A. Adding a wired AAA profile to a VLAN on the untrusted port
B. Roles are assigned to devices connected to a trusted port
C. An initial Role can be assigned directly to the VLAN
D. A default Role can be directly assigned to an untrusted port
E. The Role assigned to the untrusted port
A. Use aliases when possible
B. Take actions like blacklisting when users violate policies
C. Create different policies for access to different servers
D. Write rules from least specific to most specific
E. Create a different policy for each unique rule
A. The guest-provisioning account can see the controller's configuration but cannot change it
B. The root account can be used to monitor access points connected to the controller
C. The network-operations account cannot access configuration
D. The guest-provisioning account can make changes to the internal AP database
E. The read-only account cannot delete internal database entries
A. Controller country code
B. Time zone
C. WLANs
D. VLANs and IP addressing
E. Licenses
A. Identify the native VLAN for a port
B. Configure port channels
C. Assign VLANs
D. Identify trunk ports
E. Specify the IP address of the Vlan
A. 172.16.0.1
B. 10.1.1.1
C. 10.1.10.100
D. 172.16.0.254
E. 192.168.1.1
A. PSK
B. IPSEC
C. WEP Keys
D. 802.1X
E. Captive Portal
A. encryption
B. DHCP option value
C. BSSID
D. MAC address
E. Filter ID
A. user login name
B. location by AP Name
C. controller Loopback address
D. controller IP
E. authentication server