By default, how long does a Mobility Services Engine wait for an echo response from a Wireless LAN Controller before declaring the neighbor dead?
A. 10 Seconds
B. 60 Seconds
C. 15 Seconds
D. 30 Seconds
Answer: D
Which network is connected by default when connecting to the unused Ethernet port of a MAP?
A. the native VLAN that the MAP is connected to
B. the VLAN that is associated with WLAN number 1 in the WLC
C. the native VLAN that the WLC is connected to
D. the VLAN that is associated with the SSID that the MAPs are communicating on
Answer: A
300-365 Practice Exam Questions
Friday, 4 October 2019
Monday, 8 October 2018
Cisco 300-365 Question Answer
Controllers WLC_1 and WLC_2 are in the same mobility group. A wireless client that does not have the same VLAN interface roams from WLC_1 to WLC_2. What happens to the client roaming?
A. The client context is deleted in controller WLC_1, and a new client context is created in WLC_2 to become the anchor controller.
B. The client context is moved from controller WLC_1 to controller WLC_2. The result is that the WLC_1 client context is deleted and WLC_2 becomes the anchor controller.
C. The client context is copied from controller WLC_1 to controller WLC_2. The result is that WLC_1 becomes the foreign controller and WLC_2 becomes the anchor controller.
D. The client context is copied from controller WLC_1 to controller WLC_2. The result is that WLC_1 becomes the anchor controller and WLC_2 becomes the foreign controller.
Answer: D
An engineer wants to configure Call Admission Control and ensure that AC is based on the capacity of the AP and considering the possible impact of other APs in the area. Which two configuration options are required? (Choose two.)
A. Static CAC
B. Admission Control
C. Load-Based AC
D. Add Traffic Stream
E. Reserved Roaming Bandwidth
F. Expedited Bandwidth
Answer: BC
A. The client context is deleted in controller WLC_1, and a new client context is created in WLC_2 to become the anchor controller.
B. The client context is moved from controller WLC_1 to controller WLC_2. The result is that the WLC_1 client context is deleted and WLC_2 becomes the anchor controller.
C. The client context is copied from controller WLC_1 to controller WLC_2. The result is that WLC_1 becomes the foreign controller and WLC_2 becomes the anchor controller.
D. The client context is copied from controller WLC_1 to controller WLC_2. The result is that WLC_1 becomes the anchor controller and WLC_2 becomes the foreign controller.
Answer: D
An engineer wants to configure Call Admission Control and ensure that AC is based on the capacity of the AP and considering the possible impact of other APs in the area. Which two configuration options are required? (Choose two.)
A. Static CAC
B. Admission Control
C. Load-Based AC
D. Add Traffic Stream
E. Reserved Roaming Bandwidth
F. Expedited Bandwidth
Answer: BC
Friday, 2 March 2018
Cisco 300-365 Question Answer
A network engineer has installed 802.11ac access points with 80 MHz enabled; however, in the conference rooms, co-channel interference is being noticed. Under which tab in the RF profiles configuration can the engineer find the settings to tune the channel width for a group of APs?
A. 802.11
B. RRM
C. High Density
D. General
Answer: B
A customer has limited staff to manage a wireless network. The customer wants a solution that requires minimum hardware. Which type of architecture do you propose?
A. centralized
B. distributed
C. cloud-based
D. unified
Answer: A
A. 802.11
B. RRM
C. High Density
D. General
Answer: B
A customer has limited staff to manage a wireless network. The customer wants a solution that requires minimum hardware. Which type of architecture do you propose?
A. centralized
B. distributed
C. cloud-based
D. unified
Answer: A
Tuesday, 2 January 2018
Global Silicon Photonic Market 2018 Top Players – Cisco Systems, IBM Corporation, Bright Photonics, TMicroelectronics, Keopsys Group

The report on the global silicon photon market is the in-depth documentation that offers a global vision of the photonic silicon market. The report focuses on the most important players in the industry worldwide, along with information on their market share, company profiles, product images, specifications, contact information and sales. The report provides an executive model for the start of the photonic silicon market together with the definition of market dynamics.
The Silicon Photonic market is classified with the analysis in terms of application, key geographic regions and products. Through research and studies, reliable methodologies have been used for data verification. The study presents a detailed value chain analysis with the evaluation of a set of approaches for specific regions that are forged by the industry.
The theory of the report goes into the competitive and development panorama to determine the possibilities of the silicon photonic market in the international scenario, which are exhibited in key geographical regions. Also the industrial experts were consulted with their opinions during the market research study.
Production has been separated by technology, applications and regions. The analysis also covers the upstream raw materials, the downstream customer survey, the equipment, the development trend of the industry, the proposals and marketing channels. The report also presents the structure of product costs, manufacturing process and product specification, etc. The regional markets of the photonic silicon industry are also examined by analyzing their supply and demand logistics, historical growth rate in that region, production capacity and efficiency together with product prices. , utilization and profit.
The qualitative and quantitative assessments have been made in the report through different vertical markets and industrial aspects. The report includes the data collected through primary and secondary investigations. In that, the main research consists of opinions from surveys, experienced analysts and interviews, where secondary research includes specialized journals, industry databases, reputable and reputable sources of remuneration. There are also sections named as segments and subsegments occupied in the report part.
The recent developments, the distribution of the income of the main market players, the general vision of the businesses and the key strategies of the global market for photonic silicon are dealt with in the report.
Friday, 8 September 2017
Cisco 300-365 Question Answer
A network engineer must configure a 5 GHz network to allow for the greatest density of radios possible with the least amount of co-channel interference. Which configuration best fulfills this requirement?
A. Set 802.11h Local Power constraint to 25 dBm.
B. Set DCA to 20 MHz channels and enable Extended UNII-2 channels.
C. Enable Event Driven RRM in 5 GHz with a sensitivity of High. n
D. Configure TPC Power Threshold to -80 dBm and set interference Optimal Mode (TPCv2).
Answer: B
What is the default NMSP echo interval between a Mobility Services Engine and Wireless LAN Controller?
A. 30 Seconds
B. 15 Seconds
C. 10 Seconds
D. 60 Seconds
Answer: B
A. Set 802.11h Local Power constraint to 25 dBm.
B. Set DCA to 20 MHz channels and enable Extended UNII-2 channels.
C. Enable Event Driven RRM in 5 GHz with a sensitivity of High. n
D. Configure TPC Power Threshold to -80 dBm and set interference Optimal Mode (TPCv2).
Answer: B
What is the default NMSP echo interval between a Mobility Services Engine and Wireless LAN Controller?
A. 30 Seconds
B. 15 Seconds
C. 10 Seconds
D. 60 Seconds
Answer: B
Tuesday, 2 May 2017
Cisco 300-365 Question Answer
After a wireless deployment, users report that wireless voice clients are experiencing an unacceptable amount of delay while roaming during a call on the Cisco Unified 7925 Series phones. The customer environment consists of multiple controllers, all running 7.4.121.0 code, operating in a centralized deployment. What configuration issue is most likely contributing to the problem?
A. The authentication should be set to WPA2-PSK to allow for 802.11n speeds for the Cisco Unified 7925 phones.
B. The access points on that floor are all on one controller and should be load balanced evenly across multiple controllers.
C. The access points for that floor are salt and peppered across multiple controllers and should be moved to the primary controller.
D. The wireless phones are operating in the 2.4 GHz band and should be configured for the 5 GHz band.
Answer: B
A network engineer is debugging issues with the mDNS gateway. Which type of reply should be seen in the Wireshark capture when querying for a mDNS service in the Bonjour Cache?
A. unicast from Prime Infrastructure
B. unicast from controller
C. multicast from devices
D. multicast from controller
E. unicast from devices
F. multicast from Prime Infrastructure
Answer: B
A. The authentication should be set to WPA2-PSK to allow for 802.11n speeds for the Cisco Unified 7925 phones.
B. The access points on that floor are all on one controller and should be load balanced evenly across multiple controllers.
C. The access points for that floor are salt and peppered across multiple controllers and should be moved to the primary controller.
D. The wireless phones are operating in the 2.4 GHz band and should be configured for the 5 GHz band.
Answer: B
A network engineer is debugging issues with the mDNS gateway. Which type of reply should be seen in the Wireshark capture when querying for a mDNS service in the Bonjour Cache?
A. unicast from Prime Infrastructure
B. unicast from controller
C. multicast from devices
D. multicast from controller
E. unicast from devices
F. multicast from Prime Infrastructure
Answer: B
Wednesday, 29 March 2017
Cisco 300-365 Question Answer
A customer requires wireless traffic from the branch to be routed through the firewall at corporate headquarters. There is a RADIUS server in each branch location. Which FlexConnect state should be used in this scenario?
A. local authentication and local switching
B. local authentication and central switching
C. central authentication and central switching
D. central authentication and local switching
Answer: C
A. local authentication and local switching
B. local authentication and central switching
C. central authentication and central switching
D. central authentication and local switching
Answer: C
Subscribe to:
Comments (Atom)