An engineer is changing the authentication method of a wireless network from EAP-FAST to EAP-TLS. Which two changes are necessary? (Choose two.)
A. Cisco Secure ACS is required.
B. A Cisco NAC server is required.
C. All authentication clients require their own certificates.
D. The authentication server now requires a certificate.
E. The users require the Cisco AnyConnect client.
A company is deploying wireless PCs on forklifts within its new 10,000-square-foot (3048-square-rneter) facility. The clients are configured for PEAP-MS-CHAPv2 with WPA TKIP. Users report that applications frequently drop when the clients roam between access points on the floor. A professional site survey was completed.
Which configuration change is recommended to improve the speed of client roaming?
C. WPA AES
D. WPA2 AES
Although the controller and APs support WLAN with SSID using WiFi Protected Access (WPA) and WPA2 simultaneously, it is common that some wireless client drivers cannot handle complex SSID settings. Whenever possible, Cisco recommends WPA2 only with Advanced Encryption Standard (AES). However, due to standards and mandatory WiFi Alliance certification process, TKIP support is required across future software versions. Keep the security policies simple for any SSID. Use a separate WLAN/SSID with WPA and Temporal Key Integrity Protocol (TKIP), and a separate one with WPA2 and Advanced Encryption Standard (AES). Since TKIP is being deprecated, Cisco recommends to use TKIP together with WEP, or to migrate out of TKIP completely and use PEAP, if possible.
While deploying PEAP authentication on a customer laptop with the native Windows supplicant, the PEAP security options do not appear.
Which option describes what must be done?
A. Enable automatic connection to the WLAN.
B. Enable DNS on WLAN.
C. Enable AES on WLAN settings
D. Enable WLAN autoconfig services on the PC
Which two statements describe the requirements for EAP-TLS? (Choose two)
A requires client-side and server-side certificates.
B. It uses PAC on the client.
C. It requires PKI.
D. It requires a server-side digital certificate on only the RADIUS server.
E. It must use AES for encryption and cannot use TKIP for encryption.
An engineer is configuring an autonomous AP for RADIUS authentication.
What two pieces of information must be known to configure the AP? (Choose two.)
A. shared secret
B. username and password
C. RADIUS IP address
D. group name
E. PAC encryption key
You identify RADIUS security servers by their host name or IP address, host name and specific UDP port numbers, or their IP address and specific UDP port numbers. The combination of the IP address and the UDP port number creates a unique identifier allowing different ports to be individually defined as RADIUS hosts providing a specific AAA service. This unique identifier enables RADIUS requests to be sent to multiple UDP ports on a server at the same IP address.
When a network engineer plans to implement the client MFP, which three settings should be supported by the client? (Choose three)
A. WPA2 with AES
B. Short Preamble check box
C. WPA2 with TKIP
E. WPA with TKIP
F. Cisco Compatible Extensions v5
* Client MFP is supported for use only with CCXv5 clients using WPA2 with TKIP or
A customer wants to allow employees to easily onboard their devices to the wireless network. Which process can be configured on Cisco ISE to support this requirement?
A. self registration guest portal
B. client provisioning
C. native supplicant provisioning
D. local web auth
Which three methods are valid for guest wireless using web authentication? (Choose three.)
There are three ways to authenticate users when you use web authentication. Local authentication allows you to authenticate the user in the Cisco WLC. You can also use an external RADIUS server or a LDAP server as a backend database in order to authenticate the users.