Download Securing Wireless Enterprise Networks.certkey.300-375.2019-10-16.1e.75q.vcex

Download Exam

File Info

Exam Securing Wireless Enterprise Networks
Number 300-375
File Name Securing Wireless Enterprise Networks.certkey.300-375.2019-10-16.1e.75q.vcex
Size 2.97 Mb
Posted October 16, 2019
Downloads 20

How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.

Coupon: EXAM_HUB

Discount: 20%


Demo Questions

Question 1
Which two considerations must a network engineer have when planning for voice over wireless roaming? (Choose two.)

  • A: Roaming with only 802.1x authentication requires full reauthentication.
  • B: Roaming time increases when using 802.1x + Cisco Centralized Key Management.
  • C: Full reauthentication introduces gaps in a voice conversation.
  • D: Roaming occurs when the phone has reached -80 dBs or below.
  • E: Roaming occurs when the phone has seen at least four APs.

Question 2
An engineer is changing the authentication method of a wireless network from EAP-FAST to EAP-TLS. Which two changes are necessary? (Choose two.)

  • A: Cisco Secure ACS is required.
  • B: A Cisco NAC server is required.
  • C: All authenticating clients require their own certificates.
  • D: The authentication server now requires a certificate.
  • E: The users require the Cisco AnyConnect client.

Question 3
WPA2 Enterprise with 802.1x is being used for clients to authenticate to a wireless network through an ACS server. For security reasons, the network engineer wants to ensure only PEAP authentication can be used. The engineer sent instructions to clients on how to configure their supplicants, but users are still in the ACS logs authenticating using EАР-FAST.  
Which option describes the most efficient way the engineer can ensure these users cannot access the network unless the correct authentication mechanism is configured?

  • A: Enable AAA override on the SSID, gather the usernames of these users, and disable their RADIUS accounts until they make sure they correctly configured their devices.
  • B: Enable AAA override on the SSID and configure an access policy in ACS that denies access to the list of MACs that have used EAP-FAST.
  • C: Enable АAА override on the SSID and configure an access policy in ACS that allows access only when the EAP authentication method is PEAP.
  • D: Enable AAA override on the SSID and configure an access policy in ACS that puts clients that authenticated using EАР-FAST into a quarantine VLAN.

Question 4
Refer to the exhibit. The East-WLC-2504A controller has been configured for WPA2 + PSK, although it isn’t working properly. Refer to the exhibit to resolve the configuration issues. 
Profile Name: Contractors
SSID: Contractors
Note, not all menu items, text boxes, or radio buttons are active. 


Virtual Terminal 






Which configuration changes need to be made to allow WPA2 + PSK to operate properly on the East-WLC-2504A controller? (Choose four.)

  • A: Disable Dynamic AP Management.
  • B: Click on the Status Enabled radio button.
  • C: Change the Layer 3 Security to Web Policy.
  • D: Change the WPA + WPA2 Parameters to WPA2 Policy-AES.
  • E: Change the PSK Format to HEX.
  • F: Change the WLAN ID.
  • G: Change the VLAN Identifier.
  • H: Change the IP Address of the Virtual interface.
  • I: Change the IP Address of the Virtual interface.
  • J: Change the SSID name of the WLAN.
  • K: Click on the PSK radio button and add the password in the text box.

Question 5
Refer to the exhibit. 


What is the IP address?

  • A: the wireless client IP address
  • B: the RADIUS server IP address
  • C: the controller management IP address
  • D: the lightweight AP IP address
  • E: the controller AР-manager IP address
  • F: the controller virtual interface IP address

Question 6
A customer is concerned about denial of service attacks that impair the stable operation of the corporate wireless network. The customer wants to purchase mobile devices that will operate on the corporate wireless network. 
Which IEEE standard should the mobile devices support to address the customer concerns?

  • A: 802.11w
  • B: 802.11k
  • C: 802.11r
  • D: 802.11h

Question 7
After receiving an alert regarding a rogue AP, a network engineer logs into Cisco Prime and looks at the floor map where the AP that detected the rogue is located. The map is synchronized with a mobility services engine that determines the rogue device is actually inside the campus. The engineer determines the rogue to be a security threat and decides to stop it from broadcasting inside the enterprise wireless network. What is the fastest way to disable the rogue?

  • A: Go to the location the rogue device is indicated to be and disable the power.
  • B: Create an SSID on the WLAN controller resembling the SSID of the rogue to spoof it and disable clients from connecting to it.
  • C: Classify the rogue as malicious in Cisco Prime.
  • D: Update the status of the rogue in Cisco Prime to contained.

Question 8
An engineer is configuring client MFP. What WLAN Layer 2 security must be selected to use client MFP?

  • A: Static WEP
  • B: CKIP
  • C: WPA + WPA2
  • D: 802.1x

Question 9
Which two events are possible outcomes of a successful RF jamming attack? (Choose two.)

  • A: unauthentication association
  • B: deauthentication multicast
  • C: deauthentication broadcast
  • D: disruption of WLAN services
  • E: physical damage to AP hardware

Question 10
An engineer is configuring a new mobility anchor for a WLAN on the CLI with the config wlan mobility anchor add 3 command, but the command is failing. 
Which two conditions must be met to be able to enter this command? (Choose two.)

  • A: The anchor controller IP address must be within the management interface subnet.
  • B: The anchor controller must be in the same mobility group.
  • C: The WLAN ID must be enabled.
  • D: The mobility group keepalive must be configured.
  • E: The indicated WLAN ID must be present on the controller.



You can buy ProfExam with a 20% discount..

Get Now!


Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen


Use VCE Exam Simulator to open VCE files