Pre-Summer Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: clap70

350-101 Implementing and Operating Cisco Wireless Core Technologies Questions and Answers

Questions 4

Which feature does bridge mode provide in a Cisco wireless mesh architecture?

Options:

A.

It enables point-to-point communication between network segments.

B.

It switches all traffic passing through the AP to 2.4 GHz by default.

C.

It adjusts RF transmit power on any neighbor nodes.

D.

It communicates with WAN edge by default.

Buy Now
Questions 5

Which process enables seamless Layer 2 handoff in a wireless network during roaming?

Options:

A.

increased beacon interval setting

B.

optimized roaming

C.

fast BSS transition protocol

D.

deferred probe response technique

Buy Now
Questions 6

A wireless controller is deployed at a branch location to facilitate secure client connectivity. A network engineer configures one WLAN using WPA2 Personal authentication and activates the preshared key method to align with company security policies. Which action must be taken to enable the client to connect to the WLAN?

Options:

A.

Enter the preshared key at the WLAN security configuration prompt

B.

Enable MAC filtering for security group assignment

C.

Configure Active Directory integration for WLAN authentication

D.

Import a client certificate for WPA2 authentication

Buy Now
Questions 7

Refer to the exhibit.

A wireless controller is deployed at a branch location to facilitate guest client connectivity. A network engineer configures one WLAN using Web authentication and activates web-based method to align with company security policies. Which configuration enables client authentication for this WLAN?

Options:

A.

security web-auth

B.

wlan webauth 2 webauth

C.

no security wpa wpa2

D.

no security wpa akm dot1x

Buy Now
Questions 8

Refer to the exhibit.

An engineer must configure wireless guest networking for a deployment at site A, which requires support for guest VLAN assignment and assignment for wlan guest-network 20. The controller will provide network segregation and restrict access to internal resources. Based on the configuration commands, which action meets the requirements?

Options:

A.

Establish a mesh bridge connection for the guest VLAN and assign logical interface for isolation.

B.

Create a policy profile for the guest VLAN and a policy tag to map the WLAN to the policy profile.

C.

Assign a policy tag to map the to WLAN and assign a physical interface for isolation.

D.

Implement the Spanning Tree Protocol and assign an AP group name.

Buy Now
Questions 9

Which Cisco technology leverages machine learning methods and a cloud learning platform that helps to identify critical issues?

Options:

A.

Catalyst Center Assurance

B.

Network Services

C.

Catalyst Center LLM Insights

D.

AI Network Analytics

Buy Now
Questions 10

A network engineer is deploying a new wireless monitoring solution in a large campus. The engineer must connect Cisco Spaces Connector, Cisco ISE, and a Catalyst Center appliance to the switch infrastructure. All three services require management and telemetry connectivity, and the security policy mandates segregation of management and user traffic. The engineer also must ensure that any network changes do not disrupt ongoing wireless services for users and staff. Which implementation must the engineer use on the switch interfaces?

Options:

A.

Configure PortFast on each separate interface to speed up convergence.

B.

Assign the management VLAN as the native VLAN on trunk ports for all three services.

C.

Use the Port Aggregation Protocol for negotiation.

D.

Configure all the interfaces as access ports in the management VLAN.

Buy Now
Questions 11

A university is deploying Cisco Catalyst 9176 APs at several satellite campuses, each with its own subnet and DNS services. The APs will be shipped with only their MAC addresses preregistered on the WLC. The satellite campuses do not use DHCP option 43, but they have access to a central DNS server. IT staff want APs to discover and join the Catalyst 9800 WLC automatically without site visits. Which solution must the IT staff implement?

Options:

A.

Assign static IP addresses to all 9176 APs and configure the controller to be the DNS server.

B.

Set up a multicast group on each different AP subnet to enable automatic controller discovery.

C.

Create DNS entrycisco-capwap-controller.localdomainthat resolves to the WLC management IP address.

D.

Configure a DNS recordap-discoverywith the controller virtual IP address.

Buy Now
Questions 12

Exhibit:

Refer to the exhibit. An enterprise is deploying Cisco Catalyst 9800 WLCs and is using Catalyst Center as the management platform to oversee wireless access policies. To meet the organization's compliance requirements, all wireless endpoints must be evaluated with security posture validation before gaining access. Which set of CLI commands must be added to the box in the code to complete the configuration?

Options:

A.

aaa-overridenac-policy

B.

wireless profile policy my-policyaaa-override

C.

aaa-overridenac

D.

wireless profile policyaaa-override

Buy Now
Questions 13

Refer to the exhibit. An engineer is configuring a switch port for a Cisco Spaces deployment at a new branch site. The Spaces connector requires access to the management VLAN 30. The network team plans to add more analytics services in the future, so the configuration must also allow for easy scalability and avoid service interruption for currently connected devices and default switch VLAN settings. Which set of commands must be added to the box in the CLI to complete the configuration?

Options:

A.

switchport mode accessswitchport access vlan 30

B.

switchport mode accessswitchport trunk allowed vlan 30switchport access native vlan

C.

switchport mode accessswitchport trunk allowed vlan 30switchport trunk native vlan none

D.

switchport mode trunkswitchport trunk allowed vlan 30

Buy Now
Questions 14

Refer to the exhibit.]

An engineer is setting up a new WLC in a branch office. The IT security policy states that all management access must use encrypted protocols, administrators will connect remotely, and network scans will be run to check for any noncompliant management protocol exposure. Which action must the engineer take to achieve the required management access policy?

Options:

A.

Permit only HTTP, Telnet, and SSH across all VLANs for 10.10.1.0/24.

B.

Enable Telnet, SSH, and HTTPS across the management and guest interfaces.

C.

Permit console access for 10.10.1.0/24 only with HTTP disabled.

D.

Enable HTTPS and SSH, and disable HTTP and Telnet on the WLC.

Buy Now
Questions 15

A network administrator at a construction company manages a Cisco Catalyst 9800 Series Wireless Controller running Cisco IOS XE 17.x. The WLAN named XYZ-Conference is set up for a large event, but attendees report slow network performance due to misbehaving clients. To improve connectivity, the network administrator decides to change the client exclusion policy on the WLAN to temporarily block the misbehaving clients. The XYZ-Conference WLAN must enable a client exclusion policy with a timeout of 120 seconds for misbehaving clients. Which set of Cisco IOS XE commands must be used?

Options:

A.

wireless profile policy XYZ-ConferenceXYZ Conference exclude 120

B.

wireless profile policy XYZ-Conferenceexclusionlist timeout 120

C.

wireless profile policy XYZ-Conferencesecurity exclusion timeout 120

D.

wireless profile policy XYZ-Conferenceclient-exclusion 120

Buy Now
Questions 16

Which feature does bridge mode provide in a Cisco wireless mesh architecture?

Options:

A.

It enables point-to-point communication between network segments.

B.

It switches all traffic passing through the AP to 2.4 GHz by default.

C.

It adjusts RF transmit power on any neighbor nodes.

D.

It communicates with WAN edge by default.

Buy Now
Questions 17

Which process is managed by Ministry of Internal Affairs and Communications in Japan?

Options:

A.

RF technical standards

B.

manufacturing batch inspection

C.

customer onboarding documentation

D.

supplier chain evaluation

Buy Now
Questions 18

How does viewing trend deviation in Cisco Catalyst Center AI Analytics benefit wireless operation?

Options:

A.

It maintains server time synchronization

B.

It exports event thresholds to external dashboards

C.

It allows earlier notice of abnormal wireless behavior

D.

It backs up existing log files to remote hosts

Buy Now
Questions 19

How does the optimized roaming function operate in a WLC implementation?

Options:

A.

It disassociates clients when the RSSI is lower than the set threshold.

B.

It is integrated with external services for client wireless experience.

C.

Device locations are determined through peer-to-peer beacons.

D.

Load balancing is statically defined for all locations.

Buy Now
Questions 20

What defines device sensitivity in a wireless environment?

Options:

A.

capability to process the signal

B.

detection of redundant gateways

C.

synchronization of beacon intervals

D.

implementation of key refresh schedules

Buy Now
Questions 21

Refer to the exhibit.

The Catalyst 9800 WLC logs show when a client with MAC address 9C:4E:36:8A:2B:F1 fails to connect to a WLAN configured for Wi-Fi Protected Access 3-Enterprise with 802.1X. Which action must the engineer take to resolve the issue?

Options:

A.

Ensure that the AP is using the appropriate credentials.

B.

Change the WLAN to Wi-Fi Protected Access 2-Personal and configure a preshared key.

C.

Verify the client's Active Directory credentials and ensure that the RADIUS server is reachable.

D.

Disable RADIUS NAC on the policy profile assigned to the WLAN.

Buy Now
Questions 22

An organization must manage ongoing firmware updates for redundant controllers in the network. They will use Cisco Catalyst Center for deployment and visibility. The current environment uses centralized and distributed management approaches. Automation and reporting are critical to minimize operational workload. Which method must be used to manage structured update processes and monitor progress throughout the update cycle?

Options:

A.

inventory snapshots from hardware report

B.

software templates

C.

software image management workflows

D.

lifecycle workflow

Buy Now
Questions 23

How does MIMO operate during wireless transmission?

Options:

A.

It uses multiple radio paths to increase throughput and reliability.

B.

It applies frequency hopping to prevent crosstalk.

C.

It shares a single connection among endpoints for coverage expansion.

D.

It limits data paths to a single antenna for error reduction.

Buy Now
Questions 24

What is a benefit of applying TACACS authentication for device access?

Options:

A.

static user grouping without role differentiation

B.

fragmented statistics across controllers and devices

C.

streamlined administrator access across platforms

D.

single user for device and network access

Buy Now
Questions 25

What is the time taken for an RF signal to travel from the transmitter to the receiver known as?

Options:

A.

reflection

B.

propagation delay

C.

scattering

D.

link speed

Buy Now
Questions 26

Which feature does a high-gain patch antenna impart to a wireless signal?

Options:

A.

single narrow frequency use

B.

partial overlap of frequency bands

C.

focused beam in a flat area

D.

alternating direction with elevation

Buy Now
Questions 27

Users report slowness on the network, and it is suspected that certain applications are consuming all the bandwidth. A network engineer must enable the NBAR protocol to improve wireless client traffic visibility and provide advanced, granular, application classification, and analytics. How should the network engineer configure NBAR on a 9800 WLC?

Options:

A.

Enable NBARv2 on the WLAN.

B.

Enable deep packet inspection on the WLAN.

C.

Configure packet inspection on the policy profile.

D.

Configure AVC on the policy profile.

Buy Now
Questions 28

Refer to the exhibit. A startup company has recently moved to new offices and performed a full network refresh. The application development team requested a high-speed reliable wireless network to use for testing real-time applications. Although, the wireless network is Wi-Fi 7 enabled, the wireless clients are connecting using lower speeds. Which configuration must be applied on the WLC to increase throughput?

Options:

A.

security wpa3 akm sae ext-key

B.

security wpa wpa2 wpa3 aes512

C.

security wpa wpa2 wpa3 tkip512

D.

security wpa wpa2 ciphers gcmp256

Buy Now
Questions 29

Exhibit:

Refer to the exhibit. A network administrator is working on a WLC to enable user access for employee tablets using PEAP-MSCHAPv2 with a RADIUS backend. The administrator verifies the external authentication configuration and plans to test network connectivity. Which code snippet must be added to the configuration for the WLC to support authentication with an external server?

Options:

A.

radius server external-radius

B.

external-radius RADIUS-GRP

C.

radius server RADIUS-GRP

D.

external-radius aaa server

Buy Now
Questions 30

What is the main benefit of using AI Enhanced RRM on the Cisco Catalyst 9800 wireless controller?

Options:

A.

It is an automatic tuning tool that is used to adjust RF parameters based on static thresholds.

B.

It focuses on increasing the transmit power of access points to maximize coverage regardless of interference.

C.

It disables dynamic channel assignment and power control to maintain a fixed wireless environment for stability.

D.

It uses machine learning and cloud analytics to proactively optimize RF parameters.

Buy Now
Exam Code: 350-101
Exam Name: Implementing and Operating Cisco Wireless Core Technologies
Last Update: May 19, 2026
Questions: 0
350-101 pdf

350-101 PDF

$28.5  $94.99
350-101 Engine

350-101 Testing Engine

$33  $109.99
350-101 PDF + Engine

350-101 PDF + Testing Engine

$255  $850