[Free] Download New Updated (October 2016) Cisco 642-737 Real Exam 81-90

Ensurepass

QUESTION 81

Refer to the exhibit. What does this Cisco Secure ACS v4.2 log indicate?

 

clip_image002

 

A.

The WLC is not configured as a client in the Cisco Secure ACS.

B.

The WLC is not configured as a server in the Cisco Secure ACS.

C.

Incorrect authentication exists between the WLC and Cisco Secure ACS.

D.

The wireless client is not configured as a client in the Cisco Secure ACS.

E.

Incorrect authentication exists between the wireless client and Cisco Secure ACS.

 

Correct Answer: C

 

 

QUESTION 82

Refer to the exhibit. A client reports being unable to log into the wireless network, which uses PEAPv2. Which two issues appear in the output? (Choose two.)

 

clip_image004

 

A.

There is a problem with the client supplicant.

B.

The AP has the incorrect RADIUS server address.

C.

The AP has lost IP connectivity to the authentication server.

D.

The EAP client timeout value should be increased.

E.

The authentication server is misconfigured on the controller.

F.

The authentication server is misconfigured in the WLAN.

 

Correct Answer: AD

QUESTION 83

Which two statements are true about configuring a wired guest LAN feature? (Choose two.)

 

Require an anchor controller to implement

A.

Create a WLAN on the anchor controller only

B.

Select the management interface as the egress interface to reach the anchor controller

C.

D.

Select the interface that you created as the guest LAN interface in the ingress interface menu

E.

Configure on any controller from version 5.2 forward

 

Correct Answer: BD

 

 

QUESTION 84

Many employees are bringing their own devices to work such as those running Apple iOS for iPhones and iPads. Which three statements correctly describe authentication for these devices? (Choose three.)

 

A.

supports only broadcast networks

B.

s
upports broadcast and hidden networks

C.

supports only pre-shared key (pass phrase)

D.

supports most EAP types such as EAP-FAST, EAP-TLS, and PEAP

E.

supports WPA only

F.

supports WEP, WPA, and WPA2

 

Correct Answer: BDF

 

 

QUESTION 85

Customer wants to configure Wireless client authentication using digtial certificates with PKI. What happens after the signer encrypts the hash with the private key of the signer during the certification signature process?

 

A.

The verifier obtains the public key of the signer.

B.

The encrypted hash is appended to the document as the signature.

C.

The verifier decrypts the signature of the signer using the public key.

D.

The verifier makes a hash of the received document and compares it to the decrypted signature hash.

 

Correct Answer: B

 

 

QUESTION 86

An engineer needs to block SSH traffic going to the WLC, which does not originate on the management interface. Where should the ACL be applied to accomplish this with the least configuration?

 

A.

CPU

B.

Management interface

C.

WLAN interfaces

D.

SSID

 

Correct Answer: A

 

QUESTION 87

Given a proper configuration of the Cisco WLC v7.0, what is the default username, password, and enable password to remotely access an associated AP?

 

A.

admin, admin, and Cisco

B.

admin, cisco, and Cisco

C.

none, cisco, and Cisco

D.

none, Cisco, and Cisco

E.

Cisco, Cisco, and Cisco

F.

lightweight APs do not allow remote access

 

Correct Answer: E

 

 

QUESTION 88

802.1X AP supplicant credentials have been enabled and configured on a Cisco WLC v7.0 in both the respective Wireless>AP>Global Configuration location and AP>Credentials tab locations. What describes the 802.1X AP authentication process when connected via Ethernet to a switch?

 

A.

Only WLC AP global credentials are used.

B.

Only AP credentials are used.

C.

WLC global AP credentials are used first; upon failure, the AP credentials are used.

D.

AP credentials are used first; upon failure, the WLC global credentials are used.

 

Correct Answer: B

 

 

QUESTION 89

Which four tasks are needed to configure a new Cisco CAM? (Choose four.)

 

A.

Create an OOB management profile in the Cisco CAS for the controller.

B.

Configure the Cisco CAM as the authentication server for the controller.

C.

Configure the controller as an OOB management device in the Cisco CAM.

D.

Create a managed subnet for the Cisco CAM from the Cisco CAS.

E.

Create VLAN mapping in the Cisco CAS from the Cisco CAM.

F.

Verify that the controller hardware and software are supported by the Cisco CAM.

G.

Create local user accounts and verify them on the Cisco CAM.

H.

Configure the Cisco CAM as an OOB virtual gateway.

 

Correct Answer: CEFG

 

 

QUESTION 90

Which statement correctly describes the usage of the debug command in a Cisco Unified Wireless Network?

 

A.

Debug is enabled until manual shut off.

B.

Debug is available on the WLC serial console and web interface.

C.

Debug is a restricted command and is not available in the AP CLI.

D.

Debug is a message logging severity 7.

 

Correct Answer: D

 

Free VCE & PDF File for Cisco 642-737 Real Exam

Instant Access to Free VCE Files: CCNA | CCNP | CCIE …
Instant Access to Free PDF Files: CCNA | CCNP | CCIE …