Cisco 400-351 - CCIE Wireless Written Exam Exam

Question #6 (Topic: Planning & Designing WLAN Technologies)
You are designing a wireless network for a museum. One of their requirements is to track people inside the museum and push a notification into their tablet device
as soon as they step in front of the painting with information about the artist and the painting. This information must be delivered in real time. You are using regular
probe request-based tracking and, during testing, you notice that although the tablet is connected to the museum Wi-Fi network, the location is not updating in real
time as you move. It can take almost two minutes for the location to be updated. Which option is the likely reason for this issue?
A. Probe request-based tracking is bound to delay due to the broadcast type of traffic that is not acknowledged over the air and could be lost. B. CCXv4 S60 is disabled by default. You must enable CCXv4 S60, which is compatible with all Wi-Fi clients. This feature carries out location updates more frequently. C. Cisco MSE does not perform a new location calculation for certain elements if the resulting position is not at least 5 meters different than previous location. D. Probe request-based tracking is device dependent. The tablet might not send a prove request if it is maintaining a good Wi-Fi signal, which can cause slower location updates.
Answer: C
Question #7 (Topic: Planning & Designing WLAN Technologies)
DRAG DROP
Drag and drop the wireless deployment modes on the left to the corresponding roaming description on the right.
Select and Place:
[Cisco-400-351-1.0/xmlfile-6_1.png]
Answer: [Cisco-400-351-1.0/xmlfile-7_1.png]
Question #8 (Topic: Planning & Designing WLAN Technologies)
[Cisco-400-351-1.0/xmlfile-7_2.png]
Refer to the exhibit. Which option describes what this sequence of commands achieves on a Cisco Autonomous AP?
A. This example shows how to permit any SNMP manager to access all objects with read-only permission using the community stringpublic. The access point also sends config traps to the hosts 192.180.1.111 and 192.180.1.33 using SNMPv1 and to the host 192.180.1.27 using SNMPv2C. The community stringpublicis sent with the traps. B. This example shows how to permit any SNMP manager to access all objects with read-only permission using the community stringpublic. The access point also sends config traps to the hosts 192.180.1.111 and 192.180.1.33 using SNMPv1 and to the host 192.180.1.27 using SNMPv2C. The community stringpublicis not sent with the traps as this is the default. C. This example shows how to permit any SNMP access to all objects with read-only permission to only three specific IP addresses using the community stringpublic.The access point also sends config traps to the hosts 192.180.1.111 and 192.180.1.33 using SNMPv1 and to the host 192.180.1.27 using SNMPv2C. The community stringpublicis sent with the traps. D. This example shows how to permit any SNMP access to all objects with read-only permission to only three specific IP addresses using the community stringpublic.The access point also sends config traps to the hosts 192.180.1.111 and 192.180.1.33 using SNMPv1 and to the host 192.180.1.27 using SNMPv2C. The community stringpublicis not sent with the traps.
Answer: A
Question #9 (Topic: Planning & Designing WLAN Technologies)
[Cisco-400-351-1.0/xmlfile-9_1.png]
Refer to the exhibit, which is a configuration snippet of a Cisco 5760 controller code IOS XE 3.6.3. Which statement about wlan 11 is true?
A. This configuration is for external WebAuth with an external Radius server. B. This configuration is for WebAuth with local authentication. C. This configuration is for WebAuth with an external RADIUS server. D. This configuration is for custom WebAuth with local authentication. E. This configuration is for custom WebAuth with an external RADIUS server.
Answer: D
Question #10 (Topic: Planning & Designing WLAN Technologies)
Which three conditions can trigger a client exclusion policy? (Choose three.)
A. excessive 802.11 association failures B. excessive 802.1x authentication failures C. IP theft or IP reuse D. excessive 802.11 probe request failures E. excessive 802.1x authorization failures F. excessive 802.11 packet retries
Answer: ABC
Download Exam
Page: 2 / 47
Total 232 questions