Act now and download your Cisco 300-365 test today! Do not waste time for the worthless Cisco 300-365 tutorials. Download Leading Cisco Deploying Cisco Wireless Enterprise Networks exam with real questions and answers and begin to learn Cisco 300-365 with a classic professional.

2021 Sep 300-365 free practice exam

Q11. A customer recently implemented WLC wireless multicast. Clients and connecting at the highest mandatory wireless rate of 24 Mbps and are receiving multicast traffic, but WLC cpu utilization and wired side network load has increased substantially. What three actions should the engineer take next to optimize the configuration? (Choose Three) 

A. verify that Global Multicast mode has been enabled 

B. verify that IGMP snooping is disabled on the wireless controller since the access points are handing IGMP messages from the clients. 

C. make sure the highest mandatory rate is set to 54 Mbps so that the multicast traffic has sufficient bandwidth 

D. verify Multicast Listener Discovery (MLD) v1 snooping has been enabled to keep track of and deliver IPv4 multicast flows 

E. change the wireless controller from Multicast-Unicastmodeto Multicast-Multicast mode and assign a multicast address in the 239.X.X.X/8 subnet 

F. verify that the L3 interfaces are configured for pirn sparse-dense-mode on the VLAN servicing the wireless access points as well as the wireless controller’s management VLAN 

Answer: A,B,E 


Q12. Which two methods to discover a controller does a MAP attempt when it boots up? (Choose two.) 

A. |f Ethernet and wireless are available, it attempts to discover only via Ethernet. 

B. if Ethernet is disconnected, it attempts to connect wirelessly using AWPP. 

C. if only wireless is available and it is configured as a MAP, it does not attempt to connect to a WLC. 

D. If Ethernet and wireless are available, it uses Ethernet first. If it cannot connect via Ethernet, then it chooses wireless. 

E. |f Ethernet is disconnected, it attempts to connect wirelessly using the configured DHCP option. 

Answer: A,B 


Q13. What devices can be tracked with the Cisco Context Aware Services? 

A. Only wired devices. 

B. Both wired and wireless devices. 

C. Only Cisco certified wireless devices. 

D. Only wireless devices. 

Answer: B 


Q14. You are deploying a combination of Cisco Unified Wireless IP Phones 7921G and 7925G at your branch offices in a centralized call processing environment that requires high availability at branch locations. Which three components need to be verified before the wireless IP phones can be deployed? (Choose three.) 

A. Sufficient SRST license support at each branch location 

B. Support for local voice mail 

C. Branch gateways support MoH 

D. Properly configured QoS over the IP WAN links 

E. Support for single number reach 

F. Support for E.164 dialing 

G. Sufficient IP phone licenses in the Cisco Unified Communications Manager cluster 

Answer: A,D,G 


Q15. Which of the following is not a Cisco RF fingerprinting key advantage over Location Tracking? 

A. Uses existing LWAPP-enabled Cisco Unified Networking components. 

B. Proprietary client hardware or software is required. 

C. Better accuracy and precision. 

D. Reduced calibration effort. 

Answer: B 


300-365  study guide

Update 300-365 book:

Q16. A network engineer is viewing the QBSS information in a packet sniff. Which two QBSS characteristics are crucial for successful troubleshooting? (Choose two.) 

A. When only WMM is enabled, information element number 1 QBSS Load information element is sent out in the beacons and probe responses. 

B. When only WMM is enabled, information element number 3 QBSS Load information element is sent out in the beacons and probe responses. 

C. When the client CAC limit is supported, information element number 2 is sent out in the beacons and probe responses on the bg radios. 

D. When the client CAC limit is supported, information element number 1 is sent out in the beacons and probe responses on the bg radios. 

E. When only WMM is enabled, information element number 2 QBSS Load information element is sent out in the beacons and probe responses. 

Answer: D,E 


Q17. CORRECT TEXT 

Scenario 

One of your colleagues has setup a test network in the lab to simulate a new building atone of your regional offices. Your team is testing AP failover. Your colleague has requested you to configure the WLCs so that in the event of a loss of one of the WLCsthe other wings APs will fail over to the remaining WLC. 

The APs on the East-WLC-2504A should fail over to the West-WLC2-2504A, and the APs on the West-WLC2-2504A should fail over to the East-WLC-2504A. 

Set the priority of the APs so the backup controller recognizes the join request from the higher-priority AP and if necessary disassociates a lower-priority AP to provide access to an available port. 

Not all menus, tabs and features are supported. 

Topology 

Answer: 


Q18. Which two options are limitations of using an AP as a workgroup bridge? (Choose two.) 

A. Only factory-configured MAPs can support WGB mode. 

B. MAPs that are configured in WGB mode do not answer S36 radio measurement requests. 

C. A limited subset of Layer 2 security types are supported for wireless clients of a WGB. 

D. There is a limit of 20 wired client devices. 

E. Multiple VLANs are not supported for wireless clients. 

Answer: B,D 


Q19. After implementing mDNS gateway, a school's network administrator notices that mDNS wireless printers are available over the whole network. Which feature can the admin use to restrict the printer mDNS advertisements to the AP that the printer is joined to and adjacent APs? 

A. mDNS-AP 

B. SSO 

C. LSS 

D. Priority MAC 

Answer: A 


Q20. Controllers WLC_1 and WLC_2 are in the same mobility group. A wireless client that does not have the same VLAN interface roams from WLC_1 to WLC_2. What happens to the client roaming? 

A. The client context is deleted in controller WLC_1, and a new client context is created in WLC_2 to become the anchor controller 

B. The client context is moved from controller WLC_1 to controller WLC_2. The result is that the WLC_1 client context is deleted and WLC_2 becomes the anchor controller. 

C. The client context is copied from controller WLC_1 to controller WLC_2. The result is that WLC_1 becomes the foreign controller and WLC_2 becomes the anchor controller. 

D. The client context is copied from controller WLC_1 to controller WLC_2. The result is that WLC_1 becomes the anchor controller and WLC_2 becomes the foreign controller. 

Answer: D