A network engineer is deploying 8865 IP phones with wireless clients connected to them. In order to apply the appropriate QoS, the IP voice traffic needs to be distinguished from client data traffic. Which switch configuration feature must be enabled?
a
Which two restrictions are in place with regards to configuring mDNS? (Choose two.)
cd
What is the default NMSP echo interval between Cisco MSE and a Wireless LAN Controller?
b
Reference:
https://www.cisco.com/en/US/docs/wireless/mse/3350/6.0/CAS/configuration/guide/msecg_ch4_CAS.html
A network administrator managing a Cisco Catalyst 9800-80 WLC must place all iOS connected devices to the guest SSID on VLAN 101. The rest of the clients must connect on VLAN 102 distribute load across subnets. To achieve this configuration, the administrator configures a local policy on the WLC. Which two configurations are required? (Choose two.)
ae
When using a Cisco Catalyst 9800 Series Wireless Controller, which statement about AutoQoS is true?
b
A network engineer is implementing BYOD on a wireless network. Based on the customer requirements, a dual SSID approach must be taken. Which two advanced WLAN configurations must be performed? (Choose two.)
ab
An engineer enabled Cisco Centralized Key Management (CKM) on a WLAN with local and FlexConnect mode APs. The engineer notices that Cisco CKM is not working for the FlexConnect APs when looking at roaming, but it works for local mode APs. Which change must be made on the controller for the configuration to work properly?
d
A wireless administrator must assess the different client types connected to Cisco Catalyst 9800 Series Wireless Controller without using any external servers.
Which configuration must be added to the controller to achieve this assessment?
c
An engineer has implemented 802.1x authentication on the wireless network utilizing the internal database of a RADIUS server. Some clients reported that they are unable to connect. After troubleshooting, it is found that PEAP authentication is failing. A debug showed the server is sending an Access-Reject message.
Which action must be taken to resolve authentication?
b
After the rogue reports from Cisco Prime Infrastructure are reviewed, it is determined that the automatic rogue mitigation is not working as planned. Which security measure must be taken to help prevent rogue APs from being plugged into the network?
a