What three pieces of information must be collected for an active survey to assess the outcome best suited for
An engineer is gathering information for a wireless survey of a hospital. What three pieces of
information must be collected for an active survey to assess the outcome best suited for the
facility? (Choose three.)
What application would meet the requirements?
A company wants to implement wireless in all 20 remote office locations and wants centralized
management of these remote sites. What application would meet the requirements?
What two configurations are needed to fix this?
A customer mounted three new APs in a small business. After configuring the IP address, users
still could not access the web through the new access points. What two configurations are needed
to fix this? (Choose two.)
what mode?
A client is deploying lightweight APs. Those with LAN connections to the controller would be
considered what mode of deployment, while access points deployed across a higher latency
connection are deployed in what mode?
what IP address?
When using DHCP option 43, the discovery option supports vendor specific identifiers in order to
obtain what IP address?
Which two are characteristics of GETVPN?
Which two are characteristics of GETVPN? (Choose two.)
Which AAA authentication method should be selected?
A network administrator needs to implement a service that enables granular control of IOS
commands that can be executed. Which AAA authentication method should be selected?
which attribute to assign privileges based on Microsoft Active Directory user groups?
An administrator can leverage which attribute to assign privileges based on Microsoft Active
Directory user groups?
Which two are valid configuration constructs on a Cisco IOS router?
A company has decided to migrate an existing IKEv1 VPN tunnel to IKEv2. Which two are valid
configuration constructs on a Cisco IOS router? (Choose two.)
What is a unique characteristic of the most secure mode?
Cisco 802.1X phasing enables flexible deployments through the use of open, low-impact, and
closed modes. What is a unique characteristic of the most secure mode?