Tag Archives: client

You run the fn version command. While the client version is displayed correctly, you notice that the

You run the fn version command. While the client version is displayed correctly, you notice that the server version is T.Which two probabilities might have resulted in this output?Response: A. Fn start command has not been issued yet. B. Fn CLI cannot reach the Fn server. C. Function context is not set. D. A more recent version of… Read More »

Cisco DNA Center has obtained the username of the client and the multiple devices that the client is using on the network. How is Cisco DNA Center getting these context details?

Refer to the exhibit. Cisco DNA Center has obtained the username of the client and the multiple devices that the client is using on the network. How is Cisco DNA Center getting these context details? A. Those details are provided to Cisco DNA Center by the Identity Services Engine. B. The administrator had to assign the username to… Read More »

After running the code in the exhibit, which step reduces the amount of data that the NETCONF server returns to the NETCONF client, to only the interface’s configuration?

Refer to the exhibit. After running the code in the exhibit, which step reduces the amount of data that the NETCONF server returns to the NETCONF client, to only the interface’s configuration? A. Use the Ixml library to parse the data returned by the NETCONF server for the interface’s configuration. B. Create an XML filter as a string… Read More »

Drag and drop the DHCP messages that are exchanged between a client and an AP into the order they are exchanged on the right.

Drag and drop the DHCP messages that are exchanged between a client and an AP into the order they are exchanged on the right. Select and Place: Answer: Explanation:  No answer description available for this question Show AnswerDiscussion The post Drag and drop the DHCP messages that are exchanged between a client and an AP into the order… Read More »

A client device fails to see the enterprise SSID, but other client devices are connected to it. What is the cause of this issue?

A. The client has incorrect credentials stored for the configured broadcast SSID. B. The hidden SSID was not manually configured on the client. C. The broadcast SSID was not manually configured on the client. D. The client has incorrect credentials stored for the configured hidden SSID. Answer: Option B. Explanation:  No answer description available for this question Show… Read More »

A client device roams between access points located on different floors in an atrium. The access points are joined to the same controller and configured in local mode. The access points are in different AP groups and have different IP addresses, but the client VLAN in the groups is the same. What type of roam occurs?

A. inter-controller B. inter-subnet C. intra-VLAN D. intra-controller Answer: Option D. Explanation:  Reference: https://www.cisco.com/c/en/us/td/docs/wireless/controller/8-3/config-guide/b_cg83/b_cg83_chapter_010011.html Show AnswerDiscussion The post A client device roams between access points located on different floors in an atrium. The access points are joined to the same controller and configured in local mode. The access points are in different AP groups and have different IP… Read More »

What is an advantage of using EAP-TLS over EAP-MS-CHAPv2 for client authentication?

A. EAP-TLS uses a username and password for authentication to enhance security, while EAP-MSCHAPv2 does not. B. EAP-TLS uses multiple forms of authentication, while EAP-MS-CHAPv2 only uses one. C. EAP-TLS uses a device certificate for authentication to enhance security, while EAP-MS-CHAPv2 does not. D. EAP-TLS secures the exchange of credentials, while EAP-MS-CHAPv2 does not. Answer: Option C. Explanation: … Read More »

A network administrator is setting up wireless guest access and has been unsuccessful in testing client access. The endpoint is able to connect to the SSID but is unable to gain access to the guest network through the guest portal. What must be done to identify the problem?

A. Use traceroute to ensure connectivity. B. Use context visibility to verify posture status. C. Use the identity group to validate the authorization rules. D. Use the endpoint ID to execute a session trace. Answer: Option D. Explanation:  Reference: https://www.cisco.com/c/en/us/td/docs/security/ise/1-3/admin_guide/b_ise_admin_guide_13/b_ise_admin_guide_sample_chapter_011001.html#concept_87916A77E87745 Show AnswerDiscussion The post A network administrator is setting up wireless guest access and has been unsuccessful in… Read More »

Paul Asks His Team To Enable And Report On View-Through Conversions In Their Client Google App Campaigns. Why Are View-Through Conversions Important To Include?

Paul Asks His Team To Enable And Report On View-Through Conversions In Their Client Google App Campaigns. Why Are View-Through Conversions Important To Include? They unlock additional segmentation options for placements that occur on YouTube. They provide additional conversion data, so better business decisions can be made. They’re an effective way to directly compare conversion data against similar… Read More »