Pre-Summer Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Cisco 350-101 - Implementing and Operating Cisco Wireless Core Technologies (350-101 WLCOR)v1.0

Page: 3 / 3
Total 102 questions

Exhibit:

Refer to the exhibit. A network administrator is working on a WLC to enable user access for employee tablets using PEAP-MSCHAPv2 with a RADIUS backend. The administrator verifies the external authentication configuration and plans to test network connectivity. Which code snippet must be added to the configuration for the WLC to support authentication with an external server?

A.

radius server external-radius

B.

external-radius RADIUS-GRP

C.

radius server RADIUS-GRP

D.

external-radius aaa server

Refer to the exhibit. A wireless controller is deployed at a branch location to facilitate secure client connectivity. A network engineer configures a WLAN using 802.1X to align with company security policies. Which configuration enables client authentication for this WLAN?

A.

no ip mac-binding

B.

security dot1x authentication-list ISE_GROUP

C.

aaa override enable

D.

wlan branch1 policy branch1_policy

An engineer must troubleshoot complex wireless performance issues in a large office which is using a Cisco 9176 AP. The engineer must analyze traffic patterns and identify potential sources of interference. The AP must capture all wireless frames in the air and send them to a remote protocol analyzer for detailed inspection. Client connectivity is not required from the AP during the troubleshooting window. Which CLI command must the engineer use on the WLC to enable the required AP mode for this purpose?

A.

ap name office1st mode monitor

B.

ap name office1st mode sniffer

C.

ap name office1st mode local

D.

ap name office1st mode rogue-detector

A network engineer must ensure that guest users connecting to a Cisco 9800 WLC are assigned IP addresses from a specific subnet that is separate from corporate users. The guest network must support at least 200 simultaneous connections and isolate traffic from internal devices. The DHCP server must allocate addresses only within the 10.20.30.0/24 subnet. Which action must the network engineer take to accomplish this task?

A.

Set up a unique policy tag on the guest WLAN and use a shared DHCP pool.

B.

Create a dedicated guest interface and map it to the guest policy profile for the guest WLAN.

C.

Assign a unique policy tag to the guest WLAN and use a shared DHCP pool with DHCP option 43.

D.

Use static IP address assignment for the guest WLAN interface and use ACLs for separation.

Refer to the exhibit. A JSON response from a wireless management API contains access point inventory and interface state information. Which JSON expression retrieves the MAC address of the second interface on the first access point?

A.

accessPoints[0].interfaces[1] .macAddress

B.

accessPoints[1].interfaces[0] .macAddress

C.

accessPoints[0].interfaces[0] .macAddress

D.

accessPoints[1].interfaces[1] .macAddress

What happens when a radio wave bends around objects?

A.

absorption

B.

diffusion

C.

reflection

D.

diffraction

What is the main benefit of using AI Enhanced RRM on the Cisco Catalyst 9800 wireless controller?

A.

It is an automatic tuning tool that is used to adjust RF parameters based on static thresholds.

B.

It focuses on increasing the transmit power of access points to maximize coverage regardless of interference.

C.

It disables dynamic channel assignment and power control to maintain a fixed wireless environment for stability.

D.

It uses machine learning and cloud analytics to proactively optimize RF parameters.

Users report slowness on the network, and it is suspected that certain applications are consuming all the bandwidth. A network engineer must enable the NBAR protocol to improve wireless client traffic visibility and provide advanced, granular, application classification, and analytics. How should the network engineer configure NBAR on a 9800 WLC?

A.

Enable NBARv2 on the WLAN.

B.

Enable deep packet inspection on the WLAN.

C.

Configure packet inspection on the policy profile.

D.

Configure AVC on the policy profile.

A network administrator at a marketing company manages a Cisco Catalyst 9800 Series Wireless Controller running Cisco IOS XE 17.x. The WLAN named XYZ-Guest is set up for visitors, and the administrator wants to implement a web authentication (WebAuth) portal using an external server to manage guest access. To ensure seamless and secure guest authentication, the controller must be configured to use an external WebAuth server for the WLAN. The administrator must configure the XYZ-Guest WLAN to use an external WebAuth server with a parameter map named webauth-ext. Which set of Cisco IOS XE commands must be used?

A.

wireless wlan XYZ-Guestsecurity web-auth external webauth-ext

B.

wireless wlan XYZ-Guest 2 XYZ-Guestparameter-map webauth-ext

C.

wlan XYZ-Guest 2parameter external security-map webauth-ext

D.

wlan XYZ-Guest 2 XYZ-Guestsecurity web-auth parameter-map webauth-ext

What is used for measuring gain on a Wi-Fi antenna?

A.

length of the antenna

B.

decibels relative to dBi

C.

voltage against dBm

D.

blend of analog and digital signals