Which three properties are used for client profiling of wireless clients?
Which three properties are used for client profiling of wireless clients? (Choose three.) A. HTTP user agent B. DHCP C. MAC OUI D. hostname E. OS version F. IP address
Which three properties are used for client profiling of wireless clients? (Choose three.) A. HTTP user agent B. DHCP C. MAC OUI D. hostname E. OS version F. IP address
An engineer wants to configure WebEx to adjust the precedence and override the QoS profile on the WLAN. Which configuration is needed to complete this task? A. Change the WLAN reserved bandwidth for WebEx B. Create an AVC profile for…
An engineer must use Cisco AVC on a Cisco WLC to prioritize Cisco IP cameras that use the wireless network. Which element do you configure in a rule? A. permit-ACL B. WMM required C. mark D. rate-limit
Which two statements about the requirements for a Cisco Hyperlocation deployment are true? (Choose two.) A. After enabling Cisco Hyperlocation on Cisco CMX, the APs and the wireless LAN controller must be restarted. B. NTP can be configured, but that…
Which feature on the Cisco Wireless LAN Controller must be present to support dynamic VLAN mapping? A. FlexConnect ACL B. VLAN name override C. CCKM/OKC D. AAA override
Which QoS level is recommended for guest services? A. gold B. bronze C. platinum D. silver
An engineer configures the wireless LAN controller to perform 802.1x user authentication. Which configuration must be enabled to ensure that client devices can connect to the wireless, even when WLC cannot communicate with the RADIUS? A. pre-authentication B. local EAP…
Which two restrictions are in place with regards to configuring mDNS? (Choose two.) A. mDNS uses only UDP port 5436 as a destination port. B. mDNS cannot use UDP port 5353 as the destination port. C. mDNS is not supported…
A wireless engineer must implement a corporate wireless network for a large company in the most efficient way possible. The wireless network must support 32 VLANs for 300 employees in different departments. Which solution must the engineer choose? A. Configure…
A corporation has recently implemented a BYOD policy at their HQ. Which two risks should the security director be concerned about? (Choose two.) A. network analyzers B. malware C. lost and stolen devices D. keyloggers E. unauthorized users