Which two considerations must a network engineer have when planning for voice over wireless
roaming? (Choose two.)
A. Roaming with only 802.1x authentication requires full reauthentication.
B. Ful reauthentication introduces gaps in a voice conversation.
C. Roaming occurs when e phone has seen at least four APs.
D. Roaming occurs when the phone has reached -80 dBs or below.
Answer(s): A, B
Which two 802.11 methods can be configured to protect card holder data? (Choose two.)
Answer(s): C, E
An engineer is changing the authentication method of a wireless network from EAP-FAST to
Which two changes are necessary? (Choose two.)
A. Cisco Secure ACS is required.
B. A Cisco NAC server is required.
C. Al authentication clients require their own certificates.
D. The authentication server now requires a certificate.
E. The users require the Cisco AnyConnect client.
Answer(s): C, D
WPA2 Enterprise with 802.1x is being used for clients to authenticate to a wireless network
through an ACS server. For security reasons, the network engineer wants to ensure only PEAP
authentication can be used. The engineer sent instructions to clients on how to configure their
supplicants, but users are stil in the ACS logs authentication using EAP-FAST. Which option
describes the most efficient way the engineer can ensure these users cannot access the
network unless the correct authentication mechanism is configured?
A. Enable AAA override on the SSID, gather the usernames of these users, and disable their
RADIUS accounts until they make sure they correctly configured their devices.
B. Enable AAA override on the SSID and configure an access policy in ACS that denies access
to the list of MACs that have used EAP-FAST.
C. Enable AAA override on the SSID and configure an access policy in ACS that allows access