Where in the controller would we configure a wireless network NOT to use encryption?
A. AAA profile
B. SSID profile
C. ARM profile
D. Radio profile
E. VAP profile
Which of the following is true about configuring a server group?
A. Server rules are used to send information to the configured servers
B. A server group can have more than 1 server
C. If the internal database is used in the server group, then no external servers can be added
D. If multiple servers are assigned to the server group, all except the 1st will be ignored
E. All the servers in a server group will be used round robin style
In a Campus AP deployment, an access point has been provisioned statically with an IP address, subnet mask, default gateway and Controller IP address. Control Plane Security has been disabled. Both the Controller and the Access Point are using 6.1 firmware. If a 3rd party firewall is placed in between the AP and controller, what traffic would need to be allowed for the AP to boot successfully and broadcast Wireless Networks? (Select two)
A. DHCP
B. PAPI
C. GRE
D. SNMP
E. NTP
Web based captive portal can be authenticated by the following types of databases: (Select two)
A. Internal
B. PEAP
C. RADIUS
D. Kerberos
E. Tacacs
What is NOT a basic configuration in the startup wizard when configuring a WLAN?
A. SSID
B. VLAN
C. Radio Type
D. Antenna Type
E. Firewall Role
When configuring a guest WLAN via the WLAN section of the startup wizard, which security option is NOT available?
A. WEP encryption
B. Direct access to the internet with no captive portal
C. Captive portal with authentication via credentials
D. Captive portal with email registration
E. Captive Portal with no authentication or registration
Which answer correctly orders the following AP boot processes as they occur?
A. AP Transfers OS from controller
B. AP builds GRE tunnel to the controller
C. AP determines IP address of the controller
D. AP Radio is enabled
E. a, c, d, b.
F. c, a, b, d.
G. b, d, a, c.
H. a, b, c, d.
I. c, b, a, d.
The AP Wizard allows the selection of APs to be provisioned using which of the following methods (Select three):
A. APs in particular AP Group
B. All APs
C. APs designated as Air Monitors
D. APs meeting specified search criteria
E. APs of a specific type
Which is the strongest encryption type?
A. AES
B. TKIP
C. WEP
D. MSCHAPv2
E. DES
When would you use the Reject action in a firewall policy?
A. To let hackers know which ports are open on your firewall
B. To let your users know they they are in violation of corporate policies
C. To tell down stream routers to use a more appropriate router
D. To aid in troubleshooting firewall policy configuration
E. To let the system count the violations