300-425 Real Exam Dumps Questions and answers 11-20
Get Full Version of the Exam
http://www.EnsurePass.com/300-425.html
Question No.11
An engineer must create data-link redundancy for the company#39;s Cisco Wireless LAN Controller. The engineer has decided to configure LAG-based redundancy instead of port-based redundancy. Which three features of LAG-based redundancy influenced this decision? (Choose three.)
-
Packets are always sent out on the same port they are received on.
-
All interface traffic passes as long as one port is up.
-
The same port has multiple untagged dynamics interfaces.
-
Interface connection to two separate nonstacked switches is available.
-
Full bandwidth of all links is available.
-
Ports are grouped into multiple LAGs.
Correct Answer: ABF
Question No.12
Clustering Cisco WLCs into a single RF group enables the RRM algorithms to scale beyond the capabilities of a single Cisco WLC. How many WLC and APs in an RF group can the controller software scale up to in WLC release 8.9 depending on the platform?
-
up to 20 WLCs and 1000 APs
-
up to 20 WLCs and 3000 APs
-
up to 20 WLCs and 4000 APs
-
up to 20 WLCs and 6000 APs
Correct Answer: D
Question No.13
A company wants to replace its existing PBX system with a new VoIP System that will include wireless IP phones. The CIO has concerns about whether the company#39;s existing wireless network can support the new system. Which tool in Cisco Prime can help ensure that the current network will support the new phone system?
-
Location Readiness
-
Site Calibration
-
Map Editor
-
Voice Readiness
Correct Answer: D
Question No.14
An engineer must speed up the reauthentication delays that are being experienced on the wireless infrastructure by deploying a key-caching mechanism. Which mechanism must be configured?
-
PEAP
-
FT
-
PMF
-
GTK-randomization
Correct Answer: B
Question No.15
A wireless engineer is utilizing the voice readiness tool in Cisco Prime for a customer that wants to deploy Cisco IP phones. Which dBm range is the network inspected against?
-
-78 to -65 dBm
-
-72 to -67 dBm
-
-85 to -65 dBm
-
-85 to -67 dBm
Correct Answer: D
Question No.16
An engineer is designing a wireless deployment for a university auditorium. Which two features can be used to help deal with the issues introduced by high AP count? (Choose two.)
-
TSPEC
-
RXSOP
-
TPC
-
LSS
-
DFS
Correct Answer: CE
Question No.17
A company has 10 access point licenses available on their backup Cisco WLC and their primary Cisco WLC is at full capacity, 5 access points are set to high failover priority and 7 access points are set to critical failover priority. During a failure, not all critical access points failed over to the backup Cisco WLC. Which configuration is the cause of this issue?
-
The high priority access point is oversubscribed.
-
network ap-priority is set to enable.
-
The critical priority access point count is oversubscribed.
-
network ap-priority is set to disable.
Correct Answer: A
Question No.18
An engineer must configure the virtual IP address on multiple controllers in a mobility group. Which rule must the engineer follow to ensure proper roaming?
-
Ensure that the DNS entry is tied to the virtual IP address of the WLC.
-
Use a unique IP address for each WLC.
-
Ensure that the DNS Host Name field is defined.
-
Use the same IP address for each WLC.
Correct Answer: A
Question No.19
An engineer is reducing the subnet size of the corporate WLAN by segmenting the VLAN into smaller subnets. Clients will be assigned a subnet by location. Which type of groups can the engineer use to map the smaller subnets to the corporate WLAN?
-
WLC port groups
-
RF groups
-
AP groups
-
interface groups
Correct Answer: D
Question No.20
A network administrator of a global organization is collapsing all controllers to a single cluster located in central Europe. Which concern must addressed?
-
Some channels may not be available consistently across the organization.
-
Different RF policies per office are not available in this configuration.
-
Syslog must be configured to the time-zone of the NMS platform.
-
Centralized controllers cannot uniformly authenticate global users.
Correct Answer: C
Get Full Version of 300-425 Dumps