300-425 Dumps 300-425 Braindumps 300-425 Real Questions 300-425 Practice Test 300-425 Actual Questions Cisco 300-425 Designing Cisco Enterprise Wireless Networks (ENWLSD) https://killexams.com/pass4sure/exam-detail/300-425 Question: 144 An engineer has performed a predictive site survey for high-speed data and voice in an indoor office. What is the recommended data rate with -67 dBm signal level for optimal VoWLAN design? A . 6 Mbps on 802.11 bgn B . 24 Mbps on 802.11 bgn C . 12 Mbps on 802.11 an D . 24 Mbps on 802.11 an Answer: B Question: 145 An engineer is designing a wireless deployment for a university auditorium. Which two features can be used to help deal with the issues introduced by high AP count? (Choose two.) A . TSPEC B . RXSOP C . TPC D . LSS E . DFS Answer: CE Question: 146 An engineer has configured guest anchoring for a newly created SSD however, the mobility tunnels are not up, and EPING is failing from the foreign WLC to the anchor WLC. Which traffic flow must be allowed at the firewall to enable the communication? A . UDP port 16666 B . IP protocol 97 C . UDP port 97 D . TCP port 97 Answer: A Question: 147 A company wants to replace its existing PBX system with a new VoIP System that will include wireless IP phones. The CIO has concerns about whether the company’s existing wireless network can support the new system. Which tool in Cisco Prime can help ensure that the current network will support the new phone system? A . Location Readiness B . Site Calibration C . Map Editor D . Voice Readiness Answer: D Question: 148 A network administrator of a global organization is collapsing all controllers to a single cluster located in central Europe. Which concern must addressed? A . Some channels may not be available consistently across the organization. B . Different RF policies per office are not available in this configuration. C . Syslog must be configured to the time-zone of the NMS platform. D . Centralized controllers cannot uniformly authenticate global users. Answer: C Question: 149 A wireless engineer is designing a wireless network to support real-time applications over wireless. Which IEEE protocol mus the engineer enable on the WLC so that the number of packets that are exchanged between an access point and client are reduced and fast roaming occurs? A . 802.11w B . 802.11r C . 802.11i D . 802.11k Answer: D Question: 150 An engineer is designing a wireless network that will support many different types of wireless clients. When conducting the survey, which client must be used to ensure a consistent experience for all of the wireless clients? A . the client that has the highest RF properties B . the client that is used most by the company C . the client that is used least by the company D . the client with the worst RF characteristics Answer: B Question: 151 Which two considerations must a network engineer have when planning for voice over wireless roaming? (Choose two.) A . Full reauthentication introduces gaps in a voice conversation. B . Roaming time increases when using 802.1x + Cisco Centralized Key Manegement. C . Roaming occurs when the phone has seen at least four APs. D . Roaming occurs when the phone has reached -80 dBs or below. E . Roaming with only 802.1x authentication requires full reauthentication. Answer: AE Question: 152 A network engineer is preparing for an office site survey with a height of 2.5 meters. Which three components are recommended to complete the survey? (Choose three.) A . Use a battery pack to power APs B . Use a drawing of the office space to draw AP and client placements. C . Use DoS attack on APs while measuring the throughput. D . Use APs with directional antennas. E . Use APs with external antennas. F . Use APs with built-in antennas. Answer: ABF Question: 153 A wireless engineer is hired to design a network for a technology company. The company campus has four buildings and a warehouse with access points that provide full wireless coverage as well as a pair of WLCs located in the core of the network. Which type of wireless architecture is being used? A . unified deployment B . autonomous deployment C . centralized deployment D . distributed deployment Answer: C Question: 154 Where must the APs be mounted when used in a high-density wireless network to provide 6 dB to 20 dB of attenuation to a cell? A . in the aisle B . under the seat C . above the stage D . under the stage Answer: B Question: 155 Refer to the exhibit. A client roams between two APs that are registered to two different controllers, where each controller has an interface in the client subnet. Both controllers are running AireOS. Which scenario explains the client roaming behavior? A . Controllers exchange mobility control messages (over UDP port 16666) and the client database entry is moved from the original controller to the new controller. B . Controllers do not exchange mobility control messages (over UDP port 16666) and the client database, entry is not moved from the original controller to the new conrtoller. C . Controllers exchange mobility control messages (over UDP port 16666) and a new client session is started with the new controller. D . Controllers exchange mobility control messages (over UDP port 16666) and the client database entry is tunneled from the original controller to the new controller. Answer: A Question: 156 A customer is concerned about mesh backhaul link security. Which level of ecnryption does the backhaul link use? A . hash B . AES C . WEP D . 3DES Answer: B Question: 157 Which UDP port numbers are used for exchange mobility packets in an AireOS wireless deployment? A . UDP 16666 for control plane, EoIP (IP protocol 97) for data plane B . UDP 16668 for control plane, UDP 16667 for data plane C . UDP 16667 for control plane, UDP 16666 for data plane D . UDP 16666 for control plane, UDP 16667 for data plane Answer: D Question: 158 A wireless network consultant must assess an existing wireless LAN controller. Which section must the consultant check before replacing the old APs with APs that are IEEE 802.11ac-capable? A . number of AP licenses B . controller PSU C . throughput capacity D . software version Answer: A Question: 159 A customer asks an engineer to explain the concept of mobility domains and mobility groups. Which statement does the engineer respond with? A . A mobility group does not constrain the distribution of security context of a client and also does not constrain AP fail-over between controllers when the WLC are in the same mobility domain. B . If WLCs are in the same mobility domain, they communicate with each other but, if an anchor WLC is present it must be in the same mobility domain for communication to be possible. C . If WLCs are in the same mobility domain, they communicate with each other. Mobility groups constrain the distribution of security context of a client and also constrain AP fail-over between controllers. D . WLCs do not need to be in the same mobility domain to communicate with each other. Mobility groups constrain the distribution of security context of a client and also constrain AP fail-over between controllers. Answer: C 6$03/( 48(67,216 7KHVH TXHVWLRQV DUH IRU GHPR SXUSRVH RQO\ )XOO YHUVLRQ LV XS WR GDWH DQG FRQWDLQV DFWXDO TXHVWLRQV DQG DQVZHUV .LOOH[DPV FRP LV DQ RQOLQH SODWIRUP WKDW RIIHUV D ZLGH UDQJH RI VHUYLFHV UHODWHG WR FHUWLILFDWLRQ H[DP SUHSDUDWLRQ 7KH SODWIRUP SURYLGHV DFWXDO TXHVWLRQV H[DP GXPSV DQG SUDFWLFH WHVWV WR KHOS LQGLYLGXDOV SUHSDUH IRU YDULRXV FHUWLILFDWLRQ H[DPV ZLWK FRQILGHQFH +HUH DUH VRPH NH\ IHDWXUHV DQG VHUYLFHV RIIHUHG E\ .LOOH[DPV FRP $FWXDO ([DP 4XHVWLRQV .LOOH[DPV FRP SURYLGHV DFWXDO H[DP TXHVWLRQV WKDW DUH H[SHULHQFHG LQ WHVW FHQWHUV 7KHVH TXHVWLRQV DUH XSGDWHG UHJXODUO\ WR HQVXUH WKH\ DUH XS WR GDWH DQG UHOHYDQW WR WKH ODWHVW H[DP V\OODEXV %\ VWXG\LQJ WKHVH DFWXDO TXHVWLRQV FDQGLGDWHV FDQ IDPLOLDUL]H WKHPVHOYHV ZLWK WKH FRQWHQW DQG IRUPDW RI WKH UHDO H[DP ([DP 'XPSV .LOOH[DPV FRP RIIHUV H[DP GXPSV LQ 3') IRUPDW 7KHVH GXPSV FRQWDLQ D FRPSUHKHQVLYH FROOHFWLRQ RI TXHVWLRQV DQG DQVZHUV WKDW FRYHU WKH H[DP WRSLFV %\ XVLQJ WKHVH GXPSV FDQGLGDWHV FDQ HQKDQFH WKHLU NQRZOHGJH DQG LPSURYH WKHLU FKDQFHV RI VXFFHVV LQ WKH FHUWLILFDWLRQ H[DP 3UDFWLFH 7HVWV .LOOH[DPV FRP SURYLGHV SUDFWLFH WHVWV WKURXJK WKHLU GHVNWRS 9&( H[DP VLPXODWRU DQG RQOLQH WHVW HQJLQH 7KHVH SUDFWLFH WHVWV VLPXODWH WKH UHDO H[DP HQYLURQPHQW DQG KHOS FDQGLGDWHV DVVHVV WKHLU UHDGLQHVV IRU WKH DFWXDO H[DP 7KH SUDFWLFH WHVWV FRYHU D ZLGH UDQJH RI TXHVWLRQV DQG HQDEOH FDQGLGDWHV WR LGHQWLI\ WKHLU VWUHQJWKV DQG ZHDNQHVVHV *XDUDQWHHG 6XFFHVV .LOOH[DPV FRP RIIHUV D VXFFHVV JXDUDQWHH ZLWK WKHLU H[DP GXPSV 7KH\ FODLP WKDW E\ XVLQJ WKHLU PDWHULDOV FDQGLGDWHV ZLOO SDVV WKHLU H[DPV RQ WKH ILUVW DWWHPSW RU WKH\ ZLOO UHIXQG WKH SXUFKDVH SULFH 7KLV JXDUDQWHH SURYLGHV DVVXUDQFH DQG FRQILGHQFH WR LQGLYLGXDOV SUHSDULQJ IRU FHUWLILFDWLRQ H[DPV 8SGDWHG &RQWHQW .LOOH[DPV FRP UHJXODUO\ XSGDWHV LWV TXHVWLRQ EDQN DQG H[DP GXPSV WR HQVXUH WKDW WKH\ DUH FXUUHQW DQG UHIOHFW WKH ODWHVW FKDQJHV LQ WKH H[DP V\OODEXV 7KLV KHOSV FDQGLGDWHV VWD\ XS WR GDWH ZLWK WKH H[DP FRQWHQW DQG LQFUHDVHV WKHLU FKDQFHV RI VXFFHVV 7HFKQLFDO 6XSSRUW .LOOH[DPV FRP SURYLGHV IUHH [ WHFKQLFDO VXSSRUW WR DVVLVW FDQGLGDWHV ZLWK DQ\ TXHULHV RU LVVXHV WKH\ PD\ HQFRXQWHU ZKLOH XVLQJ WKHLU VHUYLFHV 7KHLU FHUWLILHG H[SHUWV DUH DYDLODEOH WR SURYLGH JXLGDQFH DQG KHOS FDQGLGDWHV WKURXJKRXW WKHLU H[DP SUHSDUDWLRQ MRXUQH\ 'PS .PSF FYBNT WJTJU IUUQT LJMMFYBNT DPN WFOEPST FYBN MJTU .LOO \RXU H[DP DW )LUVW $WWHPSW *XDUDQWHHG