what is the policy control and enforcement function?
In an architecture without an ISG, what is the policy control and enforcement function?
Which tunneling option is appropriate for integration with a 3G GSM mobile packet core?
Which tunneling option is appropriate for integration with a 3G GSM mobile packet core?
which two pieces of LMA information are critical to creating a PMIPv6 tunnel?
When you place a MAG on the Cisco WLC, which two pieces of LMA information are critical to
creating a PMIPv6 tunnel? (Choose two.)
Which IEEE 802.11 standard allows the endpoint of a subscriber to dynamically locate and connect to a wireless
Which IEEE 802.11 standard allows the endpoint of a subscriber to dynamically locate and
connect to a wireless network that belongs to their service provider or a roaming partner?
Drag the Cisco Service Provider Wi-Fi Solution on the left to the correct deployment model on the right.
Which two authentication methods automate user authentication?
To improve the user experience, Cisco Service Provider Wi-Fi networks should use authentication
options that automate user authentication and no longer require the user to enter their credentials
manually. Which two authentication methods automate user authentication? (Choose two.)
Which option is a requirement for a client when PMIPv6 is used in the Cisco Service Provider WiFi environment?
Which option is a requirement for a client when PMIPv6 is used in the Cisco Service Provider WiFi environment?
Which three ways can be used to configure a wireless controller?
Which three ways can be used to configure a wireless controller? (Choose three.)
How does 802.11r or fast BSS transition reduce the amount of time required for a client to roam?
How does 802.11r or fast BSS transition reduce the amount of time required for a client to roam?
Which two benefits does IEEE 802.11k – "Radio Resource Management" provide to a Wi-Fi network?
Which two benefits does IEEE 802.11k – “Radio Resource Management” provide to a Wi-Fi
network? (Choose two.)

