1.
You are asked to troubleshoot a communication problem between a WLC and a RADIUS server. You verified that the RADIUS server is reachable from the WLC. Which WLC CLI command would be used for troubleshooting RADIUS connectivity?
2.
You detect wireless clients who are connected to an unauthorized AP on your network. Which setting would you configure to block their access to the network?
3.
During the installation of RingMaster, you receive the installation error: "HTTPS Server port is already in use. Please select another port." What should you do to resolve this issue?
4.
A customer wants to establish bidirectional trust between the WLC and the RingMaster management system. Which default self-signed certificate on the WLC must be replaced to ensure bidirectional trust?
5.
You made changes to a few settings on your WLCs in the network plan. However, the changes do not deploy to the network. Where would you view warnings about best-practice violations in the WLC configuration settings?
6.
Your manager asks you to implement a secure SSID that will authenticate users to a Microsoft Active Directory database. What is required to interface between the WLC and the database?
7.
You are monitoring your wireless network using RingMaster and you want to see the wireless clients connected to the network. Which monitoring view allows you to do this?
8.
A company has five access points (APs) and needs to connect them directly to the wireless LAN controller (WLC) using the on-board Power over Ethernet (PoE) ports. Which WLC will accomplish this task?
9.
Which network encryption uses either a static or dynamic 40-bit or 104-bit key?
10.
Which protocol is used for access point (AP) control and management traffic?