Cisco 300-375 - Securing Wireless Enterprise Networks Exam
Page: 2 / 14
Total 70 questions
Question #6 (Topic: )
Which feature should an engineer select to implement the use of VLAN tagging, QoS, and
ACLs to clients based on RADIUS attributes?
ACLs to clients based on RADIUS attributes?
A. per-WLAN RADIUS source support
B. client profiling
C. AAA override
D. captive bypassing
E. identity-based networking
Answer: C
Question #7 (Topic: )
How should the Cisco Secure ACS v4.2 and the Cisco WLC v7.0 be configured to support
wireless client authentication?
wireless client authentication?
A. The WLC configured for RADIUS and the Cisco Secure ACS configured for RADIUS (Cisco Airespace)
B. The WLC configured for RADIUS and the Cisco Secure ACS configured for RADIUS (IETF)
C. The WLC configured for TACACS+ and the Cisco Secure ACS configured for TACACS+ (Cisco Airespace)
D. The WLC configured for TACACS+ and the Cisco Secure ACS configured for TACACS+ (Cisco IOS)
Answer: A
Question #8 (Topic: )
Refer to the exhibit.
[Cisco-300-375-8.0/Cisco-300-375-7_2.png]
A customer is having problems with clients associating to me wireless network. Based on
the configuration, which option describes the most likely cause of the issue?
[Cisco-300-375-8.0/Cisco-300-375-7_2.png]
A customer is having problems with clients associating to me wireless network. Based on
the configuration, which option describes the most likely cause of the issue?
A. Both AES and TKIP must be enabled
B. SA Query Timeout is set too low
C. Comeback timer is set too low
D. PME is set to "required"
E. MAC Filtering must be enabled
Answer: E
Question #9 (Topic: )
An engineer configures the wireless LAN controller to perform 802.1x user authentication.
Which option must be enabled to ensure that client devices can connect to the wireless,
even when WLC cannot communicate with the RADIUS?
Which option must be enabled to ensure that client devices can connect to the wireless,
even when WLC cannot communicate with the RADIUS?
A. local EAP
B. authentication caching
C. pre-authentication
D. Cisco Centralized Key Management
Answer: A
Question #10 (Topic: )
Which two options are types of MFP that can be performed? (Choose two.)
A. message integrity check
B. infrastructure
C. client
D. AES-CCMP
E. RSN
Answer: B,C