Pre-Summer Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Cisco 350-101 - Implementing and Operating Cisco Wireless Core Technologies (350-101 WLCOR)v1.0

Page: 2 / 3
Total 102 questions

Refer to the exhibit. A startup company has recently moved to new offices and performed a full network refresh. The application development team requested a high-speed reliable wireless network to use for testing real-time applications. Although, the wireless network is Wi-Fi 7 enabled, the wireless clients are connecting using lower speeds. Which configuration must be applied on the WLC to increase throughput?

A.

security wpa3 akm sae ext-key

B.

security wpa wpa2 wpa3 aes512

C.

security wpa wpa2 wpa3 tkip512

D.

security wpa wpa2 ciphers gcmp256

Exhibit:

Refer to the exhibit. An organization wants to use Cisco Spaces for location analytics, and an engineer is setting up the Cisco Catalyst 9800 WLC to send location data. The Spaces connector has already been configured and is operational on the WLC. The engineer must now configure the controller to forward telemetry data to the correct Spaces cloud endpoint using TLS to complete the integration. Which CLI command must be added to the box in the code?

A.

profile spaces-profile ip address 198.51.100.10 receiver tls-native

B.

receiver protocol tls-native profile spaces-profile ip address 198.51.100.10 57555

C.

receiver ip address 198.51.100.10 57555 protocol tls-native profile spaces-profile

D.

profile spaces-profile receiver 198.51.100.10 57555 protocol tls-native

Which condition is required for a line-of-sight RF connection?

A.

Wireless multipath signal propagation to the client

B.

MIMO connection support on both wireless radios

C.

Delay on wireless signal delivery introduced by reflection

D.

No physical objects between the transmitter and receiver

What is a benefit of network adaptability in terms of improved operational outcomes when using AI-RRM in Cisco Catalyst Center?

A.

provisioning of static device addresses

B.

reduction of co-channel interference

C.

transmission of regular software update schedules

D.

categorization of users by authentication type

Refer to the exhibit. An engineer is preparing a Cisco 9800-L WLC for deployment in a sensitive area. Only encrypted remote management via SSH is allowed, and all other VTY access methods must be disabled. The 9800-L WLC will be part of a larger deployment, and an external audit will check for any unencrypted management protocols. According to the requirements, only SSH is allowed for remote CLI sessions. Which set of commands must be executed to complete the Cisco IOS XE CLI configuration on the WLC?

A.

line vty 0 97no transport input telnetlogin authentication default

B.

line vty disable 0 97transport preferred sshlogin authentication defaultexit

C.

line vty 0 97transport input sshlogin authentication defaultexit

D.

line vty 0 97transport sshlogin authentication default

Refer to the exhibit. A network engineer must create a PSK WLAN that will be anchored to the DMZ. After this WLAN is created, users cannot connect to it. Based on the output from the RA trace, which action must the engineer take to resolve the issue?

A.

Disable fast transition 802.11r on the WLAN.

B.

Configure matching passwords on the client and the WLAN.

C.

Remove the anchor WLC from the mobility group.

D.

Configure matching WLANs on the foreign and the anchor.

A retail store is setting up guest Wi-Fi on a Cisco 9800 WLC. The IT team has these requirements:

When a guests associates, they are prompted for web authentication.

After login, traffic is restricted to internet-only access.

Guest WLAN must be available throughout all sales floors.

Guest WLAN must not impact the existing corporate WLAN.

Guest SSID must not require a password.

Which set of configurations must the IT team deploy to meet the requirements?

A.

WPA2-Enterprise authentication on the guest WLAN and use dynamic VLAN assignment.

B.

Local web authentication on the guest SSID and apply ACLs to allow all traffic except FTP and SSH from the guest WLAN.

C.

Central web authentication on the guest WLAN and apply an ACL that denies traffic between devices that use the internal subnets.

D.

MAC filtering on the guest WLAN and enable client exclusion for segregation.

A persistent network issue is impacting connectivity for workstations in a training lab when connecting to a lab SSID. Wireless logs show clients never receive a DHCP offer when trying to obtain an IP address. The APs are operating in Local mode. Network monitoring systems indicate optimal signal quality and radio performance, VLAN assignments for the affected SSID have been configured, and all clients are affected. Which action resolves the issue?

A.

Release or renew the client IP configuration.

B.

Enable DHCP option 43.

C.

Configure DHCP relay.

D.

Disable multicast on the WLC.

What does a high SNR value result in?

A.

presence of multipath signal distortion

B.

use of directional array patterns in wireless signaling

C.

increased data integrity with fewer errors

D.

modification of output frequency ranges

What is the purpose of YANG when used with the NETCONF protocol in the context of Cisco wireless controllers?

A.

Human-readable data modeling language used to define device configuration and operational data

B.

Security protocol that encrypts configuration data during transmission between network management systems and devices.

C.

Protocol that directly transports configuration data between network devices without requiring any data modeling

D.

Proprietary Cisco scripting language used exclusively for automating wireless controller configurations