What is the purpose of looking for anomalous behavior on a WLAN infrastructure?
A. Identifying new attack tools
B. Auditing employee’s bandwidth usage
C. Identifying attacks using signature matching
D. Improving performance by load balancing
As of controller release v5.2, which two statements about wired guest access support are true?
A. It is not supported on the Cisco 2100 Series Controllers.
B. No more than three wired guest access LANs can be configured on a controller.
C. Layer 3 web authentication and passthrough are not supported.
D. Wired guest access cannot be configured in a dual-controller configuration that uses an anchor
controller and a foreign controller.
E. The wired guest access ports must be in the same Layer 2 network as the foreign controller.
The wireless client can roam faster on the Cisco Unified Wireless Network infrastructure when
which condition is met?
A. EAP-FAST is used for client authentication on the wireless network.
B. Cisco Centralized Key Management is used for Fast Secure Roaming.
C. QoS is being used on the WLAN to control which client packets get through the network faster.
D. RRM protocol is used between multiple APs that the client associates to while roaming.
Which option best describes an evil twin attack?
A. A rouge access point broadcasting a trusted SSID
B. A rogue access point broadcasting any SSID
C. A rouge ad-hoc with the SSID “Free WiFi”
D. A rouge access point spreading malware upon client connection
Which two configuration parameters does NAC OOB require on a SSID/WLAN? (Choose two.)
A. WMM enabled on the WLAN
B. Open authentication on the WLAN
C. AAA override configuration on the WLAN
D. 802.1x configuration on the WLAN