Which four attack categories can the Cisco WLC v7.0 IDS detect using the 17 standard signatures?
Which four attack categories can the Cisco WLC v7.0 IDS detect using the 17 standard
signatures? (Choose four.)
Which two tools help to provide PCI compliance reports?
Which two tools help to provide PCI compliance reports? (Choose two.)
What is the default mode of remote access to the AP?
A Cisco WLC v7.0 has been only initially configured through the console setup CLI wizard. A new
AP has just finished association with the controller. What is the default mode of remote access to
the AP?
Which one of the following best describes the implementation of VLAN pooling on a Cisco WLC v7.0?
Which one of the following best describes the implementation of VLAN pooling on a Cisco WLC
v7.0?
Which one of the options is responsible for multiple requirements for account data protection such as with cre
Which one of the options is responsible for multiple requirements for account data protection such
as with credit cards?
Which two firewall ports must be opened for the anchor controller to operate properly with a foreign controlle
Which two firewall ports must be opened for the anchor controller to operate properly with a
foreign controller for guest access? (Choose two.)
Which two descriptions of mpings and epings are true?
Which two descriptions of mpings and epings are true? (Choose two.)
Which statement correctly describes the relationship between the foreign and anchor controllers when used for
Which statement correctly describes the relationship between the foreign and anchor controllers
when used for guest access?
which two statements are true?
When configuring guest WLAN access, which two statements are true? (Choose two.)