1.
Which UDP port is used for RADIUS authentication by default?
2.
Your manager asks you to verify that all access points in a cluster have a primary and secondary controller assigned. Which CLI command should you use to verify this?
3.
You want to copy 802.11 protocol messages from the RF channel to a specified observer running a protocol analyzer. Which WLC feature would you use?
4.
You have wireless clients that are not part of the corporate network, but you want to allow them access to the Internet without requiring a username and password. Which type of Service Profile in RingMaster should you configure?
5.
A network administrator wants to look at data throughput per radio. Which panel in RingMaster would you use?
6.
A customer is concerned about the integrity of user data tunneled between the WLA and the WLC. Which feature would be used to address this?
7.
A customer is experiencing intermittent client connectivity problems. Using the spectral analysis capabilities of the wireless LAN system, the customer has identified a number of interference sources. One of the interference sources is causing problems for the client. Which attribute would identify the correct interferer from the list?
8.
You are implementing user globs to allow access to your network. You want to allow access to users with the username @company.com. Which user glob do you configure?
9.
Which Juniper Networks WLA model supports spectrum analysis?
10.
You have imported a floor plan into RingMaster. Which next step must be completed for an accurate plan?