Spring Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

350-101 Implementing and Operating Cisco Wireless Core Technologies (350-101 WLCOR)v1.0 Questions and Answers

Questions 4

Which process allows continuous IP address retention in a wireless network during roaming?

Options:

A.

static VLAN assignment policy

B.

Layer 3 roaming

C.

deferred probe response technique

D.

redundant RF profile mapping

Buy Now
Questions 5

Which result is produced using a power ratio of 10:1 in standard decibel calculations?

Options:

A.

-20 dB

B.

5 dB

C.

10 dB

D.

15 dB

Buy Now
Questions 6

Exhibit:

350-101 Question 6

Refer to the exhibit. An enterprise is deploying Cisco Catalyst 9800 WLCs and is using Catalyst Center as the management platform to oversee wireless access policies. To meet the organization's compliance requirements, all wireless endpoints must be evaluated with security posture validation before gaining access. Which set of CLI commands must be added to the box in the code to complete the configuration?

Options:

A.

aaa-overridenac-policy

B.

wireless profile policy my-policyaaa-override

C.

aaa-overridenac

D.

wireless profile policyaaa-override

Buy Now
Questions 7

350-101 Question 7

Refer to the exhibit. An engineer is preparing a Cisco 9800-L WLC for deployment in a sensitive area. Only encrypted remote management via SSH is allowed, and all other VTY access methods must be disabled. The 9800-L WLC will be part of a larger deployment, and an external audit will check for any unencrypted management protocols. According to the requirements, only SSH is allowed for remote CLI sessions. Which set of commands must be executed to complete the Cisco IOS XE CLI configuration on the WLC?

Options:

A.

line vty 0 97no transport input telnetlogin authentication default

B.

line vty disable 0 97transport preferred sshlogin authentication defaultexit

C.

line vty 0 97transport input sshlogin authentication defaultexit

D.

line vty 0 97transport sshlogin authentication default

Buy Now
Questions 8

Refer to the exhibit.

import requests

import json

API_ENDPOINT = "https://your-api-server.com/api/v1/devices/wireless"

AUTH_TOKEN = "YOUR_SECRET_API_TOKEN"

headers = {

"Accept": "application/json",

"Authorization": f"Bearer {AUTH_TOKEN}"

}

print("Fetching wireless inventory from the API...")

try:

response = requests.get(API_ENDPOINT, headers=headers, timeout=10)

response.raise_for_status()

wireless_inventory_list = response.json()

print("Successfully retrieved and parsed device data.\n")

print("--- Wireless Device Summary ---")

if isinstance(wireless_inventory_list, list) and wireless_inventory_list:

for device in wireless_inventory_list:

mac = device.get("macAddress", "N/A")

ip = device.get("ipAddress", "N/A")

print(f"Device Found - > MAC: {mac}, IP: {ip}")

else:

print("No wireless devices were found in the inventory.")

except requests.exceptions.RequestException as e:

print(f"Error during API request: {e}")

except json.JSONDecodeError:

print("Error: Failed to parse the response from the API. It is not valid JSON.")

A Cisco engineer is analyzing how a dictionary interacts with key-value pairs in a Python script that processes device records collected from a wireless controller. The engineer reviews the construction of the script to interpret the sequence used for data extraction. Which element performs the interaction within the script?

Options:

A.

pop operation

B.

import function

C.

get() method

D.

format expression

Buy Now
Questions 9

Which feature enables fast secure roaming in a wireless network?

Options:

A.

DCA

B.

802.11r

C.

802.11ax

D.

MIMO

Buy Now
Questions 10

350-101 Question 10

A wireless controller is deployed at a branch location to facilitate secure client connectivity. A network engineer configures one WLAN using WPA2 Personal authentication and activates the preshared key method to align with company security policies. Which action must be taken to enable the client to connect to the WLAN?

Options:

A.

Enter the preshared key at the WLAN security configuration prompt

B.

Enable MAC filtering for security group assignment

C.

Configure Active Directory integration for WLAN authentication

D.

Import a client certificate for WPA2 authentication

Buy Now
Questions 11

An engineer has been tasked with configuring a Cisco Catalyst 9100 AP to join a WLC using a static configuration as DHCP and DNS discovery methods are not available. The engineer has set the AP hostname to ‘AP053540555’, and has configured the AP with a static IP address, subnet mask, and default gateway. The engineer must now configure the AP to discover the primary WLC with hostname ‘WLC-PRIMARY’ and IP address ‘192.168.100.10’. Which CLI command must the engineer use on the AP?

Options:

A.

capwap ap WLC-PRIMARY 192.168.100.10

B.

ap primary-base WLC-PRIMARY capwap 192.168.100.10

C.

capwap ap primary-base 192.168.100.10

D.

capwap ap primary-base WLC-PRIMARY 192.168.100.10

Buy Now
Questions 12

What is a benefit of using AI Enhanced RRM over traditional RRM?

Options:

A.

It includes legacy client modes.

B.

It encrypts stored telemetry results.

C.

It reacts to current the condition of network.

D.

It leverages historical data.

Buy Now
Questions 13

An onsite engineer is working to connect devices to the wireless network using central switching in a corporate environment. Security protocols and network-specific settings must be configured as per enterprise policy. After the initial wireless settings are applied on an iOS tablet, the engineer must ensure that VLAN ID 10 is assigned on the client device to complete a successful enterprise Wi-Fi connection. Which action meets this requirement?

Options:

A.

Disable VLAN tagging on the WLAN and configure the APs switch port as an access port on VLAN 10 to assign the VLAN to the client device.

B.

Manually set VLAN ID 10 on the iOS tablets Wi-Fi settings to ensure VLAN 10 is allowed through the APs switch port.

C.

Configure the policy profile to use VLAN 10, and ensure the WLAN profile is mapped to it.

D.

Configure the AP to assign VLAN ID 1 by default and rely on the switch to redirect traffic to VLAN 10 based on MAC address filtering.

Buy Now
Questions 14

A hotel wants to provide guests with wireless connectivity via a captive portal using a Cisco 9800 WLC. The solution must meet these requirements:

• Ensure that guests are redirected to a custom web page for login and after authentication must have only internet access.

• The guest SSID must not require a password and must be visible to all clients.

• Network segmentation between staff and guests is required at the VLAN level.

What must the IT team configure on the WLAN?

Options:

A.

central web authentication with WPA2-PSK security and a DNS ACL assigned to the WLAN profile

B.

open authentication with a local web server for the guest WLAN

C.

PSK WLAN with VLAN override and enable mDNS for guest users

D.

central web authentication and assign a policy with ACLs restricting access to internal networks

Buy Now
Questions 15

A deployment requires that several APs be connected to edge switches, and each AP must support management and guest Wi-Fi traffic. The APs tag guest traffic separately from management, and the organization expects to add more VLANs for IoT and voice soon, so the configuration must support scalability. The security team requires that guest traffic never mix with internal resources. Which port configuration must be used for the switch interfaces that connect to the APs?

Options:

A.

Configure the central Layer 3 switch port as an access VLAN port that allows the management VLAN only.

B.

Implement switch port access with the native VLAN for guest traffic and trunk with the management VLAN.

C.

Set a trunk port with the management VLAN as the native VLAN, and allow only management and user VLANs.

D.

Make the port an access port on the management VLAN because all traffic is tunneled back to the WLC.

Buy Now
Questions 16

What is used for measuring gain on a Wi-Fi antenna?

Options:

A.

length of the antenna

B.

decibels relative to dBi

C.

voltage against dBm

D.

blend of analog and digital signals

Buy Now
Questions 17

350-101 Question 17

Refer to the exhibit. A network engineer must create a PSK WLAN that will be anchored to the DMZ. After this WLAN is created, users cannot connect to it. Based on the output from the RA trace, which action must the engineer take to resolve the issue?

Options:

A.

Disable fast transition 802.11r on the WLAN.

B.

Configure matching passwords on the client and the WLAN.

C.

Remove the anchor WLC from the mobility group.

D.

Configure matching WLANs on the foreign and the anchor.

Buy Now
Questions 18

An IT team is deploying Meraki APs at a remote branch and must ensure that they are automatically assigned to the correct network in the Meraki dashboard. The branch is scheduled to receive 20 new APs, and site connectivity to headquarters was set up. Before shipping the APs, the team must make sure that each one is claimed by the intended network for management and monitoring. Which deployment action must they take before physically connecting the APs?

Options:

A.

Activate mesh networking mode for all the new APs before installation.

B.

Add the AP serial numbers to the required network within the Meraki dashboard.

C.

Preconfigure SSID names and VLAN tags on the local page of each AP in the Meraki dashboard.

D.

Create a separate DHCP scope for all the new APs on the local server.

Buy Now
Questions 19

How does MIMO operate during wireless transmission?

Options:

A.

It uses multiple radio paths to increase throughput and reliability.

B.

It applies frequency hopping to prevent crosstalk.

C.

It shares a single connection among endpoints for coverage expansion.

D.

It limits data paths to a single antenna for error reduction.

Buy Now
Questions 20

Which Cisco Ultra-Reliable Wireless Backhaul process enables devices to establish a reliable connection with the next AP along their path before losing connectivity to the current one in a wireless network during roaming?

Options:

A.

Open roaming

B.

Fast client handoff

C.

802.11v high speed roaming

D.

Make-before-break handover logic

Buy Now
Questions 21

A wireless administrator must configure detailed and comprehensive monitoring for client devices across branch locations. The team wants to streamline operations for faster response during performance degradation. To support the organization's growth, the administrator needs a centralized reporting platform that displays aggregated data. Which solution must the administrator use to monitor the clients in the network?

Options:

A.

Implement central syslog server.

B.

Use Cisco Catalyst Center Assurance.

C.

Run show logging on WLC CLI.

D.

Use the WLC dashboard.

Buy Now
Questions 22

A university is deploying Cisco Catalyst 9176 APs at several satellite campuses, each with its own subnet and DNS services. The APs will be shipped with only their MAC addresses preregistered on the WLC. The satellite campuses do not use DHCP option 43, but they have access to a central DNS server. IT staff want APs to discover and join the Catalyst 9800 WLC automatically without site visits. Which solution must the IT staff implement?

Options:

A.

Assign static IP addresses to all 9176 APs and configure the controller to be the DNS server.

B.

Set up a multicast group on each different AP subnet to enable automatic controller discovery.

C.

Create DNS entrycisco-capwap-controller.localdomainthat resolves to the WLC management IP address.

D.

Configure a DNS recordap-discoverywith the controller virtual IP address.

Buy Now
Questions 23

A network administrator at a marketing company manages a Cisco Catalyst 9800 Series Wireless Controller running Cisco IOS XE 17.x. The WLAN named XYZ-Guest is set up for visitors, and the administrator wants to implement a web authentication (WebAuth) portal using an external server to manage guest access. To ensure seamless and secure guest authentication, the controller must be configured to use an external WebAuth server for the WLAN. The administrator must configure the XYZ-Guest WLAN to use an external WebAuth server with a parameter map named webauth-ext. Which set of Cisco IOS XE commands must be used?

Options:

A.

wireless wlan XYZ-Guestsecurity web-auth external webauth-ext

B.

wireless wlan XYZ-Guest 2 XYZ-Guestparameter-map webauth-ext

C.

wlan XYZ-Guest 2parameter external security-map webauth-ext

D.

wlan XYZ-Guest 2 XYZ-Guestsecurity web-auth parameter-map webauth-ext

Buy Now
Questions 24

Refer to the exhibit.

350-101 Question 24

A WLC is deployed at a branch location to facilitate secure client connectivity. A network engineer configures one WLAN using WPA2 Personal passphrase and activates ASCII format key to align with company security policies. Which configuration enables client authentication for this WLAN?

Options:

A.

no security wpa akm dot1x

B.

client dhcp-proxy enable

C.

security wpa wpa2 ciphers aes

D.

security wpa akm psk set-key ascii 0

Buy Now
Questions 25

350-101 Question 25

Refer to the exhibit. A wireless controller is deployed at a branch location to facilitate secure client connectivity. A network engineer configures a WLAN using 802.1X to align with company security policies. Which configuration enables client authentication for this WLAN?

Options:

A.

no ip mac-binding

B.

security dot1x authentication-list ISE_GROUP

C.

aaa override enable

D.

wlan branch1 policy branch1_policy

Buy Now
Questions 26

How does the optimized roaming function operate in a WLC implementation?

Options:

A.

It disassociates clients when the RSSI is lower than the set threshold.

B.

It is integrated with external services for client wireless experience.

C.

Device locations are determined through peer-to-peer beacons.

D.

Load balancing is statically defined for all locations.

Buy Now
Questions 27

Which process enables seamless Layer 2 handoff in a wireless network during roaming?

Options:

A.

increased beacon interval setting

B.

optimized roaming

C.

fast BSS transition protocol

D.

deferred probe response technique

Buy Now
Questions 28

A business is deploying Cisco Catalyst 9100 APs managed by Catalyst 9800 WLCs. The IT team needs policies that adapt based on user identity and device posture and also provide visibility into device activity and location. Which configuration meets these requirements?

Options:

A.

Integrate Cisco Catalyst Center with Cisco ISE for policy control, add mobile device management for posture checks, and use Cisco Spaces for location visibility.

B.

Use Cisco Catalyst 9800 ACLs combined with mobile device management integration without Catalyst Center or Catalyst Spaces.

C.

Configure Cisco Catalyst Center assurance for visibility and apply static per-service set identifier virtual LAN assignments without Cisco ISE integration.

D.

Integrate Cisco ISE for identity-based policies and omit mobile device management and location services.

Buy Now
Questions 29

A managed service is rolling out advanced wireless infrastructure to support an expanding organization with diverse device types. The implementation requires integration of dynamic endpoint profiling for secure access and device classification. According to the baseline deployment with ISE policy sets, the engineering group must enforce access parameters based on device category rules. Which configuration action must be taken to fulfill the initiative?

Options:

A.

Create device-type groups.

B.

Configure profiling groups.

C.

Implement user ID groups.

D.

Define endpoint group mapping.

Buy Now
Questions 30

Refer to the exhibit.

350-101 Question 30 The Catalyst 9800 WLC logs show when a client with MAC address 9C:4E:36:8A:2B:F1 fails to connect to a WLAN configured for Wi-Fi Protected Access 3-Enterprise with 802.1X. Which action must the engineer take to resolve the issue?

Options:

A.

Ensure that the AP is using the appropriate credentials.

B.

Change the WLAN to Wi-Fi Protected Access 2-Personal and configure a preshared key.

C.

Verify the client's Active Directory credentials and ensure that the RADIUS server is reachable.

D.

Disable RADIUS NAC on the policy profile assigned to the WLAN.

Buy Now
Exam Code: 350-101
Exam Name: Implementing and Operating Cisco Wireless Core Technologies (350-101 WLCOR)v1.0
Last Update: May 12, 2026
Questions: 102

PDF + Testing Engine

$65.27  $186.49

Testing Engine

$52.32  $149.49
buy now 350-101 testing engine

PDF (Q&A)

$48.12  $137.49
buy now 350-101 pdf