Which two actions would you use to troubleshoot the problem?
Communication between the wireless controllers and the network core are not reliable. Data
throughput does not appear to be working and access point communication is intermittent.
Which two actions would you use to troubleshoot the problem? (Choose two.)
Which two settings would be configured for optimal performance?
Radio profiles and service profiles perform different functions on an AP. You want to configure the
AP radio for optimal performance for your wireless clients.
Which two settings would be configured for optimal performance? (Choose two.)
Which feature would you use to accomplish this?
You are the administrator for a WLAN which spans two sites separated by 50 miles (80 km). Your
manager asks you to configure the system so that users moving between facilities will maintain
their “home” VLAN.
Which feature would you use to accomplish this?
What are two results on the cluster?
You added a new WLC to an existing cluster.
What are two results on the cluster? (Choose two.)
Which WLAN standard supports a maximum data rate of 11 Mbps?
Which WLAN standard supports a maximum data rate of 11 Mbps?
Which three methods are used to accomplish this?
You want to provide secure wireless services to one set of clients on your network and allow open
access services to your guest clients. You need to configure service profiles for each type of
access to the network.
Which three methods are used to accomplish this? (Choose three.)
Which command accomplishes this?
You are asked to upgrade your WLC using CLI commands. You want to copy the WLC image
WC07201.280 from the TFTP server 10.10.10.3 onto the WLC boot1.
Which command accomplishes this?
Which WLC CLI command would be used for troubleshooting RADIUS connectivity?
You are asked to troubleshoot a communication problem between a WLC and a RADIUS server.
You verified that the RADIUS server is reachable from the WLC.
Which WLC CLI command would be used for troubleshooting RADIUS connectivity?
Which setting would you configure to block their access to the network?
You detect wireless clients who are connected to an unauthorized AP on your network.
Which setting would you configure to block their access to the network?
What should you do to resolve this issue?
During the installation of RingMaster, you receive the installation error: “HTTPS Server port is
already in use. Please select another port.”
What should you do to resolve this issue?