Pre-Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: netbudy65

300-430 Implementing Cisco Enterprise Wireless Networks (300-430 ENWLSI) Questions and Answers

Questions 4

Where is a Cisco OEAP enabled on a Cisco Catalyst 9800 Series Wireless Controller?

Options:

A.

RF Profile

B.

Flex Profile

C.

Policy Profile

D.

AP Join Profile

Buy Now
Questions 5

A healthcare organization notices many rogue APs and is concerned about a honeypot attack. Which configuration must a wireless network engineer perform in Cisco Prime Infrastructure to prevent these attacks most efficiently upon detection?

Options:

A.

Set the auto containment level to 0 and select the Using Our SSID containment option.

B.

Set the manual containment level to 4 and select the Ad Hoc Rogue AP containment option.

C.

Set the auto containment level to 0 and select the Ad Hoc Rogue AP containment option.

D.

Set the auto containment level to 4 and select the Using Our SSID containment option.

Buy Now
Questions 6

The security learn is concerned about the access to all network devices, including the Cisco WLC. To permit only the admin subnet to have access to management, a CPU ACL is created and applied. However, guest users cannot get to the web portal. What must be configured to permit only admins to have access?

Options:

A.

The guest portal must be configured on the CPU ACLs on the Cisco WLC.

B.

Access to Cisco ISE must be allowed on the pre authentication ACL.

C.

Management traffic from the guest network must be configured on the ACL rules. D. Traffic toward the virtual interface must be permitted.

Buy Now
Questions 7

An engineer has configured passive fallback mode for RADIUS with default timer settings. What will occur when the primary RADIUS fails then recovers?

Options:

A.

RADIUS requests will be sent to the secondary RADIUS server until the secondary fails to respond.

B.

The controller will immediately revert back after it receives a RADIUS probe from the primary server.

C.

After the inactive time expires the controller will send RADIUS to the primary.

D.

Once RADIUS probe messages determine the primary controller is active the controller will revert back to the primary RADIUS.

Buy Now
Questions 8

A customer wants to allow employees to easily onboard their personal devices to the wireless network. The visitors also must be able to connect to the same network without the need to engage with anyone from the reception desk. Which process must be configured on Cisco ISE to support this requirement?

Options:

A.

MAC authentication bypass

B.

native supplicant provisioning

C.

local web auth

D.

self-registration guest portal

Buy Now
Questions 9

In a Cisco WLAN deployment, it is required that all Aps from branch1 remain operational even if the control plane CAPWAP tunnel is down because of a WAN failure to headquarters. Which operational mode must be configured on the APs?

Options:

A.

disconnected

B.

standalone

C.

lightweight

D.

connected

Buy Now
Questions 10

On a branch office deployment, it has been noted that if the FlexConnect AP is in standalone mode and loses connection to the WLC, all clients are disconnected, and the SSID is no longer advertised. Considering that FlexConnect local switching is enabled, which setting is causing this behavior?

Options:

A.

ISE NAC is enabled

B.

802.11r Fast Transition is enabled

C.

Client Exclusion is enabled

D.

FlexConnect Local Auth is disabled

Buy Now
Questions 11

A FlexConnect remote office deployment is using five 2702i APs indoors and two 1532i APs outdoors. When a code upgrade is performed and FlexConnect Smart AP Image Upgrade is leveraged, but no FlexConnect Master AP has been configured, how many image transfers between the WLC and APs will occur?

Options:

A.

1

B.

2

C.

5

D.

7

Buy Now
Questions 12

An engineer set up a VoWLAN with QoS on the WLC and a class map on the switch, but the markings are not being preserved correctly in the end-to- end traffic flow. Which two configurations on the wired network ensure end-to-end QoS? (Choose two.)

Options:

A.

trust boundaries

B.

access lists

C.

policy maps

D.

QoS licenses

E.

NetFlow

Buy Now
Questions 13

You enter the command or a Cisco Catalyst 3850 Series Switch that runs Cisco ISO XE. What does the command do?

Options:

A.

It defines the user identity or the device identity to be validated by the RADIUS server.

B.

It captures information on the length of the authorized session, as well as the bandwidth usage of the client.

C.

It defines the RADIUS server used to track which sessions are still active.

D.

It defines the level of access of the user or the device.

Buy Now
Questions 14

An organization is supporting remote workers in different locations. In order to provide wireless network connectivity and services, OfficeExtend has been implemented. The wireless connectivity is working, but users report losing connectivity to their local network printers. Which solution must be used to address this issue?

Options:

A.

OEAP gateway override

B.

OEAP split tunnel

C.

WLAN static IP tunneling

D.

FlexConnect local switching

Buy Now
Questions 15

An engineer must run a Client Traffic Stream Metrics report in Cisco Prime Infrastructure. Which task must be run before the report?

Options:

A.

scheduled report

B.

radio performance

C.

client status

D.

software

Buy Now
Questions 16

Which EAP method can an AP use to authenticate to the wired network?

Options:

A.

EAP-GTC

B.

EAP-MD5

C.

EAP-TLS

D.

EAP-FAST

Buy Now
Questions 17

Refer to the exhibit.

300-430 Question 17

An engineer is creating an ACL to restrict some traffic to the WLC CPU. Which selection must be made from the direction drop- down list?

Options:

A.

It must be Inbound because traffic goes to the WLC.

B.

Packet direction has no significance; it is always Any.

C.

It must be Outbound because it is traffic that is generated from the WLC.

D.

To have the complete list of options, the CPU ACL must be created only by the CLI.

Buy Now
Questions 18

Refer to the exhibit.

300-430 Question 18

A network architect configured the Cisco Catalyst 9800 Series Controller to find out information on client types in the wireless network. RADIUS profiling is enabled so that the controller forwards the information about clients to a Cisco ISE server through vendor-specific RADIUS attributes. The ISE server is not profiling any data from the controller. Which configuration must be added in the blank in the code to accomplish the profiling on the Cisco 9800 Series controller?

Options:

A.

aaa accounting identity acct_method start-stop group rad-group

B.

aaa accounting network acct_method start-stop group rad-group

C.

aaa accounting exec acct_method start-stop group rad-group

D.

aaa accounting commands acct_method start-stop group rad-group

Buy Now
Questions 19

An engineer is using Cisco Prime Infrastructure reporting to monitor the state of security on the WLAN. Which output is produced when the Adaptive wIPS Top 10 AP report is run?

Options:

A.

last 10 wIPS events from monitor mode APs

B.

last 10 wIPS events from sniffer mode APs

C.

last of 10 sniffer mode APs with the most wIPS events

D.

last of 10 monitor mode APs with the most wIPS events

Buy Now
Questions 20

An engineer is setting up a WLAN to work with a Cisco ISE as the AAA server. The company policy requires that all users be denied access to any resources until they pass the validation. Which component must be configured to achieve this stipulation?

Options:

A.

WPA2 passkey

B.

AAA override

C.

CPU ACL

D.

preauthentication ACL

Buy Now
Questions 21

What is the maximum time range that can be viewed on the Cisco DNA Center issues and alarms page?

Options:

A.

3 hours

B.

24 hours

C.

3 days

D.

7 days

Buy Now
Questions 22

A corporation has employees working from their homes. A wireless engineer must connect 1810 OEAP at remote teleworker locations. All configuration has been completed on the controller side, but the network readiness is pending. Which two configurations must be performed on the firewall to allow the AP to join the controller? (Choose two.)

Options:

A.

Block UDP ports 1812 and 1813 on the firewall.

B.

Enable NAT Address on the 5520 with an Internet-routable IP address.

C.

Configure a static IP on the OEAP 1810.

D.

Allow UDP ports 5246 and UDP port 5247 on the firewall.

E.

Allow UDP ports 12222 and 12223 on the firewall.

Buy Now
Questions 23

An engineer completes the setup of a two-node Cisco ISE deployment for a guest portal. When testing the portal, the engineer notices that sometimes there is a certificate CN mismatch. Which certificate type helps resolve this issue?

Options:

A.

Public-Signed Root

B.

Public-Signed SAN

C.

Self-Signed Wildcard

D.

Self-Signed Standard

Buy Now
Questions 24

Refer to the exhibit.

300-430 Question 24

A customer has implemented Cisco FlexConnect deployments with different WLANs around the globe and is opening a new branch in a different location. The engineer’s task is to execute all the wireless configuration and to suggest how to configure the switch ports for new APs. Which configuration must the switching team use on the switch port?

Options:

A.

trunk mode

B.

access mode

C.

single VLAN

D.

multiple VLAN

Buy Now
Questions 25

An engineer set up identity-based networking with ISE and configured AAA override on the WLAN. Which two attributes must be used to change the client behavior from the default settings? (Choose two.)

Options:

A.

DHCP timeout

B.

DNS server

C.

IPv6 ACL

D.

DSCP value

E.

multicast address

Buy Now
Questions 26

Refer to the exhibit.

300-430 Question 26

An engineer deployed a Cisco WLC using local EAP. Users who are configured for EAP-PEAP cannot connect to the network. Based on the local EAP debug on the controller provided, why is the client unable to connect?

Options:

A.

The client is failing to accept certificate.

B.

The Cisco WLC is configured for the incorrect date.

C.

The Cisco WLC local EAP profile is misconfigured.

D.

The user is using invalid credentials.

Buy Now
Questions 27

An engineer needs to configure an autonomous AP for 802.1x authentication. To achieve the highest security an authentication server is used for user authentication. During testing, the AP fails to pass the user authentication request to the authentication server. Which two details need to be configured on the AP to allow communication between the server and the AP? (Choose two.)

Options:

A.

username and password

B.

PAC encryption key

C.

RADIUS IP address

D.

shared secret

E.

group name

Buy Now
Questions 28

An engineer is assembling a PCI report for compliance purposes and must include missed best practices that are related to WLAN controllers. The engineer has access to all WLCs, Cisco MSE, and Cisco Prime Infrastructure. Which method most efficiently displays a summary of inconsistencies?

Options:

A.

WLC running-config

B.

Cisco Prime Infrastructure monitoring

C.

Cisco Prime Infrastructure reporting

D.

WLC logs

Buy Now
Questions 29

Refer to the exhibit.

300-430 Question 29

Which COS to DSCP map must be modified to ensure that voice traffic is tagged correctly as it traverses the network?

Options:

A.

COS of 6 to DSCP 46

B.

COS of 3 to DSCP 26

C.

COS of 7 to DSCP 48

D.

COS of 5 to DSCP 46

Buy Now
Questions 30

After looking in the logs, an engineer notices that RRM keeps changing the channels for non-IEEE 802.11 interferers. After surveying the area, it has been decided that RRM should not change the channel. Which feature must be enabled to ignore non-802.11 interference?

Options:

A.

Avoid Cisco AP Load

B.

Avoid Non-802.11 Noise

C.

Avoid Persistent Non-WiFi Interference

D.

Avoid Foreign AP Interference

Buy Now
Questions 31

A network is set up to support wired and wireless clients. Both types must authenticate using 802.1X before connecting to the network. Different types of client authentication must be separated on a Cisco ISE deployment. Which two configuration items achieve this task? (Choose two.)

Options:

A.

device profiles

B.

policy sets

C.

separate networks

D.

policy groups

E.

policy results

Buy Now
Questions 32

A customer requires wireless traffic from the branch to be routed through the firewall at corporate headquarters. A RADIUS server is in each branch location. Which Cisco FlexConnect configuration must be used?

Options:

A.

central authentication and local switching

B.

central authentication and central switching

C.

local authentication and local switching

D.

local authentication and central switching

Buy Now
Questions 33

A wireless engineer is configuring LWA using ISE. The customer is a startup company and requested the wireless users to authenticate against a directory, but LDAP is unavailable. Which solution should be proposed in order to have the same security and user experience?

Options:

A.

Use SAML.

B.

Use the internal database of the RADIUS server.

C.

Use a preshared key on the corporate WLAN.

D.

Use Novell eDirectory.

Buy Now
Questions 34

An engineer must implement rogue containment for an SSID. What is the maximum number of APs that should be used for containment?

Options:

A.

1

B.

2

C.

3

D.

4

Buy Now
Questions 35

Refer to the exhibit.

300-430 Question 35

An engineer must restrict some subnets to have access to the WLC. When the CPU ACL function is enabled, no ACLs in the drop-down list are seen. What is the cause of the problem?

Options:

A.

The ACL does not have a rule that is specified to the Management interface.

B.

No ACLs have been created under the Access Control List tab.

C.

When the ACL is created, it must be specified that it is a CPU ACL.

D.

This configuration must be performed through the CLI and not though the web GUI.

Buy Now
Questions 36

Refer to the exhibit.

300-430 Question 36

An ACL is configured to restrict access for BYOD clients. The ACL must redirect devices to the guest portal. To which two devices on the local network must the ACL allow access other than the DHCP server? (Choose two.)

Options:

A.

RADIUS server

B.

DNS server

C.

Cisco ISE

D.

SNMP server

E.

WLC

Buy Now
Questions 37

An engineer is deploying a virtual MSE. The network has 3000 APs and needs 7000 IPS licenses.

To which size server does the engineer scale it?

Options:

A.

virtual

B.

standard

C.

high end

D.

low end

Buy Now
Questions 38

A network engineer needs to configure multicast in the network. The implementation will use multiple multicast groups and PIM routers. Which address provides automatic discovery of the best RP for each multicast group?

Options:

A.

224.0.0.13

B.

224.0.0.14

C.

224.0.1.39

D.

224.0.1.40

Buy Now
Questions 39

An engineer is in the process of implementing Fastlane on a wireless network with a Mobility Express AP installed. The network must support voice and video applications for Apple devices. Due to a security concern, all iPhones are updated to version 14.5.432302546. Which QoS profile must the engineer configure on the user WLAN?

Options:

A.

Bronze

B.

Best Effort

C.

Silver

D.

Platinum

Buy Now
Questions 40

An engineer has configured the wireless controller to authenticate clients on the employee SSID against Microsoft Active Directory using PEAP authentication.

Which protocol does the controller use to communicate with the authentication server?

Options:

A.

EAP

B.

802.1X

C.

RADIUS

D.

WPA2

Buy Now
Questions 41

Which customizable security report on Cisco Prime Infrastructure will show rogue APs detected since a point in time?

Options:

A.

Network Summary

B.

Rogue APs Events

C.

New Rogue APs

D.

Rogue APs Count Summary

Buy Now
Questions 42

An engineer must enable LSS for the AppleTV mDNS service only when ORIGIN is set to Wired. Which action meets this requirement?

Options:

A.

Set ORIGIN to Wired. Enable LSS by using the config mdns service Iss All command.

B.

Set ORIGIN to Wired. Enable LSS by using the config mdns service Iss AppleTV command.

C.

Set ORIGIN to either Wireless or All. Enable LSS by using the config mdns service Iss All command.

D.

Set ORIGIN to either Wireless or All. Enable LSS by using the config mdns service Iss enable AppleTV command.

Buy Now
Questions 43

An engineer needs to provision certificates on a Cisco Catalyst 9800 Series Wireless Controller. The customer uses a third-party CA server. Which protocol must be used between the controller and CA server to request and install certificates?

Options:

A.

SCEP

B.

TLS

C.

LDAP

D.

SSL

Buy Now
Questions 44

Which CLI command do you use to shut down the 2.4 GHz radio of the Floor1_AP1 AP on a Cisco 3850 Switch?

Options:

A.

ap name Floor1_AP1 dot11 shutdown 24ghz

B.

ap name Floor1_AP1 dot11 5ghz shutdown

C.

ap name Floor1 AP1 dot11 24ghz shutdown

D.

ap name Floor1_AP1 shutdown dot11 24ghz

Buy Now
Questions 45

What two actions must be taken by an engineer configuring wireless Identity-Based Networking for a WLAN to enable VLAN tagging? (Choose two.)

Options:

A.

enable AAA override on the WLAN

B.

create and apply the appropriate ACL to the WLAN

C.

update the RADIUS server attributes for tunnel type 64, medium type 65, and tunnel private group type 81

D.

configure RADIUS server with WLAN subnet and VLAN ID E. enable VLAN Select on the wireless LAN controller and the WLAN

Buy Now
Questions 46

Company XYZ recently migrated from AireOS to IOS XE 9800 WLCs. The Internet bandwidth must be limited to 5 Mbps for each guest client as per the global standard. In which configuration on the Cisco Catalyst 9800 WLC must the QoS requirement be added?

Options:

A.

table map

B.

policy map

C.

service policy

D.

class map

Buy Now
Questions 47

Refer to the exhibit.

300-430 Question 47

An engineer is configuring a Cisco wireless LAN controller and needs wireless multicast to use the 54Mbps rates. Which action meets this requirement?

Options:

A.

Change the 24 Mpbs to Supported.

B.

Set all data rates below 54 Mbps to Supported.

C.

Change the 54 Mpbs to Mandatory.

D.

Set all data rates below 54 Mbps to Disable.

Buy Now
Questions 48

An engineer must configure a Cisco WLC to support Cisco Aironet 600 Series OfficeExtend APs. Which two Layer 2 security options are supported in this environment? (Choose two.)

Options:

A.

Static WEP + 802.1X

B.

WPA+WPA2

C.

Static WEP

D.

CKIP

E.

802.1X

Buy Now
Questions 49

An engineer must use Cisco AVC on a Cisco WLC to prioritize Cisco IP cameras that use the wireless network. Which element do you configure in a rule?

Options:

A.

permit-ACL

B.

WMM required

C.

mark

D.

rate-limit

Buy Now
Questions 50

A WLC must be configured to allow multiple mDNS profiles based on a user authentication profile configured in Cisco ISE. Which WLAN setting must be configured?

Options:

A.

mDNS policy

B.

mDNS Snooping

C.

AAA Override

D.

service advertisement

Buy Now
Questions 51

Which QoS level is recommended for guest services?

Options:

A.

gold

B.

bronze

C.

platinum

D.

silver

Buy Now
Questions 52

An engineer set up a VoWLAN with QoS on the WLC and a class map on the switch, but the markings are not being preserved correctly in the end-to- end traffic flow. Which two configurations on the wired network ensure end-to-end QoS? (Choose two.)

Options:

A.

trust boundaries

B.

access lists

C.

policy maps

D.

QoS licenses

E.

NetFlow

Buy Now
Questions 53

Refer to the exhibit.

300-430 Question 53

An engineer implemented the CPU ACL on your Cisco 5520 Series Wireless LAN Controller, and the controller is no longer manageable via the network. What must be changes on this CPU ACL to enable it to manage the controller again?

Options:

A.

Permit statements must be added to the top of the ACL in both directions, which specify the network to be managed from and the virtual interface of the controller.

B.

Line 1 must be set to a destination port of HTTP.

C.

Permit statements must be added to the top of the ACL, which specify the network to be managed from.

D.

Line 1 must be set to the inbound direction.

Buy Now
Questions 54

Refer to the exhibit.

300-430 Question 54

An engineer tries to manage the rogues on the Cisco WLC. Based on the configuration, which AP is marked as malicious by the controller?

Options:

A.

rogue AP with SSID admin seen for 4000 seconds and heard at -70dBm

B.

rogue AP with SSID admin seen for 3000 seconds and heard at -60dBm

C.

rogue AP with SSID admin seen for 4000 seconds and heard at -60dBm

D.

rogue AP with SSID admin seen for 3000 seconds and heard at -70dBm

Buy Now
Questions 55

An engineer must use Cisco AVC on a Cisco WLC to prioritize Cisco IP cameras that use the wireless network. Which element do you configure in a rule?

Options:

A.

permit-ACL

B.

WMM required

C.

mark

D.

rate-limit

Buy Now
Questions 56

During the EAP process and specifically related to the client authentication session, which encrypted key is sent from the RADIUS server to the access point?

Options:

A.

WPA key

B.

session key

C.

encryption key

D.

shared-secret key

Buy Now
Questions 57

A customer wants to allow employees to easily onboard their personal devices to the wireless network. The visitors also must be able to connect to the same network without the need to engage with anyone from the reception desk. Which process must be configured on Cisco ISE to support this requirement?

Options:

A.

MAC authentication bypass

B.

native supplicant provisioning

C.

local web auth

D.

self-registration guest portal

Buy Now
Questions 58

A network engineer wants to implement QoS across the network that supports multiple VLANs. All the APs are connected to switch ports and are configured in local mode. Which trust model must be configured on the switch ports to which the APs are connected?

Options:

A.

CoS

B.

WMM UP

C.

DSCP

D.

IPP

Buy Now
Questions 59

An engineer is managing a wireless network for a shopping center. The network includes a Cisco WLC, a Cisco MSE, and a Cisco Prime Infrastructure. What is required to use Cisco CMX Location Analytics?

Options:

A.

Enable tracking parameters in Cisco MSE.

B.

Enable Context Aware and CMX Browser Engage.

C.

Install Cisco Prime Infrastructure with floor maps.

D.

Set history parameters in Cisco MSE.

Buy Now
Questions 60

An engineer configures the wireless LAN controller to perform 802.1x user authentication. Which configuration must be enabled to ensure that client devices can connect to the wireless, even when WLC cannot communicate with the RADIUS?

Options:

A.

pre-authentication

B.

local EAP

C.

authentication caching

D.

Cisco Centralized Key Management

Buy Now
Questions 61

A network administrator of a school district must implement a DNS-based ACL to block students from accessing certain teacher URLs where test papers are hosted. The infrastructure contains a Cisco Catalyst 9800 WLC with 25 9136 APs. The administrator configured the URL Filter List called urllist_flex_pre, applied the URL Filter List to the default Flex Profile, and defined Preauth called urllist_local_preauth and Postauth called urllist_local_postaut URL Filter List. Which configuration must the administrator apply to implement the ACL on the default policy profile?

300-430 Question 61

300-430 Question 61

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 62

An IT team is growing quickly and needs a solution for management device access. The solution must authenticate users from an external repository instead of the current local on the WLC, and it must also identify the user and determine what level of access users should have. Which protocol do you recommend to achieve these goals?

Options:

A.

network policy server

B.

RADIUS

C.

TACACS+

D.

LDAP

Buy Now
Questions 63

An SSID is set up with central web authentication using Cisco ISE The new SSID uses guest tunneling from the foreign controller to the anchor controller. Which device must be configured ISE as the one performing the RADIUS authentication requests for the web authentication method?

Options:

A.

APs

B.

authentication server

C.

anchor controller

D.

foreign controller

Buy Now
Questions 64

A healthcare organization notices many rogue APs and is concerned about a honeypot attack. Which configuration must a wireless network engineer perform in Cisco Prime Infrastructure to prevent these attacks most efficiently upon detection?

Options:

A.

Set the auto containment level to 0 and select the Using Our SSID containment option.

B.

Set the manual containment level to 4 and select the Ad Hoc Rogue AP containment option.

C.

Set the auto containment level to 0 and select the Ad Hoc Rogue AP containment option.

D.

Set the auto containment level to 4 and select the Using Our SSID containment option.

Buy Now
Questions 65

An IT administrator is managing a wireless network in which most devices are Apple iOS. A QoS issue must be addressed on the WLANs. Which configuration must be performed?

Options:

A.

Enable Fastlane globally under Wireless > Access Points > Global Configuration.

B.

Create a new AVC Profile named AUTOQOS-AVC-PROFILE and apply to all WLANs.

C.

Enable Fastlane under each WLAN setting.

D.

Enable WMM TSPEC/TCLAS negotiation under Wireless > Advanced.

Buy Now
Questions 66

The security policy mandates that only controller web management traffic is allowed from the IT subnet. In testing, an engineer is trying to connect to a WLAN with Web Authentication for guest users, but the page is timing out on the wireless client browser. What is the cause of the issue?

Options:

A.

The implemented CPU ACL on the controller is blocking HTTP/HTTPS traffic from the guest clients.

B.

Web Authentication Redirect is not supported with CPU ACLs.

C.

The DNS server that is configured on the controller is incorrect.

D.

Web Authentication Redirect is supported only with Internet Explorer, and the client is using Google Chrome.

Buy Now
Questions 67

During the EAP process and specifically related to the client authentication session, which encrypted key is sent from the RADIUS server to the access point?

Options:

A.

WPA key

B.

session key

C.

encryption key

D.

shared-secret key

Buy Now
Questions 68

Refer to the exhibit.

300-430 Question 68

An engineer configured a BYOD policy that allows for printing on the WLAN using Bonjour services. However, the engineer cannot get printing to work. The WLC firmware is 8.x. What must be implemented on the controller?

Options:

A.

Enable mDNS and IGMP snooping.

B.

Activate location-specific services.

C.

Configure Secure Web Mode Cipher-Option SSLv2.

D.

Increase the IGMP Query Interval value

Buy Now
Questions 69

An engineer configures the wireless LAN controller to perform 802.1x user authentication. Which configuration must be enabled to ensure that client devices can connect to the wireless, even when WLC cannot communicate with the RADIUS?

Options:

A.

pre-authentication

B.

local EAP

C.

authentication caching

D.

Cisco Centralized Key Management

Buy Now
Questions 70

A customer managing a large network has implemented location services. Due to heavy load, it is needed to load balance the data coming through NMSP from the WLCs. Load must be spread between multiple CMX servers to help optimize the data flow for APs. Which configuration in CMX meets this requirement?

Options:

A.

cmxctl config feature flags nmsplb.cmx-ap-grouping true

B.

cmxctl config feature flags nmsplb.cmxgrouping true

C.

cmxctl config feature flags nmsplb.cmx-loadbalance true

D.

cmxctl config feature flags nmsplb.cmx-rssi-distribute true

Buy Now
Questions 71

A company is concerned about unauthorized APs on their wired and wireless networks. The company implements a Cisco Catalyst Center (formerly DNA Center) solution. Which feature must be enabled?

Options:

A.

Rogue Management application package

B.

Neighbor Assisted Roaming

C.

Sniffer package

D.

Monitor Mode package

Buy Now
Questions 72

Refer to the exhibit.

300-430 Question 72

An engineer implemented the CPU ACL on your Cisco 5520 Series Wireless LAN Controller, and the controller is no longer manageable via the network. What must be changes on this CPU ACL to enable it to manage the controller again?

Options:

A.

Permit statements must be added to the top of the ACL in both directions, which specify the network to be managed from and the virtual interface of the controller.

B.

Line 1 must be set to a destination port of HTTP.

C.

Permit statements must be added to the top of the ACL, which specify the network to be managed from.

D.

Line 1 must be set to the inbound direction.

Buy Now
Questions 73

An engineer must configure Cisco OEAPs for three executives. As soon as the NAT address is configured on the management interface, it is noticed that the WLC is not responding for APs that are trying to associate to the internal IP management address. Which command should be used to reconcile this?

Options:

A.

config flexconnect office-extend nat-ip-only disable

B.

config network ap-discovery nap-ip-only enable

C.

config flexconnect office-extend nat-ip-only enable

D.

config network ap-discovery nat-ip-only disable

Buy Now
Questions 74

When configuring a Cisco WLC, which CLI command adds a VLAN with VLAN ID of 30 to a FlexConnect group named BranchA-FCG?

Options:

A.

config flexconnect BranchA-FCG vlan 30 add

B.

config flexconnect BranchA-FCG vlan add 30

C.

config flexconnect group BranchA-FCG vlan 30 add

D.

config flexconnect group BranchA-FCG vlan add 30

Buy Now
Questions 75

An engineer is implementing a FlexConnect group for access points at a remote location using local switching but central DHCP. Which client feature becomes available only if this configuration is changed?

Options:

A.

multicast

B.

static IP

C.

fast roaming

D.

mDNS

Buy Now
Questions 76

An engineer just added a new MSE to Cisco Prime Infrastructure and wants to synchronize the MSE with the Cisco 5520 WLC, located behind a firewall in a DMZ. It is noticed that NMSP messages are failing between the two devices. Which traffic must be allowed on the firewall to ensure that the MSE and WLC are able to communicate using NMSP?

Options:

A.

TCP 1613

B.

UDP 16113

C.

UDP 1613

D.

TCP 16113

Buy Now
Questions 77

Which two protocols are used to communicate between the Cisco MSE and the Cisco Prime Infrastructure network management software? (Choose two.)

Options:

A.

HTTPS

B.

Telnet

C.

SOAP

D.

SSH

E.

NMSP

Buy Now
Questions 78

An engineer is implementing Cisco Identity-Based Networking on a Cisco AireOS controller. The engineer has two ACLs on the controller. The first ACL, named BASE_ACL, is applied to the corporate_clients interface on the WLC, which is used for all corporate clients. The second ACL, named HR_ACL, is referenced by ISE in the Human Resources group policy. What is the resulting ACL when a Human Resources user connects?

Options:

A.

HR_ACL appended with BASE_ACL

B.

HR_ACL only

C.

BASE_ACL appended with HR_ACL

D.

BASE_ACL only

Buy Now
Questions 79

What is characteristic of Multicast mode that affects the wireless network when configured on a Cisco WLC?

Options:

A.

Packet replication is performed on the controller

B.

The controller sends every multicast packet associated APs

C.

Packet replication is performed on the network

D.

The controller sends multicast packets to a user group.

Buy Now
Questions 80

The network management team in a large shopping center has detected numerous rogue APs from local coffee shops that are broadcasting SSIDs. All of these SSIDs have names starting with ATC (for example, ATC302, ATC011, and ATC566). A wireless network engineer must appropriately classify these SSIDs using the Rogue Rules feature. Drag and drop the options from the left onto the categories in which they must be used on the right. Not all options are used.

300-430 Question 80

Options:

Buy Now
Questions 81

Refer to the exhibit.

300-430 Question 81

A network administrator deploys the DHCP profiler service in two ISE servers: 10.3.10.101 and 10.3.10.102. All BYOD devices connecting to WLAN on VLAN63 have been incorrectly profiled and are assigned as unknown profiled endpoints. Which action efficiently rectifies the issue according to Cisco recommendations?

Options:

A.

Nothing needed to be added on the Cisco WLC or VLAN interface. The ISE configuration must be fixed.

B.

Disable DHCP proxy on the Cisco WLC.

C.

Disable DHCP proxy on the Cisco WLC and run the ip helper-address command under the VLAN interface to point to DHCP and the two ISE servers.

D.

Keep DHCP proxy enabled on the Cisco WLC and define helper-address under the VLAN interface to point to the two ISE servers.

Buy Now
Questions 82

An engineer must achieve the highest level of location accuracy possible for a new mobile application. Which technology must be implemented for this use case?

Options:

A.

Time Difference of Arrival

B.

Bluetooth Low Energy

C.

RSS lateration

D.

ToA lateration

Buy Now
Questions 83

A network is set up to support wired and wireless clients. Both types must authenticate using 802.1X before connecting to the network. Different types of client authentication must be separated on a Cisco ISE deployment. Which two configuration items achieve this task? (Choose two.)

Options:

A.

device profiles

B.

policy sets

C.

separate networks

D.

policy groups

E.

policy results

Buy Now
Exam Code: 300-430
Exam Name: Implementing Cisco Enterprise Wireless Networks (300-430 ENWLSI)
Last Update: Jan 19, 2026
Questions: 277

PDF + Testing Engine

$144.99

Testing Engine

$109.99

PDF (Q&A)

$94.99