1.
What is another term for 802.11i wireless network security?
2.
Where is client traffic decrypted in a controller-based wireless network protected with WPA2 Security?
3.
Which setting provides the best security for a WLAN and authenticates users against a centralized directory store?

 
4.
What is a feature of Cisco WLC and IPS synchronization?
5.
Which statement about Cisco Management Frame Protection is true?
6.
From which location can you run reports on endpoint profiling?
7.
What is a requirement for posture administration services in Cisco ISE?
8.
What steps must you perform to deploy a CA-signed identify certificate on an ISE device?
9.
What implementation must be added to the WLC to enable 802.1X and CoA for wireless endpoints?
10.
What are the initial steps must you perform to add the ISE to the WLC?