100% Correct of 642-737 practice exam materials and testing material for Cisco certification for IT candidates, Real Success Guaranteed with Updated 642-737 pdf dumps vce Materials. 100% PASS Implementing Advanced Cisco Unified Wireless Security (IAUWS) v2.0 exam Today!

2021 Nov 642-737 lab:

Q41. Which statement correctly describes the relationship between the foreign and anchor controllers when used for guest access?

A. The foreign controller will load balance in round-robin fashion starting with the highest IP address anchor controller to the lowest IP address anchor controller.

B. The foreign controller will load balance in round-robin fashion starting with the lowest IP address anchor controller to the highest IP address anchor controller.

C. The foreign controller will load balance in round-robin fashion starting with the highest MAC address anchor controller to the lowest MAC address anchor controller.

D. The foreign controller will load balance in round-robin fashion starting with the lowest MAC address anchor controller to the highest MAC address anchor controller.

Answer: B


Q42. Which four attack categories can the Cisco WLC v7.0 IDS detect using the 17 standard signatures? (Choose four.)

A. broadcast deauthentication attacks

B. Wellenreiter and NetStumbler attacks

C. management frame floods and EAPOL floods

D. fragmentation attacks

E. NULL probe response attacks

F. RF jamming attacks

Answer: ABCE


Q43. Which two tools help to provide PCI compliance reports? (Choose two.)

A. WLC

B. WCS

C. MSE

D. Ekahau Site Survey

E. AirMagnet WiFi Analyzer

Answer: BE


Q44. Which EAP types are supported by MAC 10.7 for authentication to a Cisco Unified Wireless Network?

A. LEAP and EAP-Fast only

B. EAP-TLS and PEAP only

C. LEAP, EAP-TLS, and PEAP only

D. LEAP, EAP-FAST, EAP-TLS, and PEAP

Answer: D


Q45. Which key is used to encrypt unicast traffic between the supplicant and the AP after EAP authentication has completed?

A. PMK

B. GTK

C. PTK

D. OKC

E. PSK

Answer: C


Renewal 642-737 study guide:

Q46. Which four conditions can be used in rules to classify rogue APs on a Cisco WLC v7.0? (Choose four.)

A. managed SSID

B. RSSI

C. EAP type

D. no encryption

E. encryption method

F. duration

Answer: ABDF


Q47. Which option verifies that a wireless client has associated but is not yet authenticated to a WLAN when performing NAC using the Cisco NAC Appliance Manager and Server?

A. Cisco CAM OOB Management > Devices > Discovered Clients

B. Cisco CAS OOB Management > Devices > Discovered Clients

C. Cisco CAM Monitor > View Online Users

D. Cisco CAS Monitor > View Online Users

Answer: A


Q48. Which two attacks represent a social engineering attack? (Choose two.)

A. using AirMagnet Wi-Fi Analyzer to search for hidden SSIDs

B. calling the IT helpdesk and asking for network information

C. spoofing the MAC address of an employee device

D. entering a business and posing as IT support staff

Answer: BD


Q49. When configuring the WLC for NAC out-of-band, which device will be used for SNMP trap receiver IP address entries?

A. Cisco NAC Appliance Manager

B. Cisco NAC Appliance Server

C. Cisco NAC Guest Server

D. Cisco ACS

E. Cisco WCS

Answer: A


Q50. How many tunnels can a Cisco WLC v7.0 anchor?

A. 63

B. 64

C. 71

D. 72

E. 253

F. 254

Answer: C