Pre-Summer Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: best70

350-101 Implementing and Operating Cisco Wireless Core Technologies (350-101 WLCOR)v1.0 Questions and Answers

Questions 4

A wireless engineer must manage scheduled maintenance for a guest WLAN that uses Cisco Catalyst Center as the primary monitoring solution. The engineer must coordinate downtime and verify that all services resume as intended after planned tasks are complete. The network supports multiple high-availability configurations and relies heavily on consistent visibility into device health. Event logging and alerting must be ensured throughout maintenance windows, and the maintenance process must be centrally managed. Which process meets the requirements?

Options:

A.

Monitor the Device 360 dashboard.

B.

Monitor the device in Cisco Spaces.

C.

Use the WLC dashboard.

D.

Use scheduled maintenance for the device.

Buy Now
Questions 5

Refer to the exhibit.]

350-101 Question 5

An engineer is setting up a new WLC in a branch office. The IT security policy states that all management access must use encrypted protocols, administrators will connect remotely, and network scans will be run to check for any noncompliant management protocol exposure. Which action must the engineer take to achieve the required management access policy?

Options:

A.

Permit only HTTP, Telnet, and SSH across all VLANs for 10.10.1.0/24.

B.

Enable Telnet, SSH, and HTTPS across the management and guest interfaces.

C.

Permit console access for 10.10.1.0/24 only with HTTP disabled.

D.

Enable HTTPS and SSH, and disable HTTP and Telnet on the WLC.

Buy Now
Questions 6

What is a feature of an RTS frame in the context of 802.11 frame types?

Options:

A.

It applies spectral mask for transmission.

B.

It requests permission to send data on a channel.

C.

It provides navigation updates for roaming clients.

D.

It compresses frames for bandwidth savings.

Buy Now
Questions 7

Refer to the exhibit.

350-101 Question 7 A wireless controller is deployed at a branch location to facilitate guest client connectivity. A network engineer configures one WLAN using Web authentication and activates web-based method to align with company security policies. Which configuration enables client authentication for this WLAN?

Options:

A.

security web-auth

B.

wlan webauth 2 webauth

C.

no security wpa wpa2

D.

no security wpa akm dot1x

Buy Now
Questions 8

A network administrator at a retail company recently deployed a Cisco Catalyst 9800 WLC. The NOC was unaware of wireless issues until it received reports from users. The network administrator must configure Cisco Catalyst Center to enable effective client issue alerts via email to prevent this happening again. Which action must the network administrator take in Cisco Catalyst Center to meet the requirements?

Options:

A.

Configure a new event alert by navigating to Use Assurance > Platforms > Notifications.

B.

Configure a new notification by navigating to Platform > Developer Toolkit > Event Notifications.

C.

Add the NOC email address by navigating to Use Assurance > Issue Settings > Email.

D.

Add the NOC email address by navigating to Platform > Event Notifications > Email.

Buy Now
Questions 9

Which condition is required for a line-of-sight RF connection?

Options:

A.

Wireless multipath signal propagation to the client

B.

MIMO connection support on both wireless radios

C.

Delay on wireless signal delivery introduced by reflection

D.

No physical objects between the transmitter and receiver

Buy Now
Questions 10

Exhibit:

350-101 Question 10

Refer to the exhibit. A network administrator is working on a WLC to enable user access for employee tablets using PEAP-MSCHAPv2 with a RADIUS backend. The administrator verifies the external authentication configuration and plans to test network connectivity. Which code snippet must be added to the configuration for the WLC to support authentication with an external server?

Options:

A.

radius server external-radius

B.

external-radius RADIUS-GRP

C.

radius server RADIUS-GRP

D.

external-radius aaa server

Buy Now
Questions 11

Users report slowness on the network, and it is suspected that certain applications are consuming all the bandwidth. A network engineer must enable the NBAR protocol to improve wireless client traffic visibility and provide advanced, granular, application classification, and analytics. How should the network engineer configure NBAR on a 9800 WLC?

Options:

A.

Enable NBARv2 on the WLAN.

B.

Enable deep packet inspection on the WLAN.

C.

Configure packet inspection on the policy profile.

D.

Configure AVC on the policy profile.

Buy Now
Questions 12

A wireless administrator must configure detailed and comprehensive monitoring for client devices across branch locations. The team wants to streamline operations for faster response during performance degradation. To support the organization's growth, the administrator needs a centralized reporting platform that displays aggregated data. Which solution must the administrator use to monitor the clients in the network?

Options:

A.

Implement central syslog server.

B.

Use Cisco Catalyst Center Assurance.

C.

Run show logging on WLC CLI.

D.

Use the WLC dashboard.

Buy Now
Questions 13

What is a characteristic of gain in wireless antenna design?

Options:

A.

Scale used for calculating system loss

B.

Checksum figure appended to signal blocks

C.

Amount of increased energy sent toward a specific direction

D.

Standard temperature tolerance during wireless operation

Buy Now
Questions 14

An organization must manage ongoing firmware updates for redundant controllers in the network. They will use Cisco Catalyst Center for deployment and visibility. The current environment uses centralized and distributed management approaches. Automation and reporting are critical to minimize operational workload. Which method must be used to manage structured update processes and monitor progress throughout the update cycle?

Options:

A.

inventory snapshots from hardware report

B.

software templates

C.

software image management workflows

D.

lifecycle workflow

Buy Now
Questions 15

What does an elevated noise floor indicate in an RF environment?

Options:

A.

decreased link reliability

B.

stable time synchronization

C.

enhanced spectrum allocation

D.

minimized bandwidth demand

Buy Now
Questions 16

A deployment requires that several APs be connected to edge switches, and each AP must support management and guest Wi-Fi traffic. The APs tag guest traffic separately from management, and the organization expects to add more VLANs for IoT and voice soon, so the configuration must support scalability. The security team requires that guest traffic never mix with internal resources. Which port configuration must be used for the switch interfaces that connect to the APs?

Options:

A.

Configure the central Layer 3 switch port as an access VLAN port that allows the management VLAN only.

B.

Implement switch port access with the native VLAN for guest traffic and trunk with the management VLAN.

C.

Set a trunk port with the management VLAN as the native VLAN, and allow only management and user VLANs.

D.

Make the port an access port on the management VLAN because all traffic is tunneled back to the WLC.

Buy Now
Questions 17

Which role does a fabric edge node perform in a Cisco wireless fabric architecture?

Options:

A.

Authenticating TLS connections for management

B.

Enabling multicast snooping on edge switches

C.

Terminating user data

D.

Converting Layer 2 to Layer 3 addresses

Buy Now
Questions 18

What is a benefit of applying TACACS authentication for device access?

Options:

A.

static user grouping without role differentiation

B.

fragmented statistics across controllers and devices

C.

streamlined administrator access across platforms

D.

single user for device and network access

Buy Now
Questions 19

Refer to the exhibit. A retail business is deploying guest wireless across its remote branch locations. Each branch uses FlexConnect APs in local switching mode, and the central wireless LAN controller is configured with an ACL named CWA_REDIRECT. Cisco ISE is configured to return this ACL during the authentication process for central web authentication (CWA). However, when clients attempt to connect to the guest wireless LAN, they are added to the exclusion list. Which configuration step resolves the connectivity issue?

Options:

A.

Include the ACL CWA_REDIRECT in the AP-Join profile.

B.

Change the ACL to include the ISE IP address.

C.

Map the ACL CWA_REDIRECT to the flex profile as a policy ACL.

D.

Add the ACL CWA_REDIRECT to the policy profile.

Buy Now
Questions 20

350-101 Question 20

Refer to the exhibit. An engineer is configuring a switch port for a Cisco Spaces deployment at a new branch site. The Spaces connector requires access to the management VLAN 30. The network team plans to add more analytics services in the future, so the configuration must also allow for easy scalability and avoid service interruption for currently connected devices and default switch VLAN settings. Which set of commands must be added to the box in the CLI to complete the configuration?

Options:

A.

switchport mode accessswitchport access vlan 30

B.

switchport mode accessswitchport trunk allowed vlan 30switchport access native vlan

C.

switchport mode accessswitchport trunk allowed vlan 30switchport trunk native vlan none

D.

switchport mode trunkswitchport trunk allowed vlan 30

Buy Now
Questions 21

Exhibit:

350-101 Question 21

Refer to the exhibit. An organization wants to use Cisco Spaces for location analytics, and an engineer is setting up the Cisco Catalyst 9800 WLC to send location data. The Spaces connector has already been configured and is operational on the WLC. The engineer must now configure the controller to forward telemetry data to the correct Spaces cloud endpoint using TLS to complete the integration. Which CLI command must be added to the box in the code?

Options:

A.

profile spaces-profile ip address 198.51.100.10 receiver tls-native

B.

receiver protocol tls-native profile spaces-profile ip address 198.51.100.10 57555

C.

receiver ip address 198.51.100.10 57555 protocol tls-native profile spaces-profile

D.

profile spaces-profile receiver 198.51.100.10 57555 protocol tls-native

Buy Now
Questions 22

Exhibit:

350-101 Question 22

Refer to the exhibit. An enterprise is deploying Cisco Catalyst 9800 WLCs and is using Catalyst Center as the management platform to oversee wireless access policies. To meet the organization's compliance requirements, all wireless endpoints must be evaluated with security posture validation before gaining access. Which set of CLI commands must be added to the box in the code to complete the configuration?

Options:

A.

aaa-overridenac-policy

B.

wireless profile policy my-policyaaa-override

C.

aaa-overridenac

D.

wireless profile policyaaa-override

Buy Now
Questions 23

Which feature does a high-gain patch antenna impart to a wireless signal?

Options:

A.

single narrow frequency use

B.

partial overlap of frequency bands

C.

focused beam in a flat area

D.

alternating direction with elevation

Buy Now
Questions 24

A network administrator at a construction company manages a Cisco Catalyst 9800 Series Wireless Controller running Cisco IOS XE 17.x. The WLAN named XYZ-Conference is set up for a large event, but attendees report slow network performance due to misbehaving clients. To improve connectivity, the network administrator decides to change the client exclusion policy on the WLAN to temporarily block the misbehaving clients. The XYZ-Conference WLAN must enable a client exclusion policy with a timeout of 120 seconds for misbehaving clients. Which set of Cisco IOS XE commands must be used?

Options:

A.

wireless profile policy XYZ-ConferenceXYZ Conference exclude 120

B.

wireless profile policy XYZ-Conferenceexclusionlist timeout 120

C.

wireless profile policy XYZ-Conferencesecurity exclusion timeout 120

D.

wireless profile policy XYZ-Conferenceclient-exclusion 120

Buy Now
Questions 25

Which feature does bridge mode provide in a Cisco wireless mesh architecture?

Options:

A.

It enables point-to-point communication between network segments.

B.

It switches all traffic passing through the AP to 2.4 GHz by default.

C.

It adjusts RF transmit power on any neighbor nodes.

D.

It communicates with WAN edge by default.

Buy Now
Questions 26

350-101 Question 26

Refer to the exhibit. A network engineer must create a PSK WLAN that will be anchored to the DMZ. After this WLAN is created, users cannot connect to it. Based on the output from the RA trace, which action must the engineer take to resolve the issue?

Options:

A.

Disable fast transition 802.11r on the WLAN.

B.

Configure matching passwords on the client and the WLAN.

C.

Remove the anchor WLC from the mobility group.

D.

Configure matching WLANs on the foreign and the anchor.

Buy Now
Questions 27

A network engineer must isolate all guest users connected to the WLAN on a Cisco 9800 WLC so they cannot communicate with each other but can access the internet. The WLAN must meet these requirements:

•SSID named VisitorAccess assigned to VLAN 30

•guests prohibited from sharing files with other guests

•must be scalable to multiple access points in the building

Which action must the network engineer take to meet the requirements?

Options:

A.

Enable P2P blocking in the policy profile and map the WLAN to a dedicated guest VLAN.

B.

Set up local authentication and map the WLAN to a dedicated guest VLAN.

C.

Set up a FlexConnect group and use local switching for the guest WLAN internet access.

D.

Enable multicast mode and associate a RADIUS server with the guest WLAN.

Buy Now
Questions 28

350-101 Question 28

Refer to the exhibit. An engineer is preparing a Cisco 9800-L WLC for deployment in a sensitive area. Only encrypted remote management via SSH is allowed, and all other VTY access methods must be disabled. The 9800-L WLC will be part of a larger deployment, and an external audit will check for any unencrypted management protocols. According to the requirements, only SSH is allowed for remote CLI sessions. Which set of commands must be executed to complete the Cisco IOS XE CLI configuration on the WLC?

Options:

A.

line vty 0 97no transport input telnetlogin authentication default

B.

line vty disable 0 97transport preferred sshlogin authentication defaultexit

C.

line vty 0 97transport input sshlogin authentication defaultexit

D.

line vty 0 97transport sshlogin authentication default

Buy Now
Questions 29

How does the optimized roaming function operate in a WLC implementation?

Options:

A.

It disassociates clients when the RSSI is lower than the set threshold.

B.

It is integrated with external services for client wireless experience.

C.

Device locations are determined through peer-to-peer beacons.

D.

Load balancing is statically defined for all locations.

Buy Now
Questions 30

A network engineer has been tasked with migrating the management mode of a Cisco 9176 AP named "Cisco-AP053540555" in a large enterprise wireless deployment. The AP is currently managed by a Cisco Catalyst 9800 Series WLC, but the organization is transitioning to Meraki cloud management for centralized control and monitoring. To complete this migration, the engineer needs to change the AP's management mode to Meraki with force and noprompt to skip validations using the CLI on the wireless controller. What command must the engineer use?

Options:

A.

management meraki force noprompt mode

B.

ap management mode meraki force noprompt

C.

ap management meraki force noprompt mode

D.

management-mode meraki force noprompt

Buy Now
Exam Code: 350-101
Exam Name: Implementing and Operating Cisco Wireless Core Technologies (350-101 WLCOR)v1.0
Last Update: May 20, 2026
Questions: 102

PDF + Testing Engine

$144.99

Testing Engine

$109.99

PDF (Q&A)

$94.99