Pre-Summer Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > Cisco > CCIE Wireless > 350-101

350-101 Implementing and Operating Cisco Wireless Core Technologies (350-101 WLCOR)v1.0 Question and Answers

Question # 4

Refer to the exhibit. A startup company has recently moved to new offices and performed a full network refresh. The application development team requested a high-speed reliable wireless network to use for testing real-time applications. Although, the wireless network is Wi-Fi 7 enabled, the wireless clients are connecting using lower speeds. Which configuration must be applied on the WLC to increase throughput?

A.

security wpa3 akm sae ext-key

B.

security wpa wpa2 wpa3 aes512

C.

security wpa wpa2 wpa3 tkip512

D.

security wpa wpa2 ciphers gcmp256

Full Access
Question # 5

Which function does FRA use to optimize client experience and network coverage?

A.

Monitoring on the physical interface level in the AP

B.

Enhances roaming by redirecting the client to move to the appropriate AP

C.

Implementation by local data path control

D.

Dynamically adapts the roles of dual-band radios in an AP

Full Access
Question # 6

What happens when a radio wave bends around objects?

A.

absorption

B.

diffusion

C.

reflection

D.

diffraction

Full Access
Question # 7

An onsite engineer is working to connect devices to the wireless network using central switching in a corporate environment. Security protocols and network-specific settings must be configured as per enterprise policy. After the initial wireless settings are applied on an iOS tablet, the engineer must ensure that VLAN ID 10 is assigned on the client device to complete a successful enterprise Wi-Fi connection. Which action meets this requirement?

A.

Disable VLAN tagging on the WLAN and configure the APs switch port as an access port on VLAN 10 to assign the VLAN to the client device.

B.

Manually set VLAN ID 10 on the iOS tablets Wi-Fi settings to ensure VLAN 10 is allowed through the APs switch port.

C.

Configure the policy profile to use VLAN 10, and ensure the WLAN profile is mapped to it.

D.

Configure the AP to assign VLAN ID 1 by default and rely on the switch to redirect traffic to VLAN 10 based on MAC address filtering.

Full Access
Question # 8

A network engineer must ensure that guest users connecting to a Cisco 9800 WLC are assigned IP addresses from a specific subnet that is separate from corporate users. The guest network must support at least 200 simultaneous connections and isolate traffic from internal devices. The DHCP server must allocate addresses only within the 10.20.30.0/24 subnet. Which action must the network engineer take to accomplish this task?

A.

Set up a unique policy tag on the guest WLAN and use a shared DHCP pool.

B.

Create a dedicated guest interface and map it to the guest policy profile for the guest WLAN.

C.

Assign a unique policy tag to the guest WLAN and use a shared DHCP pool with DHCP option 43.

D.

Use static IP address assignment for the guest WLAN interface and use ACLs for separation.

Full Access
Question # 9

A network administrator at a marketing company is deploying a Cisco Catalyst 9800 Series Wireless Controller running Cisco IOS XE 17.x. The corporate WLAN named XYZ-Guest supports visitor devices. To address intermittent connectivity issues due to client association limits and short session timeouts, the network administrator must optimize the WLAN to allow more client connections and extend session timeouts for the devices. The administrator must set the maximum number of clients for the XYZ-Guest WLAN to 50 and must set a session timeout to prevent frequent device disconnections. Which two commands must be configured on the controller? (Choose two.)

A.

wlan XYZ-Guest 1 XYZ-Guest client max-association 50

B.

wireless profile policy XYZ-Guest-Pol client session timeout 2800

C.

wlan XYZ-Guest 1 XYZ-Guest client session timeout 2800

D.

wireless profile policy XYZ-Guest-Pol session timeout 2800

E.

wlan XYZ-Guest 1 XYZ-Guest client association limit 50

Full Access
Question # 10

Refer to the exhibit. A network administrator must configure a client management parameter for a wireless deployment in a multi-site enterprise. The enterprise is using Cisco ISE as the management platform to oversee wireless access policies. To meet the organization's compliance requirements, all wireless endpoints must be evaluated against a posture policy before gaining access. Which configuration change must be applied on the WLAN level of the WLC to meet the requirement?

A.

config wlan WLAN-staff enable aaa-override

B.

wireless profile policy WLAN-Staffnac

C.

config wlan WLAN-StaffWLAN-staff radius enable

D.

wireless profile policy WLAN-Staff config wlan 5 enable radius

Full Access
Question # 11

A school district is deploying Cisco Catalyst 9176 APs to remote sites with occasional WAN outages. The IT team wants the APs to attempt joining a secondary or tertiary Catalyst 9800 WLC if the primary controller is unreachable. The team must preconfigure all controller IP addresses using the AP CLI before deploying. Which set of CLI commands sets the primary, secondary, and tertiary controller IP addresses on a Catalyst 9176 AP?

A.

set controller primary-base main-wlc 10.10.10.10set controller secondary-base backup 10.10.10.20set controller tertiary-base tertiary-wlc 10.10.10.30

B.

capwap ap primary-base main-wlc 10.10.10.10capwap ap secondary-base backup-wlc 10.10.10.20capwap ap tertiary-base tertiary-wlc 10.10.10.30

C.

ap join primary 10.10.10.10ap join secondary 10.10.10.20ap join tertiary 10.10.10.30

D.

capwap ap wlc primary 10.10.10.10capwap ap wlc secondary 10.10.10.20capwap ap wlc tertiary 10.10.10.30

Full Access
Question # 12

Refer to the exhibit. A JSON response from a wireless management API contains access point inventory and interface state information. Which JSON expression retrieves the MAC address of the second interface on the first access point?

A.

accessPoints[0].interfaces[1] .macAddress

B.

accessPoints[1].interfaces[0] .macAddress

C.

accessPoints[0].interfaces[0] .macAddress

D.

accessPoints[1].interfaces[1] .macAddress

Full Access
Question # 13

A network engineer is integrating Cisco ISE with a wireless controller for 802.1X authentication. The controller is registered with Cisco ISE as a network device. To secure communication, the engineer must configure a shared secret for RADIUS authentication. Which CLI command on the WLC accomplishes this task?

A.

9800(config-radius-server)# radius enable authentication MySecretKey123

B.

9800(config-radius-server)# radius-server shared-secret MySecretKey123

C.

9800(config-radius-server)# ISE MySecretKey123

D.

9800(config-radius-server)# key 0 MySecretKey123

Full Access
Question # 14

Which feature does a high-gain patch antenna impart to a wireless signal?

A.

single narrow frequency use

B.

partial overlap of frequency bands

C.

focused beam in a flat area

D.

alternating direction with elevation

Full Access
Question # 15

Refer to the exhibit. A network engineer must create a PSK WLAN that will be anchored to the DMZ. After this WLAN is created, users cannot connect to it. Based on the output from the RA trace, which action must the engineer take to resolve the issue?

A.

Disable fast transition 802.11r on the WLAN.

B.

Configure matching passwords on the client and the WLAN.

C.

Remove the anchor WLC from the mobility group.

D.

Configure matching WLANs on the foreign and the anchor.

Full Access
Question # 16

Refer to the exhibit. A network engineer is deploying a new Cisco 9800 WLC and is performing the Day-0 setup. The IP address and subnet mask have been assigned to the management interface, and network connectivity between the WLC and the upstream switch has been verified. Which CLI command must the engineer use next to configure management access?

A.

route add default gw 10.1.10.1

B.

default-route 0.0.255.255 0.0.255.255 10.1.1.1

C.

ip default-gateway 10.1.1.1

D.

ip route 0.0.0.0 0.0.0.0 10.1.10.1

Full Access
Question # 17

A retail store has a Cisco 9176 FlexConnect AP at a branch location and must ensure that wireless clients continue to access the network even if the WAN link to the central controller is down. The AP must authenticate users locally during outages and still sync with the controller when connectivity is restored. The IT administrator wants centralized management for all APs but requires high availability for branch users. Which set of CLI commands on the 9800 WLC configures the AP to meet these requirements?

A.

config wlan branch1 flexconnect local-switching

B.

config wireless local ap vlan 6 wlan branch1

C.

wireless profile policy outageflexconnect local authentication

D.

wireless profile policy outageno central authentication

Full Access
Question # 18

How does MIMO operate during wireless transmission?

A.

It uses multiple radio paths to increase throughput and reliability.

B.

It applies frequency hopping to prevent crosstalk.

C.

It shares a single connection among endpoints for coverage expansion.

D.

It limits data paths to a single antenna for error reduction.

Full Access
Question # 19

A network administrator at a construction company manages a Cisco Catalyst 9800 Series Wireless Controller running Cisco IOS XE 17.x. The WLAN named XYZ-Conference is set up for a large event, but attendees report slow network performance due to misbehaving clients. To improve connectivity, the network administrator decides to change the client exclusion policy on the WLAN to temporarily block the misbehaving clients. The XYZ-Conference WLAN must enable a client exclusion policy with a timeout of 120 seconds for misbehaving clients. Which set of Cisco IOS XE commands must be used?

A.

wireless profile policy XYZ-ConferenceXYZ Conference exclude 120

B.

wireless profile policy XYZ-Conferenceexclusionlist timeout 120

C.

wireless profile policy XYZ-Conferencesecurity exclusion timeout 120

D.

wireless profile policy XYZ-Conferenceclient-exclusion 120

Full Access
Question # 20

A network administrator at a retail company recently deployed a Cisco Catalyst 9800 WLC. The NOC was unaware of wireless issues until it received reports from users. The network administrator must configure Cisco Catalyst Center to enable effective client issue alerts via email to prevent this happening again. Which action must the network administrator take in Cisco Catalyst Center to meet the requirements?

A.

Configure a new event alert by navigating to Use Assurance > Platforms > Notifications.

B.

Configure a new notification by navigating to Platform > Developer Toolkit > Event Notifications.

C.

Add the NOC email address by navigating to Use Assurance > Issue Settings > Email.

D.

Add the NOC email address by navigating to Platform > Event Notifications > Email.

Full Access
Question # 21

Exhibit:

Refer to the exhibit. An enterprise is deploying Cisco Catalyst 9800 WLCs and is using Catalyst Center as the management platform to oversee wireless access policies. To meet the organization's compliance requirements, all wireless endpoints must be evaluated with security posture validation before gaining access. Which set of CLI commands must be added to the box in the code to complete the configuration?

A.

aaa-overridenac-policy

B.

wireless profile policy my-policyaaa-override

C.

aaa-overridenac

D.

wireless profile policyaaa-override

Full Access
Question # 22

A deployment requires that several APs be connected to edge switches, and each AP must support management and guest Wi-Fi traffic. The APs tag guest traffic separately from management, and the organization expects to add more VLANs for IoT and voice soon, so the configuration must support scalability. The security team requires that guest traffic never mix with internal resources. Which port configuration must be used for the switch interfaces that connect to the APs?

A.

Configure the central Layer 3 switch port as an access VLAN port that allows the management VLAN only.

B.

Implement switch port access with the native VLAN for guest traffic and trunk with the management VLAN.

C.

Set a trunk port with the management VLAN as the native VLAN, and allow only management and user VLANs.

D.

Make the port an access port on the management VLAN because all traffic is tunneled back to the WLC.

Full Access
Question # 23

How does viewing trend deviation in Cisco Catalyst Center AI Analytics benefit wireless operation?

A.

It maintains server time synchronization

B.

It exports event thresholds to external dashboards

C.

It allows earlier notice of abnormal wireless behavior

D.

It backs up existing log files to remote hosts

Full Access
Question # 24

A managed service is rolling out advanced wireless infrastructure to support an expanding organization with diverse device types. The implementation requires integration of dynamic endpoint profiling for secure access and device classification. According to the baseline deployment with ISE policy sets, the engineering group must enforce access parameters based on device category rules. Which configuration action must be taken to fulfill the initiative?

A.

Create device-type groups.

B.

Configure profiling groups.

C.

Implement user ID groups.

D.

Define endpoint group mapping.

Full Access
Question # 25

Exhibit:

Refer to the exhibit. A Cisco 9800 WLC is deployed at a branch location to facilitate secure client connectivity. A network engineer configures a WLAN using WPA2 Enterprise authentication and activates the RADIUS server-based method to align with company security policies. Which CLI command must be added to the box in the configuration to enable client authentication for this WLAN?

A.

security dot1x RADIUS_AUTH_LIST CompanyWLAN1

B.

security authentication dot1x RADIUS_AUTH_LIST

C.

security authentication CompanyWLAN1 RADIUS_AUTH_LIST

D.

security dot1x authentication-list RADIUS_AUTH_LIST

Full Access
Question # 26

Which process enables seamless Layer 2 handoff in a wireless network during roaming?

A.

increased beacon interval setting

B.

optimized roaming

C.

fast BSS transition protocol

D.

deferred probe response technique

Full Access
Question # 27

Refer to the exhibit.

A wireless controller is deployed at a branch location to facilitate guest client connectivity. A network engineer configures one WLAN using Web authentication and activates web-based method to align with company security policies. Which configuration enables client authentication for this WLAN?

A.

security web-auth

B.

wlan webauth 2 webauth

C.

no security wpa wpa2

D.

no security wpa akm dot1x

Full Access
Question # 28

A network engineer must isolate all guest users connected to the WLAN on a Cisco 9800 WLC so they cannot communicate with each other but can access the internet. The WLAN must meet these requirements:

•SSID named VisitorAccess assigned to VLAN 30

•guests prohibited from sharing files with other guests

•must be scalable to multiple access points in the building

Which action must the network engineer take to meet the requirements?

A.

Enable P2P blocking in the policy profile and map the WLAN to a dedicated guest VLAN.

B.

Set up local authentication and map the WLAN to a dedicated guest VLAN.

C.

Set up a FlexConnect group and use local switching for the guest WLAN internet access.

D.

Enable multicast mode and associate a RADIUS server with the guest WLAN.

Full Access
Question # 29

An IT team is deploying Meraki APs at a remote branch and must ensure that they are automatically assigned to the correct network in the Meraki dashboard. The branch is scheduled to receive 20 new APs, and site connectivity to headquarters was set up. Before shipping the APs, the team must make sure that each one is claimed by the intended network for management and monitoring. Which deployment action must they take before physically connecting the APs?

A.

Activate mesh networking mode for all the new APs before installation.

B.

Add the AP serial numbers to the required network within the Meraki dashboard.

C.

Preconfigure SSID names and VLAN tags on the local page of each AP in the Meraki dashboard.

D.

Create a separate DHCP scope for all the new APs on the local server.

Full Access
Question # 30

Which Cisco Ultra-Reliable Wireless Backhaul process enables devices to establish a reliable connection with the next AP along their path before losing connectivity to the current one in a wireless network during roaming?

A.

Open roaming

B.

Fast client handoff

C.

802.11v high speed roaming

D.

Make-before-break handover logic

Full Access