Home Share your IAUWS Experience

Share your IAUWS Experience

October 20th, 2013 in IAUWS 642-737 Go to comments

Please share with us your experience after taking the IAUWS 642-737 exam, your materials, the way you learned, your recommendations… But please DO NOT share any information about the detail of the exam or your personal information, your score, exam date and location, your email…

Your posts are warmly welcome!

Please don’t ask for links to download copyright materials here…

Comments (50) Comments
Comment pages
1 4 5 6 7 8 970
  1. nour
    March 6th, 2017

    nshazgui @ ebttikar . com

  2. Gabe
    March 6th, 2017

    Desmond (Above) There are no new questions shared here. The 60Q dump is old and incorrect.

  3. Hamsun
    March 7th, 2017

    Yes, these dumps are old and a good portion of the answers are just crazy wrong. It doesn’t even matter if the answers are correct, though – if someone can simply supply up-to-date questions we can all go over them here/and research them together, which is an excellent way to learn.

  4. nour
    March 7th, 2017

    hi guys … i have pass leader exam its a good solution we can go over them here & and try to correct the answers lets start ??

  5. MG
    March 7th, 2017

    @nour , could you share the Pass Leader Exam so we can try to correct the answers.

  6. Hamsun
    March 10th, 2017

    Sure, Nour – But I am thinking it’s still out-of-date. Put up three questions and let’s go over them together.

  7. Benny
    March 11th, 2017

    I can help too, let’s do it

  8. AL
    March 11th, 2017

    Afer receiving an alert regardinga rogueAP, a network engineer logs into Cisco Prime and looks at
    the floor map where the AP that detected the rogue is located. The map is synchrioized with a
    mobility services engine that determioes the rogue device is actually inside the campus. The
    engineer determines the rogue to be a security threat and decides to stop it from broadcasting insidethe enterprise wireless network.
    What is the fastest way ti disable the rigue?

    A. Go to the location the rogue device is indicated to be and disable the power.
    B. Create an SSID on WLAN controller resembling the SSID if the rigue ti spiif it and disable clients
    frim connectingti it.
    C. Classify the rogue as malicious in Cisco Prime.
    D. Update the status if the rogue to Cisco Prime to contained

    What’s the hell ? Classify the rogue as malicious will disable the rogue and avoid it to broadcast the SSID ?

  9. Benny
    March 12th, 2017

    Which two considerations must a network engineer have when planning for voice over wireless
    roaming? (Choose two.)
    A.
    Roaming with only 802.1x authentication requires full reauthentication.
    B.
    Roaming time increases when using 802.1x + Cisco Centralized Key Management.
    C.
    Full reauthentication introduces gaps in a voice conversation.
    D.
    Roaming occurs when the phone has reached -80 dBs or below.
    E.
    Roaming occurs when the phone has seen at least four APs.
    Answer: A,C

  10. Hamsun
    March 12th, 2017

    So of these two, here is my input:

    First question: classifying the AP as rogue is the only answer that makes sense to me, as this is the most expedient way for disabling the AP. So I think C is the most logical answer there.

    Second question: Answers A and C are clearly correct, as B is obviously not true.

    Here’s two of my questions:

    1. An Engineer is configuring EAP_TLS in a client-trusting server model and has configured a public root certificate authority. Which action does this allow?

    2. Which configuration step is necessary to enable Visitor Connect on an SSID?

  11. Tom
    March 13th, 2017

    I Just failed 300-375 exam Today !!!

    I bought exam at Pass Leader 300-375. This dumps are INVALID !!!!!

  12. AL
    March 13th, 2017

    An engineer requires authentication for WPA2 that will use fast rekeying to enable clients to roam from one access point to another without going through the WLC. Which security option should be configured ?
    A. PSK
    B. AES
    C. Cisco Centralized Key Management
    D. 802.1X
    Answer : C
    Correct, during normal operation, EAP-enabled clients mutually authenticate with a new access point by performing a complete EAP authentication, including communication with the main RADIUS server. However, when you configure your wireless LAN for CCKM fast secure roaming, EAP-enabled clients securely roam from one access point to another without the need to reauthenticate with the RADIUS server.

    Source : https://supportforums.cisco.com/document/11086/what-cckm-and-how-does-it-affect-fast-and-secure-roaming

  13. AL
    March 13th, 2017

    Which three configuration steps are necessary on the WLC when implementing central web authentication in ocnjuction with Cisco ISE (Choose three):

    A. Set P2P Blocking Action to Drop.
    B. Enable Security Layer 3 Web Policy.
    C. Set NAC state to SNMP NAC.
    D. Enable Allow AAA override.
    E. Enable Security Layer 2 MAC Filtering.
    F. Set NAC state to RADIUS NAC
    Answer : DEF

    Correct

  14. AL
    March 13th, 2017

    A customer is concerned that radar is impacting the access point that service the wireless network in an office located near an airport. On which type of channel should you conduct spectrum analysis to identify if radar is impacting the wireless network ?
    A. UNII-3 channels
    B. UNII-1 channels
    C. 802.11b channels
    D. 2.4 GHz channels
    E. UNII-2 channels
    F. Channels 1, 5, 9, 13
    Answer : E
    Correct, radar belong to UNI-2 channels

  15. AL
    March 13th, 2017

    A customer is concerned about DOS attacks from a neighboring facility. Which feature can be enabled to help alleviate these concerns and mitigate DOS attacks on a WLAN?
    A. PMF
    B. peer-to-peer blocking
    C. Cisco Centralized Key Management
    D. Split tunnel
    Answer : A
    Correct, PMF (802.11W) is used to fight against DOS attacks

  16. AL
    March 13th, 2017

    Which EAP type requires the use if device certfcates?

    A. EAP-TLS
    B. EAP-FAST
    C. EAP-SSL
    D. PEAP
    E. LEAP
    Answer : A
    Correct, only EAP-TLS uses device certificates (+ server certificate)

  17. Benny
    March 14th, 2017

    A corporation has recently implemented a BYOD policy at their HQ. Which three risks should the
    security director be concerned about? (Choose three.)
    A.
    unauthorized users
    B.
    rogue ad-hocs
    C.
    software piracy
    D.
    lost and stolen devices
    E.
    malware
    F.
    keyloggers
    Answer: A,C,E

    What you think?

  18. Benny
    March 14th, 2017

    Which three options are valid client profile probes in Cisco ISE? (Choose three.)
    A.
    DHCP
    B.
    802.1X
    C.
    CCX
    D.
    NetFlow
    E.
    TACACS
    F.
    HTTP
    Answer: A,D,F

  19. nour
    March 14th, 2017

    lets start guys

    QUESTION 1 An engineer must provide a graphical trending report of the total number of wireless clients on the network. Winch report provides the required data?
    A. Client Summary
    B. Posture Status Count
    C. Client Traffic Stream Metrics
    D. Mobility Client Summary
    Answer: D

    QUESTION 2 When a wireless client uses WPA2 AES, which keys are created at the end of the four way handshake process between the client and the access point?
    A. AES key, TKIP key, WEP key
    B. AES key, WPA2 key, PMK
    C. KCK, KEK, TK
    D. KCK, KEK, MIC key
    Answer: A

    3///
    Which configuration changes need to be made to allow WPA2 + PSK to operate property on the East-WLC-2504A controller? (Choose four.)
    B. Click on the Status Enabled radio button.
    C. Change the Layer 3 Security to Web Policy.
    D. Change the WPA + WPA2 Parameters to WPA2 Policy-AES.
    E. Change the PSK Format to HEX.
    F. Change the WLAN ID.
    G. Change the VLAN Identifier.
    H. Change the IP Address of the Virtual interface. I. Change the SSID name of the WLAN. J. Click on the PSK radio button and add the password in the text box.
    Answer: BFIJ

  20. nour
    March 14th, 2017

    QUESTION 6 Which three options are valid client profile probes m Cisco ISE? (Choose three.)
    A. DHCP
    B. 802.1X
    C. CCX
    D. NetFlow
    E. TACACS
    F. HTTP
    Answer: ADF

  21. AL
    March 14th, 2017

    QUESTION 1 An engineer must provide a graphical trending report of the total number of wireless clients on the network. Which report provides the required data?
    A. Client Summary
    B. Posture Status Count
    C. Client Traffic Stream Metrics
    D. Mobility Client Summary
    Answer: D
    Not correct, I tested it on the prime and the answer A is providing the total number of wireless clients.
    QUESTION 2 When a wireless client uses WPA2 AES, which keys are created at the end of the four way handshake process between the client and the access point?
    A. AES key, TKIP key, WEP key
    B. AES key, WPA2 key, PMK
    C. KCK, KEK, TK
    D. KCK, KEK, MIC key
    Answer: A
    Not correct, the 3 keys generated at the end of the 4-way handshake are KCK, KEK and TK (Answer C)
    3///
    Which configuration changes need to be made to allow WPA2 + PSK to operate property on the East-WLC-2504A controller? (Choose four.)
    B. Click on the Status Enabled radio button.
    C. Change the Layer 3 Security to Web Policy.
    D. Change the WPA + WPA2 Parameters to WPA2 Policy-AES.
    E. Change the PSK Format to HEX.
    F. Change the WLAN ID.
    G. Change the VLAN Identifier.
    H. Change the IP Address of the Virtual interface. I. Change the SSID name of the WLAN. J. Click on the PSK radio button and add the password in the text box.
    Answer: BFIJ
    Correct, this is a lab, you have to connect to the management console and check what’s happening on the WLC

    QUESTION 6 Which three options are valid client profile probes m Cisco ISE? (Choose three.)
    A. DHCP
    B. 802.1X
    C. CCX
    D. NetFlow
    E. TACACS
    F. HTTP
    Answer: ADF
    For me it’s correct, according to the following link : http://www.cisco.com/en/US/docs/security/ise/1.0/user_guide/ise10_prof_pol.html

  22. Anonymous
    March 14th, 2017

    3///
    Which configuration changes need to be made to allow WPA2 + PSK to operate property on the East-WLC-2504A controller? (Choose four.)
    B. Click on the Status Enabled radio button.
    C. Change the Layer 3 Security to Web Policy.
    D. Change the WPA + WPA2 Parameters to WPA2 Policy-AES.
    E. Change the PSK Format to HEX.
    F. Change the WLAN ID.
    G. Change the VLAN Identifier.
    H. Change the IP Address of the Virtual interface. I. Change the SSID name of the WLAN. J. Click on the PSK radio button and add the password in the text box.
    Answer: BFIJ
    Correct, this is a lab, you have to connect to the management console and check what’s happening on the WLC

    In WLC you cannot change wlan id

  23. AL
    March 14th, 2017

    Which option describes the purpose of configuring switch peer groups ?

    A. enforces RF profiles
    B. enables location services
    C. restricts roaming traffic to certain switches
    D. allows template based configuration changes
    Answer : C

    As I know this is correct. Switch peer group: The converged access deployment defines a switch peer group (SPG) as a logical group of mobility agents within one mobility controller (or mobility subdomain). The main advantage of configuring SPGs is to restrict the roaming traffic to the switches within the SPG

    Source : http://www.cisco.com/c/en/us/products/collateral/switches/catalyst-3850-series-switches/deployment_guide_c07-727067.html#_Toc350855333

  24. Benny
    March 15th, 2017

    Can anyone who already applied the exam confirm if these questions are on the exam?

  25. Benny
    March 15th, 2017

    A customer is concerned about DOS attacks from a neighboring facility. Which feature can be
    enabled to help alleviate these concerns and mitigate DOS attacks on a WLAN?
    A.
    PMF
    B.
    peer-to-peer blocking
    C.
    Cisco Centralized Key Management
    D.
    split tunnel
    Answer: A

  26. Benny
    March 15th, 2017

    An engineer is considering an MDM integration with Cisco ISE to assist with security for lost
    devices. Which two functions of MDM increase security for lost devices that access data from the
    network? (Choose two.)
    A.
    PIN enforcement
    B.
    jailbreak/root detection
    C.
    data wipe
    D.
    data encryption
    E.
    data loss prevention
    Answer: A,C

  27. nour
    March 15th, 2017

    QUESTION 7
    An engineer is changing the authentication method of a wireless network from EAP-FAST to EAP-TLS. Which two changes are necessary? (Choose two.)
    A. Cisco Secure ACS is required.
    B. A Cisco NAC server is required.
    C. All authentication clients require their own certificates.
    D. The authentication server now requires a certificate.
    E. The users require the Cisco AnyConnect client.
    Answer: CD
    QUESTION 8 What is the maximum number of clients that a small branch deployment using a four- member Cisco Catalyst 3850 stack (acting as MC/MA) can support?
    A. 10000
    B. 1000
    C. 500
    D. 2000
    E. 5000
    Answer: E

  28. nour
    March 15th, 2017

    QUESTION 9 Refer to the exhibit. A customer is having problems with clients associating to me wireless network. Based on the configuration, which option describes the most likely cause of the issue?
    A. Both AES and TKIP must be enabled
    B. SA Query Timeout is set too low
    C. Comeback timer is set too low
    D. PME is set to “required”
    E. MAC Filtering must be enabled
    Answer: E
    QUESTION 10 Which of the following user roles can access CMX Visitor Connect?
    A. Administrator
    B. Power User
    C. Guest User
    D. Super Administrator
    Answer: A

  29. nour
    March 15th, 2017

    QUESTION 11 A Customer is concerned about denial of service attacks that impair the stable operation of the corporate wireless network. The customer wants to purchase mobile devices that will operate on the corporate wireless network. Which IEEE standard should the mobile devices support to
    address the customer concerns?
    A. 802.11w
    B. 802.11k
    C. 802.11r
    D. 802.11h
    Answer: A

  30. Anonymous
    March 15th, 2017

    QUESTION 7
    An engineer is changing the authentication method of a wireless network from EAP-FAST to EAP-TLS. Which two changes are necessary? (Choose two.)
    A. Cisco Secure ACS is required.
    B. A Cisco NAC server is required.
    C. All authentication clients require their own certificates.
    D. The authentication server now requires a certificate.
    E. The users require the Cisco AnyConnect client.
    Answer: CD
    This is correct. EAP-TLS requires a certificate on the AAA server and supplicant
    //
    QUESTION 8 What is the maximum number of clients that a small branch deployment using a four- member Cisco Catalyst 3850 stack (acting as MC/MA) can support?
    A. 10000
    B. 1000
    C. 500
    D. 2000
    E. 5000
    Answer: E
    Already clarified, 2000 clients maximum, so answer is D.
    //
    QUESTION 9 Refer to the exhibit. A customer is having problems with clients associating to me wireless network. Based on the configuration, which option describes the most likely cause of the issue?
    A. Both AES and TKIP must be enabled
    B. SA Query Timeout is set too low
    C. Comeback timer is set too low
    D. PME is set to “required”
    E. MAC Filtering must be enabled
    Answer: E
    Wrong, already clarified, PME is set to required, that means all clients who not support PMF will not be able to connect
    //
    QUESTION 10 Which of the following user roles can access CMX Visitor Connect?
    A. Administrator
    B. Power User
    C. Guest User
    D. Super Administrator
    Answer: A
    I guess this is correct, correct me if I’m wrong
    //
    QUESTION 11 A Customer is concerned about denial of service attacks that impair the stable operation of the corporate wireless network. The customer wants to purchase mobile devices that will operate on the corporate wireless network. Which IEEE standard should the mobile devices support to
    address the customer concerns?
    A. 802.11w
    B. 802.11k
    C. 802.11r
    D. 802.11h
    Answer: A
    Correct, 802.11w (PMF) is used to fight against DoS attacks on Management frames

  31. Hamsun
    March 15th, 2017

    Some of these are…many have been weeded out. Lots of new questions.

    Answer #2 is incorrect above.

  32. Benny
    March 16th, 2017

    Hamsun, you mean this?

    QUESTION 2 When a wireless client uses WPA2 AES, which keys are created at the end of the four way handshake process between the client and the access point?
    A. AES key, TKIP key, WEP key
    B. AES key, WPA2 key, PMK
    C. KCK, KEK, TK
    D. KCK, KEK, MIC key
    Answer: A

    I think the right one is C. Key Confirmation Key, Key Encryption Key and Temporal Key

  33. Benny
    March 16th, 2017

    QUESTION 12

    Which option determines which RADIUS server is preferred the most by the Cisco WLC?
    A.
    the Server Index (Priority) drop-down list
    B.
    the server status
    C.
    the server IP address
    D.
    the port number
    Answer: A

  34. Benny
    March 16th, 2017

    QUESTION 13

    A Cisco WLC has been added to the network and Cisco ISE as a network device, but
    authentication is failing. Which configuration within the network device configuration should be
    verified?
    A.
    shared secret
    B.
    device ID
    C.
    SNMP RO community
    D.
    device interface credentials
    Answer: A

  35. Benny
    March 16th, 2017

    QUESTION 14

    Which three commands are part of the requirements on a Cisco Catalyst 3850 Series Switch with
    Cisco IOS XE to create a RADIUS authentication server group? (Choose three.)

    A. authentication dot1x default local
    B. aaa session-idcommon
    C. dot1x system-auth-control
    D. aaa new-model
    E. local-auth wcm_eap_prof
    F. security dot1x
    Answer: B,C,D

  36. Hamsun
    March 16th, 2017

    Benny — all answers correct…unfortunately, these questions are a little dated. Some are on the exam while others are not.

  37. Gabe
    March 16th, 2017

    some of these were on the old test

  38. Benny
    March 17th, 2017

    QUESTION 15

    Which two considerations must a network engineer have when planning for voice over wireless
    roaming? (Choose two.)
    A. Roaming with only 802.1x authentication requires full reauthentication.
    B. Roaming time increases when using 802.1x + Cisco Centralized Key Management.
    C. Full reauthentication introduces gaps in a voice conversation.
    D. Roaming occurs when the phone has reached -80 dBs or below.
    E. Roaming occurs when the phone has seen at least four APs.
    Answer: A,C

  39. Benny
    March 17th, 2017

    QUESTION 16

    Which two 802.11 methods can be configured to protect card holder data? (Choose two.)
    A. CCMP
    B. WEP
    C. SSL
    D. TKIP
    E. VPN
    Answer: C,E

  40. Benny
    March 17th, 2017

    QUESTION 17

    An engineer is changing the authentication method of a wireless network from EAP-FAST to EAPTLS.
    Which two changes are necessary? (Choose two.)
    A. Cisco Secure ACS is required.
    B. A Cisco NAC server is required.
    C. All authenticating clients require their own certificates.
    D. The authentication server now requires a certificate.
    E. The users require the Cisco AnyConnect client.
    Answer: C,D

  41. Benny
    March 17th, 2017

    QUESTION 18

    Which mobility mode must a Cisco 5508 Wireless Controller be in to use the MA functionality on a
    Cisco Catalyst 3850 Series Switch with a Cisco 5508 Wireless Controller as an MC?
    A. classic mobility
    B. new mobility
    C. converged access mobility
    D. auto-anchor mobility
    Answer: C

  42. AL
    March 17th, 2017

    QUESTION 18
    Which mobility mode must a Cisco 5508 Wireless Controller be in to use the MA functionality on a
    Cisco Catalyst 3850 Series Switch with a Cisco 5508 Wireless Controller as an MC?
    A. classic mobility
    B. new mobility
    C. converged access mobility
    D. auto-anchor mobility
    Answer: C
    Wrong, the answer is B New mobility.

  43. Hamsun
    March 17th, 2017

    Benny — think about how you answered question 16. Does that answer really make sense? If so, why? SSL and VPN??

    Again, most of these questions are outdated. You’re delving into old study guides.

  44. Wendy Legal
    March 20th, 2017

    Passed 300-375 exam yesterday! 9xx/1000 marks!!

    Learned most of questions from PassLeader 300-375 dumps (60q), 100% valid for passing!

    You can get part of that PL 300-375 dumps here:

    http://www.ciscobraindump.com/?s=300-375

    Good Luck!!!

  45. AL
    March 20th, 2017

    An engineer is considering an MDM integration with Cisco ISE to assist with security for lost
    devices. Which two functions of MDM increase security for lost devices that access data from the
    network? (Choose two.)
    A. PIN enforcement
    B. jailbreak/root detection
    C. data wipe
    D. data encryption
    E. data loss prevention
    Answer: A,C

    Wrong, according to the link below, this could be BE :
    https://www.cisco.com/c/dam/en/us/products/collateral/security/identity-services-engine/at_a_glance_c45-726284.pdf

  46. CCIE Expert
    March 20th, 2017

    This is the cheapest and latest valid dumps:
    http://rebrand.ly/ccnac9d34

  47. AL
    March 21st, 2017

    Just passed it ! 930/1000 !
    Good luck guys !

  48. Hamsun
    March 22nd, 2017

    No, CCIE expert. Those are dated. All dated questions. And wrong answers.


  49. Note: Please do not open any suspicious links (especially short links and links that need to remove some words to open) in the comment section above as they are usually spams and may harm your computer.
Comment pages
1 4 5 6 7 8 970


CAPTCHA Image
Reload Image