Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Cisco 300-425 - Designing Cisco Enterprise Wireless Networks (ENWLSD)

Page: 6 / 9
Total 256 questions

A customer is concerned about mesh backhaul link security. Which level of encryption does the backhaul link use?

A.

hash

B.

AES

C.

WEP

D.

3DES

Refer to the exhibit.

A network engineer has identified that during a recent controller failure, several APs failed over to the tertiary controller instead of the secondary controller. The configuration from one of the APs is provided. Which design consideration led to the issue?

A.

The secondary controller was at capacity.

B.

The secondary controller is an SSO configuration.

C.

The tertiary controller is an HA-SKU controller, so it took priority.

D.

The tertiary controller is in the same subnet as the primary controller.

A rapidly expanding company has tasked their network engineer with wirelessly connecting a new cubicle area with Cisco workgroup bridges until the wired network is complete. Each of 42 new users has a computer and VoIP phone. How many APs for workgroup bridging must be ordered to keep cost at a minimum while connecting all devices?

A.

4

B.

5

C.

6

D.

7

Which solution benefits from signal attenuation and provides channel reuse for high-density WI-FI deployment in an amphitheater?

A.

celling mounting

B.

front and rear mounting

C.

side mounting

D.

under-seat mounting

During a meeting to gather the requirements for a new Wi-Fi network design, the customer requests that to connect. Which affect does this have to the wireless network?

A.

bigger channel width

B.

lower throughput

C.

2.4 GHz signal congestion

D.

higher RF re ection

An architect configures a set of AirOS controllers to be in the same mobility group as the existing controllers. The implementation should facilitate inter-controller roaming for users in their new campus. After the configuration, the mobility tunnel is not operational for the data path in the network. Which two validations should be performed? (Choose two.)

A.

firewall port 16666

B.

mapping

C.

mepping

D.

rping

E.

firewall IP protocol 97

Which survey is performed after deployment to ensure coverage matches design requirements?

A.

Predictive

B.

Passive

C.

Validation

D.

Active

Refer to the exhibit.

Client A is roaming from AP1 on WLC1 to AP2 on WLC2. The client roams between two APs registered to two different controllers. The WLAN on the two controllers is on a different subnet. Which scenario explains the client's roaming behavior?

A.

The client database entry is different than that of Layer 2 roam. (Instead of cop-ying, it moves the database to the new controller.)

B.

The client database entry is different than that of Layer 2 roam. (Instead of mov-ing, it copies the database to the new controller.)

C.

The client database entry is different than that of Layer 2 roam because the cli-ent database is neither moved nor copied into the new controller.

D.

The client database remains in the mobility anchor controller and it is not cop-ied or moved.

Multiple WLCs are implemented in a high-availability configuration in a mobility group. APs are deployed with only a primary controller assigned. By default, which mobility group member controller do the orphaned APs join in the event of a failed controller?

A.

controller with the most available AP free license capacity

B.

controller with the lowest percent of associated APs per license capacity

C.

controller with the least CPU utilization over the last reporting period

D.

controller with the least number of associated APs

A customer has a single anchor WLC named Anchor A. Anchor A is in a DMZ and provides guest access. The customer wants to deploy an additional anchor controller named Anchor B to provide redundancy if Anchor A fails. Which design approach should be taken for the guest WLAN priority on the foreign WLC for each anchor WLC?

A.

Set Anchor A to priority 3 and Anchor B to priority 3.

B.

Set Anchor A to priority 3 and Anchor B to priority 1.

C.

Set Anchor A to priority 1 and Anchor B to priority 1.

D.

Set Anchor A to priority 1 and Anchor B to priority 3.