Download Securing Wireless Enterprise Networks.actualtests.300-375.2019-12-04.1e.79q.vcex


Download Exam

File Info

Exam Securing Wireless Enterprise Networks
Number 300-375
File Name Securing Wireless Enterprise Networks.actualtests.300-375.2019-12-04.1e.79q.vcex
Size 2.57 Mb
Posted December 04, 2019
Downloads 14



How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.

Purchase
Coupon: EXAMFILESCOM

Coupon: EXAMFILESCOM
With discount: 20%


 
 



Demo Questions

Question 1
Which two considerations must a network engineer have when planning for voice over wireless roaming? (Choose two.)

  • A: Roaming with only 802.1x authentication requires full reauthentication.
  • B: Roaming time increases when using 802.1x + Cisco Centralized Key Management.
  • C: Full reauthentication introduces gaps in a voice conversation.
  • D: Roaming occurs when the phone has reached -80 dBs or below.
  • E: Roaming occurs when the phone has seen at least four APs.



Question 2
Which mobility mode must a Cisco 5508 Wireless Controller version 8.0 be in to use the MA functionality on a Cisco Catalyst 3850 Series Switch with a Cisco 5508 Wireless Controller as an MC?

  • A: classic mobility
  • B: new mobility
  • C: converged access mobility
  • D: auto-anchor mobility



Question 3
An engineer is configuring a BYOD deployment strategy and prefers a single SSID model. Which technology is required to accomplish this configuration?

  • A: mobility service engine
  • B: wireless control system
  • C: identity service engine
  • D: Prime Infrastructure



Question 4
When you configure BYOD access to the network, you face increased security risks and challenges. Which challenge is resolved by deploying digital client certificates?

  • A: managing the increase in connected devices
  • B: ensuring wireless LAN performance and reliability
  • C: providing device choice and support
  • D: enforcing company usage policies



Question 5
Refer to the exhibit. 

  

What is the 1.1.1.1 IP address?

  • A: the wireless client IP address
  • B: the RADIUS server IP address
  • C: the controller management IP address
  • D: the lightweight AP IP address
  • E: the controller AР-manager IP address
  • F: the controller virtual interface IP address



Question 6
A customer is concerned about denial of service attacks that impair the stable operation of the corporate wireless network. The customer wants to purchase mobile devices that will operate on the corporate wireless network. 
Which IEEE standard should the mobile devices support to address the customer concerns?

  • A: 802.11w
  • B: 802.11k
  • C: 802.11r
  • D: 802.11h



Question 7
After receiving an alert regarding a rogue AP, a network engineer logs into Cisco Prime and looks at the floor map where the AP that detected the rogue is located. The map is synchronized with a mobility services engine that determines the rogue device is actually inside the campus. The engineer determines the rogue to be a security threat and decides to stop it from broadcasting inside the enterprise wireless network. What is the fastest way to disable the rogue?

  • A: Go to the location the rogue device is indicated to be and disable the power.
  • B: Create an SSID on the WLAN controller resembling the SSID of the rogue to spoof it and disable clients from connecting to it.
  • C: Classify the rogue as malicious in Cisco Prime.
  • D: Update the status of the rogue in Cisco Prime to contained.



Question 8
An engineer is configuring client MFP. What WLAN Layer 2 security must be selected to use client MFP?

  • A: Static WEP
  • B: CKIP
  • C: WPA + WPA2
  • D: 802.1x



Question 9
Which CLI command do you use on Cisco IOS XE Software to put the AP named Floor1_AP1 back in the default AP group?

  • A: ap Floor1_AP1 ap-groupname default-group
  • B: ap name Floor1_AP1 apgroup default-group
  • C: ap name Floor1_AP1 ap-groupname default-group
  • D: ap name Floor1_AP1 ap-groupname default



Question 10
A customer has deployed PEAP authentication with a Novell eDirectory LDAP Server. Which authentication method must be configured on the client to support this deployment?

  • A: PEAP(EAP-MSCHAPv2)
  • B: РЕAР(EAP-TTLS)
  • C: РЕAР(ЕAР-GTC)
  • D: PEAP(EAP-WPA)









CONNECT US


ProfExam
PROFEXAM WITH A 20% DISCOUNT

You can buy ProfExam with a 20% discount..

Get Now!


HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen



HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset