

Jailbreak/root detection

C.

data wipe

D.

data encryption

E.

data loss prevention

Buy Now
Questions 74

The security learn is concerned about the access to all network devices, including the Cisco WLC. To permit only the admin subnet to have access to management, a CPU ACL is created and applied. However, guest users cannot get to the web portal. What must be configured to permit only admins to have access?

Options:

A.

The guest portal must be configured on the CPU ACLs on the Cisco WLC.

B.

Access to Cisco ISE must be allowed on the pre authentication ACL.

C.

Management traffic from the guest network must be configured on the ACL rules. D. Traffic toward the virtual interface must be permitted.

Buy Now
Questions 75

An engineer must implement rogue containment for an SSID. What is the maximum number of APs that should be used for containment?

Options:

A.

1

B.

2

C.

3

D.

4

Buy Now
Questions 76

A customer managing a large network has implemented location services. Due to heavy load, it is needed to load balance the data coming through NMSP from the WLCs. Load must be spread between multiple CMX servers to help optimize the data flow for APs. Which configuration in CMX meets this requirement?

Options:

A.

cmxctl config feature flags nmsplb.cmx-ap-grouping true

B.

cmxctl config feature flags nmsplb.cmxgrouping true

C.

cmxctl config feature flags nmsplb.cmx-loadbalance true

D.

cmxctl config feature flags nmsplb.cmx-rssi-distribute true

Buy Now
Questions 77

What is the difference between PIM sparse mode and PIM dense mode?

Options:

A.

Sparse mode supports only one switch. Dense mode supports multiswitch networks.

B.

Sparse mode floods. Dense mode uses distribution trees.

C.

Sparse mode uses distribution trees. Dense mode floods.

D.

Sparse mode supports multiswitch networks. Dense mode supports only one switch.

Buy Now
Questions 78

An engineer has been hired to implement a way for users to stream video content without having issues on the wireless network. To accomplish this goal, the engineer must set up a reliable way for a Media Stream to work between Cisco FlexConnect APs. Which feature must be enabled to guarantee delivery?

Options:

A.

Unicast Direct

B.

IGMP Direct

C.

Multicast Direct

D.

Multicast-to-Unicast Direct

Buy Now
Questions 79

A network engineer must get an autonomous AP to authenticate to the upstream switch via IEEE 802.1 X. Drag and drop the commands from the left onto the right to complete the configuration.

Options:

Buy Now
Questions 80

A network engineer is configuring a Cisco AireOS WLC environment for central web authentication using Cisco ISE.

The controllers are configured using auto-anchor for the guest network.

Which three components must be implemented for the foreign WLC?(Choose three.)

Options:

A.

DHCP RADIUS profiling enabled.

B.

HTTP RADIUS profiling enabled.

C.

UDP/1812-1813 open to ISE

D.

downloadable preauth ACL on ISE

E.

local preauth ACL on WLC

F.

WLAN Layer 2 security

Buy Now
Questions 81

A WLC must be configured to allow multiple mDNS profiles based on a user authentication profile configured in Cisco ISE. Which WLAN setting must be configured?

Options:

A.

mDNS policy

B.

mDNS Snooping

C.

AAA Override

D.

service advertisement

Buy Now
Questions 82

An engineer is deploying a virtual MSE. The network has 3000 APs and needs 7000 IPS licenses.

To which size server does the engineer scale it?

Options:

A.

virtual

B.

standard

C.

high end

D.

low end

Buy Now
Questions 83

An engineer configured a Cisco AireOS controller with two TACACS+ servers. The engineer notices that when the primary TACACS+ server fails, the WLC starts using the secondary server as expected, but the WLC does not use the primary server again until the secondary server fails or the controller is rebooted. Which cause of this issue is true?

Options:

A.

Fallback is enabled

B.

Fallback is disabled

C.

DNS query is disabled

D.

DNS query is enabled

Buy Now
Exam Code: 300-430
Exam Name: Implementing Cisco Enterprise Wireless Networks (300-430 ENWLSI)
Last Update: Jan 1, 2026
Questions: 277
300-430 pdf

300-430 PDF

$28.5  $94.99
300-430 Engine

300-430 Testing Engine

$33  $109.99
300-430 PDF + Engine

300-430 PDF + Testing Engine

$43.5  $144.99