PrepAway - Latest Free Exam Questions & Answers

Author: seenagape

Which one of the below 802.1X EAP authentication protocols would you recommend to your customer?

Your enterprise customer is considering adding a VoWLAN service to their existing wireless
deployment. The VoWLAN wireless phones have limited power and processing capabilities. The IT
manager insists that, while the authentication protocol must preserve battery and processing power,
it must also be secure. Assume that the wireless phones and AAA infrastructure support all the EAP
methods listed within the options. Which one of the below 802.1X EAP authentication protocols
would you recommend to your customer?

Which statement is correct about the RFID tag timeout settings, as you would see in a show advanced location s

Asset tags are not being detected correctly and re-verification of the correct configuration should be
performed. It is also recommended that verification of correct asset tag RSSI detection and message
forwarding is conducted. Which statement is correct about the RFID tag timeout settings, as you
would see in a show advanced location summary on a Cisco WLC?

What are the minimum and optimal numbers of access points required to cover an area in order to provide locati

Wireless client location tracking provided by the Cisco MSE relies heavily on the number of access
points that can hear a particular wireless client. What are the minimum and optimal numbers of
access points required to cover an area in order to provide location tracking?

Which three of these statements must be true in order for bandwidth-based CAC to correctly operate for voice c

Bandwidth-based Call Admission Control for voice services allows the client to request the required
bandwidth or medium time to accept calls in a congested RF environment. Which three of these
statements must be true in order for bandwidth-based CAC to correctly operate for voice calls?
(Choose three.)