300-430 Implementing Cisco Enterprise Wireless Networks (300-430 ENWLSI) Dumps

If you are looking for free 300-430 dumps than here we have some sample question answers available. You can prepare from our Cisco 300-430 exam questions notes and prepare exam with this practice test. Check below our updated 300-430 exam dumps.

DumpsGroup are top class study material providers and our inclusive range of 300-430 Real exam questions would be your key to success in Cisco CCNP Enterprise Certification Exam in just first attempt. We have an excellent material covering almost all the topics of Cisco 300-430 exam. You can get this material in Cisco 300-430 PDF and 300-430 practice test engine formats designed similar to the Real Exam Questions. Free 300-430 questions answers and free Cisco 300-430 study material is available here to get an idea about the quality and accuracy of our study material.


discount banner

Sample Question 4

Which customizable security report on Cisco Prime Infrastructure will show rogue APsdetected since a point in time?

A. Network Summary
B. Rogue APs Events
C. New Rogue APs
D. Rogue APs Count Summary


Sample Question 5

An engineer is implementing Cisco Identity-Based Networking on a Cisco AireOScontroller. The engineer has two ACLs on the controller. The first ACL, named BASE_ACL,is applied to the corporate_clients interface on the WLC, which is used for all corporateclients. The second ACL, named HR_ACL, is referenced by ISE in the Human Resourcesgroup policy. What is the resulting ACL when a Human Resources user connects?

A. HR_ACL appended with BASE_ACL
B. HR_ACL only
C. BASE_ACL appended with HR_ACL
D. BASE_ACL only


Sample Question 6

A network engineer wants to implement QoS across the network that support multipleVLANs. All the Aps are connected to switch ports and are configured in local mode. Whichtrust model must be configured on the switch ports to which the Aps are connected?

A. CoS
B. IPP
C. WMM UP
D. DSCP


Sample Question 7

An engineer is setting up a WLAN to work with a Cisco ISE as the AAA server. Thecompany policy requires that all users be denied access to any resources until they passthe validation. Which component must be configured to achieve this stipulation?

A. AAA override
B. preauthentication ACL
C. WPA2 passkey
D. CPU ACL


Sample Question 8

An engineer is implementing Cisco Identity-Based Networking on a Cisco AireOScontroller. The engineer has two ACLs on the controller. The first ACL, named BASE_ACL,is applied to the corporate_clients interface on the WLC, which is used for all corporateclients. The second ACL, named HR_ACL, is referenced by ISE in the Human Resourcesgroup policy. What is the resulting ACL when a Human Resources user connects?

A. HR_ACL appended with BASE_ACL
B. HR_ACL only
C. BASE_ACL appended with HR_ACL
D. BASE_ACL only


Sample Question 9

Which two events are outcomes of a successful RF jamming attack? (Choose two.) 

A. disruption of WLAN services  
B. unauthentication association  
C. deauthentication broadcast  
D. deauthentication multicast  
E. physical damage to AP hardware  


Sample Question 10

What are two considerations when deploying a Cisco Hyperlocation? (Choose two.)

A. NTP configuration is available, but not recommended.
B. The Cisco Hyperlocation feature must be enabled only on the wireless LAN controller.
C. After enabling Cisco Hyperlocation on Cisco CMX, the APs and the wireless LANcontroller must be restarted.
D. The Cisco Hyperlocation feature must be enabled on the wireless LAN controller andCisco CMX.
E. If the Cisco CMX server is a VM, a high-end VM is needed for Cisco Hyperlocationdeployments.


Sample Question 11

A corporation has recently implemented a BYOD policy at their HQ. Which two risks shouldthe security director be concerned about? (Choose two.)

A. network analyzers
B. malware
C. lost and stolen devices
D. keyloggers
E. unauthorized users


Sample Question 12

What is the default IEEE 802.1x AP authentication configuration on a Cisco Catalyst 9800Series Wireless Controller?

A. EAP-PEAP with 802.1x port authentication
B. EAP-TLS with 802.1x port authentication
C. EAP-FAST with CAPWAP DTLS + port authentication
D. EAP-FAST with CAPWAP DTLS


Sample Question 13

When configuring a Cisco WLC, which CLI command adds a VLAN with VLAN ID of 30 to aFlexConnect group named BranchA-FCG?

A. config flexconnect BranchA-FCG vlan 30 add
B. config flexconnect group BranchA-FCG vlan add 30
C. config flexconnect group BranchA-FCG vlan 30 add
D. config flexconnect BranchA-FCG vlan add 30


Sample Question 14

An engineer just added anew MSE to Cisco Prime Infrastructure and wants to synchronize the MSE with the Cisco 5520 WLC, which is located behind a firewall in a DMZ. It is noticed that NMSP messages are failing between the two devices. Which traffic must be allowed on the firewall to ensure that the MSE and WLC can communicate using NMSP?

A. TCP 1613
B. UDP 16113
C. TCP 16113
D. UDP 1613


Sample Question 15

A Cisco WLC has been added to the network and Cisco ISE as a network device, butauthentication is failing.Which configuration within the network device configuration should be verified?

A. SNMP RO community
B. device interface credentials
C. device ID
D. shared secret


Sample Question 16

An engineer must implement intrusion protection the WLAN. The AP coverage is adequateand on-channel attacks are the primary concern. The building is historic, which makesadding APs difficult. Which Ap mode and submode must be implemented?

A. Ap mode: local, Ap submode: WIPS
B. Ap mode: monitor, Ap submode: WIPS
C. Ap mode: monitor, Ap submode: none
D. Ap mode: local, Ap submode: none


Sample Question 17

An engineer wants to configure WebEx to adjust the precedence and override the QoSprofile on the WLAN.Which configuration is needed to complete this task?

A. Change the WLAN reserved bandwidth for WebEx
B. Create an AVC profile for WebEx
C. Create an ACL for WebEx
D. Change the AVC application WebEx-app-sharing to mark 


Sample Question 18

An engineer must configure Cisco OEAPs for three executives. As soon as the NATaddress is configured on the management interface, it is noticed that the WLC is notresponding for APs that are trying to associate to the internal IP management address.Which command should be used to reconcile this?

A. config flexconnect office-extend nat-ip-only disable
B. config network ap-discovery nap-ip-only enable
C config flexconnect office-extend nat-ip-only enable
D. config network ap-discovery nat-ip-only disable


Sample Question 19

A customer wants to Aps in the CEO’s office to have different usernames and passwords for administrative support than the other APs deployed through the facility. Which feature must be enabled on the WLC and Aps to achieve this goal?

A. Override global credentials
B. 802.1X supplicant credentials
C. Local management users
D. HTTPS access


Sample Question 20

An engineer must achieve the highest level of location accuracy possible for a new mobileapplication. Which technology must be implemented for this use case?

A. Time Difference of Arrival
B. Bluetooth Low Energy
C. RSS lateration
D. ToA lateration


Sample Question 21

An engineer must configure a Cisco WLC to support Cisco Aironet 600 Series OfficeExtendAPs. Which two Layer 2 security options are supported in this environment? (Choose two.)

A. Static WEP + 802.1X
B. WPA+WPA2
C. Static WEP
D. CKIP
E. 802.1X


Sample Question 22

What is the difference between PIM sparse mode and PIM dense mode?

A. Sparse mode supports only one switch. Dense mode supports multiswitch networks.
B. Sparse mode floods. Dense mode uses distribution trees.
C. Sparse mode uses distribution trees. Dense mode floods.
D. Sparse mode supports multiswitch networks. Dense mode supports only one switch.


Sample Question 23

An engineer set up identity-based networking with ISE and configured AAA override on theWLAN. Which two attributes must be used to change the client behavior from the defaultsettings? (Choose two.)

A. DHCP timeout
B. IPv6 ACL
C. multicast address
D. DNS server
E. DSCP value


Sample Question 24

An engineer needs to configure an autonomous AP for 802.Ix authentication. To achievethe highest security an authentication server is used for user authentication During testing,the AP fails to pass the user authentication request to the authentication server. Which twodetails need to be configured on the AP to allow communicator! between the server and theAP? (Choose two.)

A. RADIUS IP address
B. Username and password
C. Group name
D. Shared secret
E. PAC encryption key


Sample Question 25

An engineer must implement rogue containment for an SSID. What is the maximumnumber of APs that should be used for containment?

A. 1
B. 2
C. 3
D. 4


Sample Question 26

An engineer wants the wireless voice traffic class of service to be used to determine thequeue order for packets received, and then have the differentiated services code point setto match when it is resent to another port on the switch. Which configuration is required inthe network?

A. Platinum QoS configured on the WLAN
B. WMM set to required on the WLAN
C. mls qos trust dscp configured on the controller switch port
D. mls qos trust cos configured on the controller switch port


Sample Question 27

Where is Cisco Hyperlocation enabled on a Cisco Catalyst 9800 Series Wireless Controllerweb interface?

A. Policy Profile
B. AP Join Profile 
C. Flex Profile  
D. RF Profile  


Sample Question 28

A wireless engineer must implement a corporate wireless network for a large company inthe most efficient way possible. The wireless network must support 32 VLANs for 300employees in different departments. Which solution must the engineer choose?

A. Configure a second WLC to support half of the APs in the deployment.
B. Configure one single SSID and implement Cisco ISE for VLAN assignment according todifferent user roles.
C. Configure different AP groups to support different VLANs, so that all of the WLANs canbe broadcast on both radios.
D. Configure 16 WLANs to be broadcast on the 2.4-GHz band and 16 WLANs to bebroadcast on the 5.0-GHz band.


Sample Question 29

An enterprise started using WebEx as a virtual meeting solution. There is a concern thatthe existing wireless network will not be able to support the increased amount of traffic as aresult of using WebEx. An engineering needs to remark the QoS value for this applicationto ensure high quality in meetings. Which must be implemented to accomplish this task?

A. WLAN quality of service profile
B. QoS preferred call index
C. AVC profiles
D. UP to DSCP map


Sample Question 30

An engineer must implement Cisco Identity-Based Networking Services at a remote siteusing ISE to dynamically assign groups of users to specific IP subnets. If the subnetassigned to a client is available at the remote site, then traffic must be offloaded locally,and subnets are unavailable at the remote site must be tunneled back to the WLC. Whichfeature meets these requirements?

A. learn client IP address
B. FlexConnect local authentication
C. VLAN-based central switching
D. central DHCP processing


Sample Question 31

All APs are receiving multicast traffic, instead of only the APs that need it. What is thecause of this problem?

A. The multicast group includes all APs
B. The wrong multicast address was used
C. The multicast group is assigned the wrong VLAN
D. Multicast IGMP snooping is not enabled


Sample Question 32

Which feature on the Cisco Wireless LAN Controller must be present to support dynamicVLAN mapping?

A. FlexConnect ACL
B. VLAN name override
C. CCKM/OKC
D. AAA override


Sample Question 33

An IT team is growing quickly and needs a solution for management device access. Thesolution must authenticate users from an external repository instead of the current local onthe WLC, and it must also identify the user and determine what level of access usersshould have. Which protocol do you recommend to achieve these goals?

A. network policy server
B. RADIUS
C. TACACS+
D. LDAP


Sample Question 34

During the EAP process and specifically related to the client authentication session, whichencrypted key is sent from the RADIUS server to the access point?

A. WPA key
B. session key
C. encryption key
D. shared-secret key


Sample Question 35

An engineer has successfully implemented 10 active RFID tags in an office environment.The tags are not visible when the location accuracy is tested on the Cisco CMX Detect andLocate window. Which setting on Cisco CMX allows the engineer to view the tags?

A. Enable hyper location services for RFID.
B. Enable RFID tags in tracking options
C. Enable probing clients for active tags.
D. Define an RFID group globally and add the tags.



Exam Code: 300-430
Exam Name: Implementing Cisco Enterprise Wireless Networks (300-430 ENWLSI)
Last Update: May 03, 2024
Questions: 216