A network engineer is implementing a wireless network and is considering

A network engineer is implementing a wireless network

This preview shows page 24 - 27 out of 36 pages.

QUESTION 48A network engineer is implementing a wireless network and is considering deploying a single SSID for deviceonboarding. Winch option is a benefit of using dual SSIDs with a captive portal on the onboard SSID comparedto a single SSID solution? A.limit of a single device per userB.restrict allowed devices typesC.allow multiple devices per userD.minimize client configuration errorsCorrect Answer: B Section: (none) Explanation Explanation/Reference: QUESTION 49Which security method does a Cisco guest wireless deployment that relies on Cisco ISE guest portal for userauthentication use? B Section: (none) Explanation Explanation/Reference: QUESTION 50After receiving an alert regarding a rogue AP, a network engineer logs into Cisco Prime and looks at the floormap where the AP that detected the rogue is located. The map is synchronized with a mobility services enginethat determines the rogue device is actually inside the campus. The engineer determines the rogue to be asecurity threat and decides to stop it from broadcasting inside the enterprise wireless network. What is thefastest way to disable the rogue?
Image of page 24
C Section: (none) Explanation Explanation/Reference: QUESTION 51An engineer is deploying EAP-TLS as the authentication mechanism for an 802.1X-enabled wireless network.Which network device is responsible for applying the digital signature to a certificate to ensure that thecertificate is trusted and valid? B Section: (none) Explanation Explanation/Reference: QUESTION 52An engineer is configuring client MFP. What WLAN Layer 2 security must be selected to use client MFP? A.Static WEPB. CKIPC. WPA+WPA2D.802 1xCorrect Answer: Section: (none) C Explanation Explanation/Reference: QUESTION 53An engineer is considering an MDM integration with Cisco ISE to assist with security for lost devices. Which twofunctions of MDM increase security for lost devices that access data from the network? (Choose two.)
Image of page 25
Section: (none) Explanation Explanation/Reference:
Image of page 26
Image of page 27

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture