QUESTION 21
What is the maximum number of clients that a small branch deployment using a four- member Cisco Catalyst 3850 stack (acting as MC/MA) can support?
A. |
10000 |
B. |
1000 |
C. |
500 |
D. |
2000 |
E. |
5000 |
Correct Answer: E
QUESTION 22
Refer to the exhibit. A customer is having problems with clients associating to me wireless network. Based on the configuration, which option describes the most likely cause of the issue?
A. |
Both AES and TKIP must be enabled |
B. |
SA Query Timeout is set too low |
C. |
Comeback timer is set too low |
D. |
PME is set to “required” |
E. |
MAC Filtering must be enabled |
Correct Answer: E
QUESTION 23
Which of the following user roles can access CMX Visitor Connect?
A. |
Administrator |
B. |
Power User |
C. |
Guest User |
D. |
Super Administrator |
Correct Answer: A
QUESTION 24
A Customer is concerned about denial of service attacks that impair the stable operation of the corporate wireless network. The customer wants to purchase mobile devices that will operate on the corporate wireless network. Which IEEE standard should the mobile devices support to address the customer concerns?
A. |
802.11w |
B. |
802.11k |
C. |
802.11r |
D. |
802.11h |
Correct Answer: A
QUESTION 25
Which option determines which RADIUS server is preferred the most by the Cisco WLC?
A. |
the Server Index (Priority) drop-down list |
B. |
the server status |
C. |
the server IP address |
D. |
the port number |
Correct Answer: A
QUESTION 26
Which two 802.11 methods can be configured to protect card holder data? (Choose two.)
A. |
CCMP |
B. |
WEP |
C. |
SSL |
D. |
TKIP |
E. |
VPN |
Correct Answer: CE
QUESTION 27
An engineer requires authentication for WPA2 that will use fast rekeying to enable clients to roam from one access point to another without going through the controller. Which security option should be configured?
A. |
PSK |
B. |
AES |
C. |
Cisco Centralized key Management |
D. |
802.1x |
Correct Answer: C
QUESTION 28
A
Cisco WLC has been added to the network and Cisco ISE as a network device, but authentication is failing. Which configuration within the network device configuration should be verified?
A. |
shared secret |
B. |
device ID |
C. |
SNMP RO community |
D. |
device interface credentials |
Correct Answer: A
QUESTION 29
How many mobility peers can a Cisco Catalyst 3850-MC node have?
A. |
8 |
B. |
2 |
C. |
6 |
D. |
16 |
E. |
4 |
Correct Answer: A
QUESTION 30
On which two ports does the RADIUS server maintain a database and listen for incoming authentication and accounting requests? (Choose two.)
A. |
UDP 1900 |
B. |
UDP port 1812 |
C. |
TCP port 1812 |
D. |
TCP port 1813 |
E. |
UDP port 1813 |
Correct Answer: BE
Free VCE & PDF File for Cisco 300-075 Real Exam
Instant Access to Free VCE Files: CCNA | CCNP | CCIE …
Instant Access to Free PDF Files: CCNA | CCNP | CCIE …