• Cisco 300-101 Route, 300-115 Switch and 300-075 CIPTV2 exam dumps have been updated on Apr.13, 2018.
  • New feedback from our customer, passed 200-150 DCICN exam with your dumps, thanks.
  • New Cisco 500-301 CCS, 700-265 and 500-551 exam dumps are available.
05 7月

300-375 WISECURE Securing Wireless Enterprise Networks

Securing Wireless Enterprise Networks is the full name of 300-375 WISECURE test. There are 60-70 questions in real Cisco 300-375 WISECURE exam, which will take the candidates 90 minutes to complete the test. The Associated Certification is CCNP Wireless. The available language is English. Candidates can register Cisco 300-375 WISECURE exam at Pearson VUE testing center.

It is also important for the candidates to know Cisco 300-375 WISECURE exam topics.

1.0 Integrate Client Device Security 19%

1.1. Describe Extensible Authentication Protocol (EAP) authentication process
1.2. Configure client for secure EAP authentication
1.2.a. Native OS (iOS, Android, Windows, MAC OS, year 2013+) or AnyConnect client
1.3. Describe the impact of security configurations on application and client roaming
1.3.a. Key caching
1.3.b. 802.11r
1.4. Implement 802.11w Protected Management Frame (PMF) on the WLAN
1.4.a. Client support
1.4.b. PMF modes
1.4.c. Relevant timer settings
1.5. Implement Cisco Management Frame Protection (MFP)
1.5.a. Cisco Compatible Extensions (CCX)
1.5.b. Infrastructure mode
1.5.c. Client and infrastructure mode
1.6. Describe and configure client profiling
1.6.a. ISE
1.6.b. WLC

2.0 Implement Secure Distribution System Connectivity Services on the Wireless Infrastructure 24%

2.1. Describe the impact of BYOD on wireless security
2.1.a Additional security risks
2.1.b Loss of device control
2.1.c Increased complexity of policy enforcement
2.2. Implement BYOD policies
2.2.a. Single vs dual SSID
2.2.b.Self registration
2.2.c. mDNS sharing
2.2.d.Wi-Fi Direct
2.3. Implement AAA based Layer 3 security on the controller
2.3.a. Local Web Auth (LWA)
2.3.a.[i] External authentication)
2.3.a.[ii] Locally significant certificates
2.3.a.[iii] Pre-authentication ACL
2.3.a.[iv] Pass through configuration
2.4. Describe regulatory compliance considerations for protecting data and access and providing accountability
2.4.a. PCI
2.5. Utilize security audit tools for Distribution Systems
2.5.a. PI reports
2.5.b. PCI audit

3.0 Implement Secure Client Connectivity Services on the Wireless Infrastructure 27%

3.1. Implement 802.1x wireless client authentication
3.1.a. AireOS
3.1.a.[i] Local
3.1.a.[ii] Central
3.1.b. IOS-XE
3.1.c. Autonomous
3.1.c.[i] Local authentication
3.1.c.[ii] Remote authentication
3.1.d. FlexConnect
3.1.d.[i] Local authentication
3.1.d.[ii] Remote authentication
3.2. Implement Identity Based Networking (IBN)
3.2.a. AireOS
3.2.a.[i] VLANs
3.2.a.[ii] QoS
3.2.a.[iii] ACLs
3.2.b. IOS-XE
3.2.b.[i] VLANs
3.2.b.[ii] QoS
3.2.b.[iii] ACLs
3.2.c. Autonomous
3.2.c.[i] VLAN
3.2.d. FlexConnect
3.2.d.[i] VLAN
3.2.d.[ii] ACLs
3.2.d.[iii] QoS
3.3. Implement ISE AAA parameters for integration with the wireless network
3.3.a. Network device
3.3.b. IBN profile
3.4. Implement AAA based Layer 3 security using ISE
3.4.a. Utilizing ISE as AAA service
3.4.a.[i] Locally significant certificates on ISE
3.4.a.[ii] Using captive portal capabilities for guest access
3.4.b. Central Web Auth (CWA
3.4.b.[i] Returned values and overrides
3.4.b.[ii] Access accept
3.4.b.[iii] AAA override statement
3.5. Configure MSE based web authentication
3.6. Utilize security audit tools for client connectivity
3.6.a. PI reports
3.6.b. PCI audit

4.0 Implement Secure Management Access on the WLAN Infrastructure 14%

4.1. Controlling administrative access to the wireless infrastructure
4.1.a. RADIUS
4.1.b. TACACS
4.1.c. Controller and ISE integration
4.1.d. Access point administration credentials
4.2. Configure APs and switches for 802.1x access to the wired infrastructure
4.2.a. Controller based
4.2.b. Autonomous
4.3. Implement SNMPv3 on the wireless infrastructure
4.3.a. AireOS
4.3.b. IOS-XE
4.3.c. Autonomous

5.0 Monitoring Security on the WLAN Infrastructure 16%

5.1. Execute Security reports on PI
5.2. Perform Rogue Management
5.2.a. Rogue Containment on WLC and PI
5.2.b. RLDP on WLC and PI
5.2.c. SwitchPort tracing on PI
5.2.d. Location on PI
5.2.e. Rogue Rules on WLC and PI
5.3. Monitor rogue APs and clients
5.3.a. PI Maps
5.3.b. Controller
5.4. Monitor Alarms
5.4.a. 2 items
5.4.b. PI Security Tab
5.4.c. Controller Trap Logs
5.5. Identify RF related Security interferers on WLC and PI Maps
5.5.a. Jammers
5.5.b. Inverted Wi-Fi
5.5.c. Wi-Fi invalid channel
5.6. Implement wIPS
5.6.a. Enhanced Local Mode (ELM)

05 7月

300-375 WISECURE Online Test-Securing Wireless Enterprise Networks

Currently, our 300-375 WISECURE online test only provide 10 questions. Answer one question correctly, you can get 10 points. The content of these questions are the latest exam content. Please feel free to test your skill level.

If you have some opinions or suggestions about our online test, please leave your message, we will improve it step by step.

Now, begin to test:

1. A customer is concerned that radar is impacting the access point that service the wireless network in an office located near an airport. On which type of channel should you conduct spectrum analysis to identify if radar is impacting the wireless network?


2. A customer is concerned about DOS attacks from a neighboring facility. Which feature can be enabled to help alleviate these concerns and mitigate DOS attacks on a WLAN?


3. A network engineer is implementing a wireless network and is considering deploying a single SSID for device onboarding. Winch option is a benefit of using dual SSIDs with a captive portal on the onboard SSID compared to a single SSID solution?


4. Which mobility mode must a Cisco 5508 wireless Controller be in to use the MA functionality on a cisco catalyst 3850 series switch with a cisco 550 Wireless Controller as an MC?


5. MFP is enabled globally on a WLAN with default settings on single controller wireless network. Older client devices are disconnected from the network during a deauthentication attack. What is the cause of this issue?


6. An engineer is configuring client MFP. What WLAN Layer 2 security must be selected to use client MFP?


7. Access points at branch sites for a company are in FlexConncct mode and perform local switching, but they authenticate to the central RADIUS at headquarters. VPN connections to the headquarters have gone down, but each branch site has a local authentication server. Which three features on the wireless controller can be configured to maintain network operations if this situation reoccurs? (Choose three.)


8. When you configure BYOD access to the network, you face increased security risks and challenges. Which challenge is resolved by deploying digital client certificates?


9. An engineer must provide a graphical trending report of the total number of wireless clients on the network. Winch report provides the required data?


10. When a wireless client uses WPA2 AES, which keys are created at the end of the four way handshake process between the client and the access point?


Question 1 of 10



Recent Posts


300-101 ROUTE and/or Remove an End-Device and/or Remove an Infrastructure Device and/or Remove Cables (network and/or power) Cisco Security Devices GUIs and Secured CLI Management Configure Cisco Unity Connection Configure Cisco Unity Express using the GUI Describe and implement centralized call processing redundancy Describe Data Center Structure and Modularity Describe the Design Methodology Describe the Technologies used within the Data Center Design Network Management Considerations into a Data Center Design the Access Layer of a Data Center General Networking Knowledge given a Network Design and a set of Requirements High Availability Routing Features Identify Cisco Equipment and Related Hardware Implement high availability features on Cisco Unified Fabric products in a Cisco Data Center Architecture Implement QoS for Wireless Applications Infrastructure Security Infrastructure Services Install IP Services LAN Switching Technologies Layer 2 Technologies Layer 3 Technologies Maintain Appropriate End-Devices and Industrial Network Infrastructure Devices Management Services on Cisco Devices Manage the Unified Fabric in a Cisco Data Center Architecture Monitoring and Reporting Tools Network Principles Replace Service-Related Knowledge Threat Defense Threat Defense Architectures Troubleshoot Call Setup Issues Troubleshooting Troubleshooting DCI issues in a Cisco Data Center network Troubleshooting Platform Specific Issues in a CiscoData Center Network Troubleshooting Storage Area Network in a Cisco Data Center Troubleshoot Registration Issues UCS C-Series Standalone Troubleshooting UCS Compute Troubleshooting VPN Technologies WAN Technologies


Powered by CCNP Exams Test Base