MultipleChoice
Which two steps are needed to complete integration of the MSE to Cisco Prime Infrastructure and be able to track the location of clients/rogues on maps? (Choose two.)
OptionsMultipleChoice
For security purposes, an engineer enables CPU ACL and chooses an ACL on the Security > Access Control Lists > CPU Access Control Lists menu. Which kind of traffic does this change apply to, as soon as the change is made?
OptionsMultipleChoice
Which command set configures a Cisco Catalyst 9800 Series Wireless Controller so that the client traffic enters the network at the AP switch port?
OptionsMultipleChoice
The security policy mandates that only controller web management traffic is
allowed from the IT subnet. In testing, an engineer is trying to connect to a
WLAN with Web Authentication for guest users, but the page is timing out on
the wireless client browser. What is the cause of this issue?
OptionsMultipleChoice
After looking in the logs, an engineer notices that RRM keeps changing the channels for non-IEEE 802. 11 interferers. After surveying the area, it has been decided that RRM should not change the channel. Which feature must be enabled to ignore non-802.11 interference?
A . Avoid Cisco AP Load
OptionsMultipleChoice
A customer wants to Aps in the CEO's office to have different usernames and passwords for administrative support than the other APs deployed through the facility. Which feature must be enabled on the WLC and Aps to achieve this goal?
Options