which two IETF RADIUS attributes should you configure on the Cisco Secure ACS?
You want to dynamically assign users to an 802.1Q VLAN as a result of their authentication. In order to accomplish this, which two IETF RADIUS attributes should you configure on the Cisco Secure ACS? (Choose two.)
which two security events?
The Cisco WCS logs which two security events? (Choose two.)
Which of the following would cause this failure?
Using the WLSE, you are trying to push out a configuration job to a standalone access point, but the job does not start. Which of the following would cause this failure?
which of these events?
If the Cisco WLAN controller cannot reach the primary AAA server, it will proceed to the next server on the list by priority index. The Cisco WLAN controller will return to the primary AAA server, when reachable, upon which of these events?
What level do you set the bandwidth to?
You are troubleshooting a problem with a Cisco 7920 wireless IP phone that is causing the phone to drop calls. The problem appears to be a roaming bandwidth issue. In order to verify what kind of issue it is, you decide to increase the bandwidth reserved for roaming on the WLAN controller to the maximum. What level do you set the bandwidth to?
which three assigned policies by the administrator?
Cisco Secure ACS ensures enforcement of which three assigned policies by the administrator? (Choose three.)
Which of these entities initializes the secure tunnel?
EAP-FAST provides a secure tunnel during Phase One to protect the user’s authentication credentials. Which of these entities initializes the secure tunnel?
How many mesh access points can be placed on a map with efficient link rendering in Cisco WCS?
How many mesh access points can be placed on a map with efficient link rendering in Cisco WCS?
which of the following actions should you perform on the wired infrastructure?
You are charged with implementing a secure wireless installation which will provide Internet access to client devices but will not allow communications between wireless clients. In addition to implementing PSPF or peer-to-peer blocking on the wireless side, which of the following actions should you perform on the wired infrastructure?
Which three of the following statements are true about Link Aggregation for this customer?
A customer employs a Cisco 4404 Wireless LAN Controller, supporting 100 access points across four distribution ports. They are also using link aggregation on this controller. Which three of the following statements are true about Link Aggregation for this customer? (Choose three.)