Pre-Summer Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: cramtick70

350-101 Implementing and Operating Cisco Wireless Core Technologies Questions and Answers

Questions 4

Refer to the exhibit. A network administrator must configure a client management parameter for a wireless deployment in a multi-site enterprise. The enterprise is using Cisco ISE as the management platform to oversee wireless access policies. To meet the organization's compliance requirements, all wireless endpoints must be evaluated against a posture policy before gaining access. Which configuration change must be applied on the WLAN level of the WLC to meet the requirement?

Options:

A.

config wlan WLAN-staff enable aaa-override

B.

wireless profile policy WLAN-Staffnac

C.

config wlan WLAN-StaffWLAN-staff radius enable

D.

wireless profile policy WLAN-Staff config wlan 5 enable radius

Buy Now
Questions 5

A medium-sized enterprise must provide wireless internet to visitors in their lobby using a Cisco 9800 WLC. The solution must meet these requirements:

Ensure that guests cannot access the corporate LAN.

Guests are redirected to a login page before browsing.

The guest network must use a separate VLAN from internal users.

Access must be limited to web browsing only.

Guest access does not require any preshared keys or certificates.

Which two actions must be taken to achieve this solution? (Choose two.)

Options:

A.

Create a WLAN that uses a web policy and points to a consent parameter map.

B.

Apply a webauth WLAN with mDNS mode set to drop.

C.

Configure a policy profile that uses an external only ACL and guest VLAN.

D.

Implement a policy profile with p2p blocking enabled and a guest VLAN.

E.

Deploy a WLAN policy that points wireless users to a webauth parameter map.

Buy Now
Questions 6

Refer to the exhibit. A network engineer must create a PSK WLAN that will be anchored to the DMZ. After this WLAN is created, users cannot connect to it. Based on the output from the RA trace, which action must the engineer take to resolve the issue?

Options:

A.

Disable fast transition 802.11r on the WLAN.

B.

Configure matching passwords on the client and the WLAN.

C.

Remove the anchor WLC from the mobility group.

D.

Configure matching WLANs on the foreign and the anchor.

Buy Now
Questions 7

An organization must manage ongoing firmware updates for redundant controllers in the network. They will use Cisco Catalyst Center for deployment and visibility. The current environment uses centralized and distributed management approaches. Automation and reporting are critical to minimize operational workload. Which method must be used to manage structured update processes and monitor progress throughout the update cycle?

Options:

A.

inventory snapshots from hardware report

B.

software templates

C.

software image management workflows

D.

lifecycle workflow

Buy Now
Questions 8

An organization must manage ongoing firmware updates for redundant controllers in the network. They will use Cisco Catalyst Center for deployment and visibility. The current environment uses centralized and distributed management approaches. Automation and reporting are critical to minimize operational workload. Which method must be used to manage structured update processes and monitor progress throughout the update cycle?

Options:

A.

inventory snapshots from hardware report

B.

software templates

C.

software image management workflows

D.

lifecycle workflow

Buy Now
Questions 9

Refer to the exhibit. A network engineer must create a PSK WLAN that will be anchored to the DMZ. After this WLAN is created, users cannot connect to it. Based on the output from the RA trace, which action must the engineer take to resolve the issue?

Options:

A.

Disable fast transition 802.11r on the WLAN.

B.

Configure matching passwords on the client and the WLAN.

C.

Remove the anchor WLC from the mobility group.

D.

Configure matching WLANs on the foreign and the anchor.

Buy Now
Questions 10

Which feature does a high-gain patch antenna impart to a wireless signal?

Options:

A.

single narrow frequency use

B.

partial overlap of frequency bands

C.

focused beam in a flat area

D.

alternating direction with elevation

Buy Now
Questions 11

Which condition is required for a line-of-sight RF connection?

Options:

A.

Wireless multipath signal propagation to the client

B.

MIMO connection support on both wireless radios

C.

Delay on wireless signal delivery introduced by reflection

D.

No physical objects between the transmitter and receiver

Buy Now
Questions 12

A network engineer must ensure that guest users connecting to a Cisco 9800 WLC are assigned IP addresses from a specific subnet that is separate from corporate users. The guest network must support at least 200 simultaneous connections and isolate traffic from internal devices. The DHCP server must allocate addresses only within the 10.20.30.0/24 subnet. Which action must the network engineer take to accomplish this task?

Options:

A.

Set up a unique policy tag on the guest WLAN and use a shared DHCP pool.

B.

Create a dedicated guest interface and map it to the guest policy profile for the guest WLAN.

C.

Assign a unique policy tag to the guest WLAN and use a shared DHCP pool with DHCP option 43.

D.

Use static IP address assignment for the guest WLAN interface and use ACLs for separation.

Buy Now
Questions 13

Refer to the exhibit.

A wireless controller is deployed at a branch location to facilitate guest client connectivity. A network engineer configures one WLAN using Web authentication and activates web-based method to align with company security policies. Which configuration enables client authentication for this WLAN?

Options:

A.

security web-auth

B.

wlan webauth 2 webauth

C.

no security wpa wpa2

D.

no security wpa akm dot1x

Buy Now
Questions 14

A school district is deploying Cisco Catalyst 9176 APs to remote sites with occasional WAN outages. The IT team wants the APs to attempt joining a secondary or tertiary Catalyst 9800 WLC if the primary controller is unreachable. The team must preconfigure all controller IP addresses using the AP CLI before deploying. Which set of CLI commands sets the primary, secondary, and tertiary controller IP addresses on a Catalyst 9176 AP?

Options:

A.

set controller primary-base main-wlc 10.10.10.10set controller secondary-base backup 10.10.10.20set controller tertiary-base tertiary-wlc 10.10.10.30

B.

capwap ap primary-base main-wlc 10.10.10.10capwap ap secondary-base backup-wlc 10.10.10.20capwap ap tertiary-base tertiary-wlc 10.10.10.30

C.

ap join primary 10.10.10.10ap join secondary 10.10.10.20ap join tertiary 10.10.10.30

D.

capwap ap wlc primary 10.10.10.10capwap ap wlc secondary 10.10.10.20capwap ap wlc tertiary 10.10.10.30

Buy Now
Questions 15

What is the maximum transmit power level allowed for 2.4 GHz in the United States?

Options:

A.

20 dBm

B.

23 dBm

C.

30 dBm

D.

36 dBm

Buy Now
Questions 16

What is a characteristic of 20 MHz channel width in a wireless network?

Options:

A.

Narrowest channel width in the 2.4 GHz band

B.

Increases authentication handoff frequency

C.

Supports automatic client reassociation

D.

Higher throughput than wider channels

Buy Now
Questions 17

What is a benefit of network adaptability in terms of improved operational outcomes when using AI-RRM in Cisco Catalyst Center?

Options:

A.

provisioning of static device addresses

B.

reduction of co-channel interference

C.

transmission of regular software update schedules

D.

categorization of users by authentication type

Buy Now
Questions 18

What is a feature of an RTS frame in the context of 802.11 frame types?

Options:

A.

It applies spectral mask for transmission.

B.

It requests permission to send data on a channel.

C.

It provides navigation updates for roaming clients.

D.

It compresses frames for bandwidth savings.

Buy Now
Questions 19

A hotel wants to provide guests with wireless connectivity via a captive portal using a Cisco 9800 WLC. The solution must meet these requirements:

• Ensure that guests are redirected to a custom web page for login and after authentication must have only internet access.

• The guest SSID must not require a password and must be visible to all clients.

• Network segmentation between staff and guests is required at the VLAN level.

What must the IT team configure on the WLAN?

Options:

A.

central web authentication with WPA2-PSK security and a DNS ACL assigned to the WLAN profile

B.

open authentication with a local web server for the guest WLAN

C.

PSK WLAN with VLAN override and enable mDNS for guest users

D.

central web authentication and assign a policy with ACLs restricting access to internal networks

Buy Now
Questions 20

Which process enables seamless Layer 2 handoff in a wireless network during roaming?

Options:

A.

increased beacon interval setting

B.

optimized roaming

C.

fast BSS transition protocol

D.

deferred probe response technique

Buy Now
Questions 21

To double the range of a transmitter, which value must the transmitter be changed to if it is currently at 17 dBm?

Options:

A.

20 dBm

B.

27 dBm

C.

100 dBm

D.

17 dBm

Buy Now
Questions 22

What does an elevated noise floor indicate in an RF environment?

Options:

A.

decreased link reliability

B.

stable time synchronization

C.

enhanced spectrum allocation

D.

minimized bandwidth demand

Buy Now
Questions 23

Refer to the exhibit. An engineer must configure a wireless guest WLAN, which requires clients to use VLAN 10 for a deployment at site A. Based on the configuration commands shown, which additional configuration meets the requirements?

Options:

A.

wlan guest-ssid 4 guest-ssidaccess vlan 10no shutdown

B.

wlan guest-ssid 4 guest-ssidvlan 10no shutdown

C.

wlan policy profile guest-policyaccess vlan 10no shutdown

D.

wireless profile policy guest-policyvlan 10no shutdown

Buy Now
Questions 24

What is used for measuring gain on a Wi-Fi antenna?

Options:

A.

length of the antenna

B.

decibels relative to dBi

C.

voltage against dBm

D.

blend of analog and digital signals

Buy Now
Questions 25

What is an attribute of the workgroup bridge mode for an AP in a wireless network?

Options:

A.

allows clients on the 2.4 GHz radio to speak to clients on the 5 GHz radio

B.

broadcast domains are extended across all network interfaces

C.

traffic movement between two of its Ethernet ports

D.

device integration of a wired segment into a wireless network

Buy Now
Questions 26

Refer to the exhibit. A JSON response from a wireless management API contains access point inventory and interface state information. Which JSON expression retrieves the MAC address of the second interface on the first access point?

Options:

A.

accessPoints[0].interfaces[1] .macAddress

B.

accessPoints[1].interfaces[0] .macAddress

C.

accessPoints[0].interfaces[0] .macAddress

D.

accessPoints[1].interfaces[1] .macAddress

Buy Now
Questions 27

What is a feature of an RTS frame in the context of 802.11 frame types?

Options:

A.

It applies spectral mask for transmission.

B.

It requests permission to send data on a channel.

C.

It provides navigation updates for roaming clients.

D.

It compresses frames for bandwidth savings.

Buy Now
Questions 28

Refer to the exhibit. An engineer is preparing a Cisco 9800-L WLC for deployment in a sensitive area. Only encrypted remote management via SSH is allowed, and all other VTY access methods must be disabled. The 9800-L WLC will be part of a larger deployment, and an external audit will check for any unencrypted management protocols. According to the requirements, only SSH is allowed for remote CLI sessions. Which set of commands must be executed to complete the Cisco IOS XE CLI configuration on the WLC?

Options:

A.

line vty 0 97no transport input telnetlogin authentication default

B.

line vty disable 0 97transport preferred sshlogin authentication defaultexit

C.

line vty 0 97transport input sshlogin authentication defaultexit

D.

line vty 0 97transport sshlogin authentication default

Buy Now
Questions 29

What is the primary modulation technology used by 802.11ax in wireless communications?

Options:

A.

frequency hopping spread spectrum

B.

direct sequence spread spectrum

C.

orthogonal frequency-division multiple access

D.

Quadrature Amplitude Modulation OFDMA

Buy Now
Questions 30

What is a benefit of applying TACACS authentication for device access?

Options:

A.

static user grouping without role differentiation

B.

fragmented statistics across controllers and devices

C.

streamlined administrator access across platforms

D.

single user for device and network access

Buy Now
Exam Code: 350-101
Exam Name: Implementing and Operating Cisco Wireless Core Technologies
Last Update: May 17, 2026
Questions: 0
350-101 pdf

350-101 PDF

$28.5  $94.99
350-101 Engine

350-101 Testing Engine

$33  $109.99
350-101 PDF + Engine

350-101 PDF + Testing Engine

$255  $850