Pre-Summer Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Cisco 350-101 - Implementing and Operating Cisco Wireless Core Technologies (350-101 WLCOR)v1.0

Page: 1 / 3
Total 102 questions

Which process enables seamless Layer 2 handoff in a wireless network during roaming?

A.

increased beacon interval setting

B.

optimized roaming

C.

fast BSS transition protocol

D.

deferred probe response technique

Refer to the exhibit. An engineer configured a static IP address on a LWAPP, but it is not reachable for management. The engineer configured the wrong gateway and must now change the default gateway to 172.16.100.1. Which CLI command must the engineer use?

A.

capwap ap ip default-gateway 172.16.100.1

B.

capwap ap controller ip address 172.16.100.1

C.

capwap ap ip 172.16.100.104 255.255.255.192 172.16.100.1

D.

capwap ap ip 172.16.100.104 255.255.255.0 172.16.100.1

A network administrator at a retail company recently deployed a Cisco Catalyst 9800 WLC. The NOC was unaware of wireless issues until it received reports from users. The network administrator must configure Cisco Catalyst Center to enable effective client issue alerts via email to prevent this happening again. Which action must the network administrator take in Cisco Catalyst Center to meet the requirements?

A.

Configure a new event alert by navigating to Use Assurance > Platforms > Notifications.

B.

Configure a new notification by navigating to Platform > Developer Toolkit > Event Notifications.

C.

Add the NOC email address by navigating to Use Assurance > Issue Settings > Email.

D.

Add the NOC email address by navigating to Platform > Event Notifications > Email.

A deployment requires that several APs be connected to edge switches, and each AP must support management and guest Wi-Fi traffic. The APs tag guest traffic separately from management, and the organization expects to add more VLANs for IoT and voice soon, so the configuration must support scalability. The security team requires that guest traffic never mix with internal resources. Which port configuration must be used for the switch interfaces that connect to the APs?

A.

Configure the central Layer 3 switch port as an access VLAN port that allows the management VLAN only.

B.

Implement switch port access with the native VLAN for guest traffic and trunk with the management VLAN.

C.

Set a trunk port with the management VLAN as the native VLAN, and allow only management and user VLANs.

D.

Make the port an access port on the management VLAN because all traffic is tunneled back to the WLC.

A wireless administrator must configure detailed and comprehensive monitoring for client devices across branch locations. The team wants to streamline operations for faster response during performance degradation. To support the organization's growth, the administrator needs a centralized reporting platform that displays aggregated data. Which solution must the administrator use to monitor the clients in the network?

A.

Implement central syslog server.

B.

Use Cisco Catalyst Center Assurance.

C.

Run show logging on WLC CLI.

D.

Use the WLC dashboard.

A wireless controller is deployed at a branch location to facilitate secure client connectivity. A network engineer configures one WLAN using WPA2 Personal authentication and activates the preshared key method to align with company security policies. Which action must be taken to enable the client to connect to the WLAN?

A.

Enter the preshared key at the WLAN security configuration prompt

B.

Enable MAC filtering for security group assignment

C.

Configure Active Directory integration for WLAN authentication

D.

Import a client certificate for WPA2 authentication

Refer to the exhibit.

A WLC is deployed at a branch location to facilitate secure client connectivity. A network engineer configures one WLAN using WPA2 Personal passphrase and activates ASCII format key to align with company security policies. Which configuration enables client authentication for this WLAN?

A.

no security wpa akm dot1x

B.

client dhcp-proxy enable

C.

security wpa wpa2 ciphers aes

D.

security wpa akm psk set-key ascii 0

In an RF environment, what does high interference result in?

A.

unreliable frame aggregation

B.

inconsistent channel performance

C.

scheduled contention access

D.

extended coverage patterns

What is a characteristic of 20 MHz channel width in a wireless network?

A.

Narrowest channel width in the 2.4 GHz band

B.

Increases authentication handoff frequency

C.

Supports automatic client reassociation

D.

Higher throughput than wider channels

Refer to the exhibit. An engineer is configuring a switch port for a Cisco Spaces deployment at a new branch site. The Spaces connector requires access to the management VLAN 30. The network team plans to add more analytics services in the future, so the configuration must also allow for easy scalability and avoid service interruption for currently connected devices and default switch VLAN settings. Which set of commands must be added to the box in the CLI to complete the configuration?

A.

switchport mode accessswitchport access vlan 30

B.

switchport mode accessswitchport trunk allowed vlan 30switchport access native vlan

C.

switchport mode accessswitchport trunk allowed vlan 30switchport trunk native vlan none

D.

switchport mode trunkswitchport trunk allowed vlan 30