David Birch

Member
Member
Joined
Jun 15, 2017
Messages
45
Reaction score
7
Points
18
2018 January New Cisco 300-375 Exam Dumps with PDF and VCE Free Updated Today! Following are some new 300-375 Exam Questions:

QUESTION 55
Which two statements about the sponsor accounts on the Cisco NAC Guest Server are true? (Choose two.)


A. The sponsor login to the Cisco NAC Guest Server is at https://NGS-IP-Address/admin to create, view, and edit guest accounts.
B. The Cisco NAC Guest Server can authenticate the sponsors using the local database or via Microsoft Active Directory or LDAP or RADIUS servers.
C. Sponsoring user groups is the method by which to assign permissions to the sponsors.
D. Guest roles provide a way to give different levels of access to different sponsor accounts.
E. Sponsor accounts require admin privileges to generate reports.


Answer: BC

QUESTION 56
Which two statements are true about configuring a wired guest LAN feature? (Choose two.)


A. Create a WLAN on the anchor controller only
B. Select the management interface as the egress interface to reach the anchor controller
C. Require an anchor controller to implement
D. Select the interface that you created as the guest LAN interface in the ingress interface menu
E. Configure on any controller from version 5.2 forward


Answer: BD

QUESTION 57
When configuring guest WLAN access, which two statements are true? (Choose two.)


A. The SSID that is defined for the guest WLAN on the foreign controllers must be the same as that defined on the anchor controller.
B. The foreign controllers must be defined with an ingress interface and an egress interface in the guest WLAN.
C. The foreign and anchor controllers must be configured in a mobility group for the foreign controllers to be able to initiate EoIP tunnels to one or more anchor controllers.
D. The mobility domain name of the anchor controller should be the same as what is configured for the foreign controllers.


Answer: AC

QUESTION 58
Which statement correctly describes the relationship between the foreign and anchor controllers when used for guest access?


A. The foreign controller will load balance in round-robin fashion starting with the highest IP address anchor controller to the lowest IP address anchor controller.
B. The foreign controller will load balance in round-robin fashion starting with the lowest IP address anchor controller to the highest IP address anchor controller.
C. The foreign controller will load balance in round-robin fashion starting with the highest MAC address anchor controller to the lowest MAC address anchor controller.
D. The foreign controller will load balance in round-robin fashion starting with the lowest MAC address anchor controller to the highest MAC address anchor controller.


Answer: B

QUESTION 59
Which two firewall protocol port(s) need open access for secure management access to an anchor WLC for guest access? (Choose two.)


A. TCP 22
B. TCP 23
C. TCP 80
D. TCP 8080
E. TCP 443
F. UDP 123


Answer: AE

QUESTION 60
Which two EAP type(s) require a client certificate? (Choose two.)


A. LEAP
B. PEAP
C. EAP-FAST
D. EAP-TLS
E. EAP-MD5


Answer: CD

1.2018 New 300-375 Exam Dumps (PDF and VCE)Share:
https://www.braindump2go.com/300-375.html

2.2018 New 300-375 Exam Questions & Answers PDF:
https://drive.google.com/drive/folders/0B75b5xYLjSSNR21JWVIyUWFaTWM?usp=sharing
 

Smith Lee

Banned
Banned
Joined
Oct 23, 2018
Messages
568
Reaction score
98
Points
18
Pass 300-375 exam. I appreciate the quality of 300-375 study materials, and they are high quality. It’s not easy to get a high score without 300-375 training materials, and you can find them in braindumpskey.
 

JimmyKong

Banned
Banned
Joined
Jun 14, 2018
Messages
236
Reaction score
3
Points
18
QUESTION
Which three options are limitations when configuring basic security on an autonomous AP when using the express security page setup? (Choose three.)
A. You need multiple SSIDs.
B. Delete all the SSIDs.
C. Edit the SSIDs.
D. Use multiple authentication servers.
E. Use the same SSID on both radios.
F. Use a single SSID on a single radio.
Answer: CDF
QUESTION
Which two statements about beacon frames used by access points are true? (Choose two.)
A. They contain SSIDs if this feature is enabled.
B. They provide vendor proprietary information.
C. They are another name for an associated request.
D. They are sent in response to a probe frame.
E. They include ATIM window information for power save operations.
Answer: AB
Explanation:
QUESTION
When a guest client is authenticated, which type of connection is created between the controller- based AP and the client?
A. as SSL connection
B. a TLS encrypted tunnel
C. an unsecured connection
D. a 802.1x/EAP tunnel
E. an IPsec tunnel
Answer: C
QUESTION
When the enterprise-based authentication method is used for WPA2, a bidirectional handshake exchange occurs between the client and the authenticator.
Which five options are results of that exchange being used on a controller-based network? (Choose five.)
A. a bidirectional exchange of a nonce used for key generation
B. binding of a Pairwise Master Key at the client and the controller
C. creation of the Pairwise Transient Key
D. distribution of the Group Transient Key
E. distribution of the Pairwise Master key for caching at the access point
F. proof that each side is alive
Answer: ABCDF
Explanation:
Regardless of whether WPA or WPA2 is used during the initial connection between the station and the AP, the two agree on common security requirements.
Following that agreement, a series of important key related activities occur in this specific order
QUESTION
After receiving an alert regarding a rogue AP, a network engineer logs into Cisco Prime and looks at the floor map where the AP that detected the rogue is located.
The map is synchronized with a mobility services engine that determines the rogue device is actually inside the campus.
The engineer determines the rogue to be a security threat and decides to stop it from broadcasting inside the enterprise wireless network.
What is the fastest way to disable the rogue?
A. Go to the location the rogue device is indicated to be and disable the power.
B. Create an SSID on WLAN controller resembling the SSID if the rogue to spiif it and disable clients frim connecting to it.
C. Classify the rogue as malicious in Cisco Prime.
D. Update the status if the rogue to Cisco Prime to contained
Answer: C
QUESTION
Which configuration step is necessary to enable Visitor Connect on an SSID?
A. Pre Auth ACL
Answer: A
QUESTION
Which two statements describe the software v7.0 implementation of LAG on a Cisco controller? (Choose two.)
A. It is supported on Cisco WLC 2500.
B. It is supported on the Cisco FlexConnect 7500 controller.
C. Fewer IP addresses are required.
D. The LAG port becomes port 15.
E. The LAG port becomes port 29.
F. The switch channel group negotiates with LAGP.
G. The switch channel group negotiates with PaGP.
Answer: AC
QUESTION
A wireless engineer wants to deploy high availability on a wireless network, on what you should be concerned about?
A. RSSI
B. Channel reuses
C. Cell overlap
D. SNR
Answer: C
QUESTION
An engineer is configuring a BYOD provisioning WLAN, which 2 are requested?
A. DHCP Profiling
B. DHCP Address Assignment
C. AAA override
D. PAssive client
E. RADIUS NAC
Answer: CE
QUESTION
A wireless engineer wants to configure local flexconnect authentication over CLI, what commands are necessary (Choose 3)?
A. config wlan flexconnect local-switching 1 enable
B. config wlan flexconnect ap-auth 1 enable
C. config ap mode flexconnect AP name
Answer: ABC
QUESTION
Which three options are valid client profile probes in Cisco WLC? (Choose three)
A. MAC OUI
B. DHCP
C. HTTP Agent
Answer: ABC
 

Latest posts

Top