Which step must you take when configuring rogue AP detection?
Answer : A
Rogue AP Detection:
Rogue AP detection is crucial for maintaining network security by identifying unauthorized access points.
Configuration Step:
Enable Rogue AP Detection:
The first and necessary step in configuring rogue AP detection is enabling the feature in the Mist system.
Other Steps:
Setting proximity zones, disabling honeypot detection, and setting the RRM interval are additional configurations but not the initial or mandatory step.
Conclusion:
The correct answer is A.
Mist Documentation on Rogue AP Detection: Mist Documentation
Which statement is correct about Wi-Fi location-based services (LBS)?
Answer : B
Wi-Fi Location-Based Services (LBS) provided by Mist require the User Engagement subscription.
This subscription includes features that enhance user interactions and engagement, such as location services, which are critical for delivering personalized and location-aware experiences.
By leveraging Wi-Fi LBS with the User Engagement subscription, organizations can offer advanced services like wayfinding, asset tracking, and location analytics.
Reference: Juniper Networks documentation on subscriptions required for Wi-Fi LBS and User Engagement services.
Which Radio Resource Management (RRM) changes are only made once a day between 2:00 AM and 3:00 AM local time?
Answer : A
Identify the Changes: Radio Resource Management (RRM) changes and their timings.
RRM Changes:
Channel and power settings based on long-term statistics.
RF template changes to channel width.
Changes triggered by SSID scheduling.
Changes triggered by DFS events.
Timing of Changes:
Long-term RRM changes to channel and power settings are typically scheduled once a day to avoid disrupting network performance.
Conclusion:
Channel and power settings across a site based on long-term statistics and baselines are made once a day between 2:00 AM and 3:00 AM local time.
Mist Documentation on RRM: Mist Documentation
You are troubleshooting a wireless client's issue and you suspect It Is related to DHCP latency. In this scenario, which SLE should you review in the Mist Ul?
Answer : B
Identify the Problem: Suspected issue related to DHCP latency while troubleshooting a wireless client.
Understanding SLEs:
Capacity: Related to the number of clients and bandwidth.
Time to Connect: Measures the time taken for clients to connect, including DHCP latency.
Throughput: Measures the data transfer rate.
Coverage: Measures the signal strength and coverage area.
Selecting the Appropriate SLE:
Time to Connect is the relevant SLE as it includes metrics on DHCP latency, which affects the connection time.
Review the SLE:
Analyze the Time to Connect SLE to identify any latency issues with DHCP.
Mist Documentation on SLEs: Mist Documentation
..scheduled downtime lo push the latest firmware to all the APs you deployed at the site. You verified that all of the APs are working fine. When you go back to work, you notice no complaints from the users. When you check AP page, you notice that several APs have not rolled out with the latest firmware.
his scenario, how does Marvis categorize this Issue in the Marvis Action dashboard?
Answer : A
When several APs fail to update to the latest firmware during a scheduled downtime, Marvis categorizes this issue as a 'non-compliant' action.
This categorization indicates that some APs are not adhering to the intended firmware version policy, which could potentially affect network performance or security.
The non-compliant Marvis Action provides administrators with the necessary information to identify and rectify the issue, ensuring all APs are updated as required.
Reference: Juniper Networks documentation on Marvis Actions and firmware compliance.
What is the maximum number of nodes supported in a Mist Edge high availability cluster?
Answer : A
The maximum number of nodes supported in a Mist Edge high availability cluster is three.
This configuration ensures high availability and redundancy, providing resilience and reliability for network operations.
By having three nodes, the cluster can continue to operate effectively even if one node fails, ensuring minimal disruption.
Reference: Juniper Networks documentation on Mist Edge high availability cluster configurations.
AP is connected lo your wired network but Is not claimed to your organization. Which type of AP would be a possible security threat in this scenario?
Answer : B
Types of APs and Security Threats:
Understanding different types of access points and their potential security threats.
Access Point Types:
Neighbor AP: An access point that belongs to a neighboring network and is not necessarily a security threat.
Rogue AP: An unauthorized access point connected to the wired network, posing a significant security threat.
Spoofed AP: An access point that mimics a legitimate one, but typically does not involve being connected to the network.
Honeypot AP: An access point set up to lure attackers, not necessarily a threat unless used maliciously.
Identifying the Threat:
An AP connected to your wired network but not claimed to your organization is considered a rogue AP and poses a security threat.
Conclusion:
The correct answer is B.
Mist Documentation on Access Point Security: Mist Documentation