1.
What is the purpose of looking for anomalous behavior on a WLAN infrastructure?
2.
The wireless client can roam faster on the Cisco Unified Wireless Network infrastructure when which condition is met?
3.
Which option best describes an evil twin attack?
4.
When adding the foreign controller as a mobility group member in the guest anchor controller, which statement is true?
5.
For wireless NAC out-of-band operations, which protocol is used between the Cisco NAC Appliance Manager
and the wireless controller to switch the wireless client from the quarantine
4VLAN to the access VLAN after the client passed the NAC authentication/posture assessment process?
6.
Which WLAN option, when enabled, allows different wireless clients to be connected to different VLANs based on the returned RADIUS attributes from the AAA server?
7.
When deploying guest WLAN access using the anchor controller, which is used to transport the guest data traffic between the foreign and anchor controllers?
8.
What are the configuration steps, in order, for implementing wireless guest users using the foreign and anchor controllers approach?
9.
Which ports are used by CAPWAP?
10.
What can prevent an eavesdropping attack?