we provide Highest Quality Cisco 300-365 actual exam which are the best for clearing 300-365 test, and to get certified by Cisco Deploying Cisco Wireless Enterprise Networks. The 300-365 Questions & Answers covers all the knowledge points of the real 300-365 exam. Crack your Cisco 300-365 Exam with latest dumps, guaranteed!
2017 NEW RECOMMEND
Free VCE & PDF File for Cisco 300-365 Real Exam
Pass on Your First TRY 100% Money Back Guarantee Realistic Practice Exam Questions
Q11. RAG DROP
Drag the QoS values from the left and drop them in the correct descending order of priority on the right.
Q12. A WLAN engineer has been asked to upgrade the software on a MSE 3365 Appliance. The engineer cannot access the system using the root password and the Grub password as the details had never been documented. How should the engineer perform the password recovery?
A. Use a console cable.
B. Contact Cisco TAC and arrange an RMA of the MSE.
C. Boot the MSE using the software installation DVD.
D. The Password can be reset using Prime Infrastructure.
Q13. By default, how long does a Mobility Services Engine wait for an echo response from a Wireless LAN Controller before declaring the neighbor dead?
A. 10 Seconds
B. 60 Seconds
C. 15 Seconds
D. 30 Seconds
Q14. A wireless engineer at a convention center has been asked to provision an SSID that can accommodate 4,000 users during a conference. Which interface group configuration should be used?
A. One interface with /20 mask
B. Two interfaces with /21 mask
C. Four interfaces with /22 mask
D. Eight interfaces with /23 mask
Q15. A wireless engineer wants to enable optimized roaming for their 5GHz wireless network with these settings: -72dBm RSSI value, 25% coverage exception level percentage, and a minimum of 50 packets received.
Which two commands achieve these settings? (Choose two.)
A. config advanced 802.11a coverage data fail-percentage 25
B. config advanced 802.11b optimized-roaming enable
C. config advanced 802.11b coverage data rssi-threshold -72
D. config advanced 802.11a optimized-roaming enable
E. config advanced 802.11a coverage data rssi-threshold -72
Q16. A network engineer has installed 802.11ac access points with 80 MHz enabled; however, in the conference rooms, co-channel interference is being noticed. Under which tab in the RF profiles configuration can the engineer find the settings to tune the channel width for a group of APs?
C. High Density
Q17. A network engineer is debugging issues with the mDNS gateway. Which type of reply should be seen in the Wireshark capture when querying for a mDNS service in the Bonjour Cache?
A. unicast from Prime Infrastructure
B. unicast from controller
C. multicast from devices
D. multicast from controller
E. unicast from devices
F. multicast from Prime Infrastructure
Q18. What devices can be tracked with the Cisco Context Aware Services?
A. Only wired devices.
B. Both wired and wireless devices.
C. Only Cisco certified wireless devices.
D. Only wireless devices.
Q19. You are deploying a combination of Cisco Unified Wireless IP Phones 7921G and 7925G at your branch offices in a centralized call processing environment that requires high availability at branch locations. Which three components need to be verified before the wireless IP phones can be deployed? (Choose three.)
A. Sufficient SRST license support at each branch location
B. Support for local voice mail
C. Branch gateways support MoH
D. Properly configured QoS over the IP WAN links
E. Support for single number reach
F. Support for E.164 dialing
G. Sufficient IP phone licenses in the Cisco Unified Communications Manager cluster
Q20. Controllers WLC_1 and WLC_2 are in the same mobility group. A wireless client that does not have the same VLAN interface roams from WLC_1 to WLC_2. What happens to the client roaming?
A. The client context is deleted in controller WLC_1, and a new client context is created in WLC_2 to become the anchor controller
B. The client context is moved from controller WLC_1 to controller WLC_2. The result is that the WLC_1 client context is deleted and WLC_2 becomes the anchor controller.
C. The client context is copied from controller WLC_1 to controller WLC_2. The result is that WLC_1 becomes the foreign controller and WLC_2 becomes the anchor controller.
D. The client context is copied from controller WLC_1 to controller WLC_2. The result is that WLC_1 becomes the anchor controller and WLC_2 becomes the foreign controller.