option
Questions
ayuda
daypo
search.php

Ojo Ngono Loh

COMMENTS STATISTICS RECORDS
TAKE THE TEST
Title of test:
Ojo Ngono Loh

Description:
Ah semprul tenin

Creation Date: 2025/12/31

Category: Others

Number of questions: 105

Rating:(0)
Share the Test:
Nuevo ComentarioNuevo Comentario
New Comment
NO RECORDS
Content:

What are two components of the posture requirement when configuring Cisco ISE posture? (Choose two). updates. remediation actions. Client Provisioning portal. conditions. access policy.

What is a method for transporting security group tags throughout the network?. by enabling 802.1AE on every network device. by the Security Group Tag Exchange Protocol. by embedding the security group tag in the IP header. by embedding the security group tag in the 802.1Q header.

Which two ports must be open between Cisco ISE and the client when you configure posture on Cisco ISE? (Choose two). TCP 8443. TCP 8906. TCP 443. TCP 80. TCP 8905.

Which profiling probe collects the user-agent string?. DHCP. AD. HTTP. NMAP.

Which supplicant(s) and server(s) are capable of supporting EAP-CHAINING?. Cisco AnyConnect NAM and Cisco Identity Service Engine. Cisco AnyConnect NAM and Cisco Access Control Server. Cisco Secure Services Client and Cisco Access Control Server. Windows Native Supplicant and Cisco Identity Service Engine.

Which two values are compared by the binary comparison (unction in authentication that is based on Active Directory?. subject alternative name and the common name. MS-CHAPv2 provided machine credentials and credentials stored in Active Directory. user-presented password hash and a hash stored in Active Directory. user-presented certificate and a certificate stored in Active Directory.

Which three default endpoint identity groups does cisco ISE create? (Choose three). Unknown. whitelist. end point. profiled. blacklist.

Drag the Cisco ISE node types from the left onto the appropriate purposes on the right. Administration. Policy Service. Monitoring. pxGrid.

Which Cisco ISE service allows an engineer to check the compliance of endpoints before connecting to the network?. personas. qualys. nexpose. posture.

Which default endpoint identity group does an endpoint that does not match any profile in Cisco ISE become a member of?. Endpoint. unknown. blacklist. white list. profiled.

An ISE administrator must change the inactivity timer for MAB endpoints to terminate the authentication session whenever a switch port that is connected to an IP phone does not detect packets from the device for 30 minutes. Which action must be taken to accomplish this task?. Add the authentication timer reauthenticate server command to the switchport. Add the authentication timer inactivity 3600 command to the switchport. Change the idle-timeout on the Radius server to 3600 seconds for IP Phone endpoints. Configure the session-timeout to be 3600 seconds on Cisco ISE.

An engineer is configuring static SGT classification. Which configuration should be used when authentication is disabled and third-party switches are in use?. VLAN to SGT mapping. IP Address to SGT mapping. L3IF to SGT mapping. Subnet to SGT mapping.

An engineer wants to learn more about Cisco ISE and deployed a new lab with two nodes. Which two persona configurations allow the engineer to successfully test redundancy of a failed node? (Choose two.). Configure one of the Cisco ISE nodes as the Health Check node. Configure both nodes with the PAN and MnT personas only. Configure one of the Cisco ISE nodes as the primary PAN and MnT personas and the other as the secondary. Configure both nodes with the PAN, MnT, and PSN personas. Configure one of the Cisco ISE nodes as the primary PAN and PSN personas and the other as the secondary.

Which Cisco ISE deployment model is recommended for an enterprise that has over 50,000 concurrent active endpoints?. large deployment with fully distributed nodes running all personas. medium deployment with primary and secondary PAN/MnT/pxGrid nodes with shared PSNs. medium deployment with primary and secondary PAN/MnT/pxGrid nodes with dedicated PSNs. small deployment with one primary and one secondary node running all personas.

What is a restriction of a standalone Cisco ISE node deployment?. Only the Policy Service persona can be disabled on the node. The domain name of the node cannot be changed after installation. Personas are enabled by default and cannot be edited on the node. The hostname of the node cannot be changed after installation.

What are the minimum requirements for deploying the Automatic Failover feature on Administration nodes in a distributed Cisco ISE deployment?. a primary and secondary PAN and a health check node for the Secondary PAN. a primary and secondary PAN and no health check nodes. a primary and secondary PAN and a pair of health check nodes. a primary and secondary PAN and a health check node for the Primary PAN.

An administrator is attempting to join a new node to the primary Cisco ISE node, but receives the error message "Node is Unreachable". What is causing this error?. The second node is a PAN node. No administrative certificate is available for the second node. The second node is in standalone mode. No admin privileges are available on the second node.

An administrator is configuring cisco ISE lo authenticate users logging into network devices using TACACS+ The administrator is not seeing any Coà the authentication in the TACACS+ live logs. Which action ensures the users are able to log into the network devices?. Enable the device administration service in the Administration persona. Enable the session services in the administration persona. Enable the service sessions in the PSN persona. Enable the device administration service in the PSN persona.

Refer to the exhibit: Which command is typed within the CU of a switch to view the troubleshooting output?. show authentication sessions mac 000e.84af.59af details. show authentication registrations. show authentication interface gigabitethemet2/0. show authentication sessions method.

What must be configured on the Cisco ISE authentication policy for unknown MAC addresses/identities for successful authentication?. pass. reject. drop. continue.

Which two probes must be enabled for the ARP cache to function in the Cisco ISE profile service so that a user can reliably bind the IP address and MAC addresses of endpoints? (Choose two.). NetFlow. SNMP. HTTP. DHCP. RADIUS.

Which RADIUS attribute is used to dynamically assign the Inactivity active timer for MAB users from the Cisco ISE node?. session timeout. idle timeout. radius-server timeout. termination-action.

What must match between Cisco ISE and the network access device to successfully authenticate endpoints?. SNMP version. shared secret. certificate. profile.

An engineer needs to configure Cisco ISE Profiling Services to authorize network access for IP speakers that require access to the intercom system. This traffic needs to be identified if the ToS bit is set to 5 and the destination IP address is the intercom system. What must be configured to accomplish this goal?. NMAP. NETFLOW. pxGrid. RADIUS.

An engineer needs to configure a Cisco ISE server to issue a CoA for endpoints already authenticated to access the network. The CoA option must be enforced on a session, even if there are multiple active sessions on a port. What must be configured to accomplish this task?. the Reauth CoA option in the Cisco ISE system profiling settings enabled. an endpoint profiling policy with the No CoA option enabled. an endpoint profiling policy with the Port Bounce CoA option enabled. the Port Bounce CoA option in the Cisco ISE system profiling settings enabled.

An administrator replaced a PSN in the distributed Cisco ISE environment. When endpoints authenticate to it, the devices are not getting the right profiles or attributes and as a result, are not hitting the correct policies. This was working correctly on the previous PSN. Which action must be taken to ensure the endpoints get identified?. Verify that the MnT node is tracking the session. Verify the shared secret used between the switch and the PSN. Verify that the profiling service is running on the new PSN. Verify that the authentication request the PSN is receiving is not malformed.

Which type of identity store allows for creating single-use access credentials in Cisco ISE?. OpenLDAP. Local. PKI. RSA SecureID.

A network engineer needs to deploy 802.1x using Cisco ISE in a wired network environment where thin clients download their system image upon bootup using PXE. For which mode must the switch ports be configured?. closed. restricted. monitor. low-impact.

Which two methods should a sponsor select to create bulk guest accounts from the sponsor portal? (Choose two). Random. Monthly. Daily. Imported. Known.

How is policy services node redundancy achieved in a deployment ?. by enabling VIP. by utilizing RADIUS server list on the NAD. by creating a node group. by deploying both primary and secondary node.

If a user reports a device lost or stolen, which portal should be used to prevent the device from accessing the network while still providing information about why the device is blocked?. Client Provisioning. Guest. BYOD. Blacklist.

A user reports that the RADIUS accounting packets are not being seen on the Cisco ISE server. Which command is the user missing in the switch's configuration?. radius-server vsa send accounting. aaa accounting network default start-stop group radius. aaa accounting resource default start-stop group radius. aaa accounting exec default start-stop group radius.

What are two benefits of TACACS+ versus RADIUS for device administration? (Choose two ). TACACS+ supports 802.1X, and RADIUS supports MAB. TACACS+ uses UDP, and RADIUS uses TCP. TACACS+ has command authorization, and RADIUS does not. TACACS+ provides the service type, and RADIUS does not. TACACS+ encrypts the whole payload, and RADIUS encrypts only the password.

A user changes the status of a device to stolen in the My Devices Portal of Cisco ISE. The device wasoriginally onboarded in the BYOD wireless Portal without a certificate. The device is found later, butthe user cannot re-onboard the device because Cisco ISE assigned the device to the Blocklist endpoint identity group. What must the user do in the My Devices Portal to resolve this issue?. Manually remove the device from the Blocklist endpoint identity group. Change the device state from Stolen to Not Registered. Change the BYOD registration attribute of the device to None. Delete the device, and then re-add the device.

A security administrator is using Cisco ISE to create a BYOD onboarding solution for all employees who use personal devices on the corporate network. The administrator generates a Certificate Signing Request and signs the request using an external Certificate Authority server. Which certificate usage option must be selected when importing the certificate into ISE?. RADIUS. DTLS. Portal. Admin.

An engineer needs to configure a compliance policy on Cisco ISE to ensure that the latest encryption software is running on the C drive of all endpoints. Drag and drop the configuration steps from the left into the sequence on the right to accomplish this task. Select posture and Disk Encryption Condition. access the Disk Encryption Condition window. select the encryption settings. access policy elements and conditions.

Which two actions must be verified to confirm that the internet is accessible via guest access when configuring a guest portal? (Choose two.). The guest device successfully associates with the correct SSID. The guest user gets redirected to the authentication page when opening a browser. The guest device has internal network access on the WLAN. The guest device can connect to network file shares. Cisco ISE sends a CoA upon successful guest authentication.

An administrator made changes in Cisco ISE and needs to apply new permissions for endpoints that have already been authenticated by sending a CoA packet to the network devices. Which IOS command must be configured on the devices to accomplish this goal?. aaa server radius dynamic-author. authentication command bounce-port. authentication command disable-port. aaa nas port extended.

An engineer needs to configure Cisco ISE Profiling Services to authorize network access for IP speakers that require access to the intercom system. This traffic needs to be identified if the ToS bit is set to 5 and the destination IP address is the intercom system. What must be configured to accomplish this goal?. NMAP. NETFLOW. pxGrid. RADIUS.

Which two task types are included in the Cisco ISE common tasks support for TACACS+ profiles? (Choose two.). Firepower. WLC. IOS. ASA. Shell.

What allows an endpoint to obtain a digital certificate from Cisco ISE during a BYOD flow?. Network Access Control. My Devices Portal. Application Visibility and Control. Supplicant Provisioning Wizard.

What occurs when a Cisco ISE distributed deployment has two nodes and the secondary node is deregistered?. The primary node restarts. The secondary node restarts. The primary node becomes standalone. Both nodes restart.

Which port does Cisco ISE use for native supplicant provisioning of a Windows laptop?. TCP 8909. TCP 8905. UDP 1812. TCP 443.

Which statement about configuring certificates for BYOD is true?. An Android endpoint uses EST, whereas other operating systems use SCEP for enrollment. The SAN field is populated with the end user name. An endpoint certificate is mandatory for the Cisco ISE BYOD. The CN field is populated with the endpoint host name.

Which Cisco ISE solution ensures endpoints have the latest version of antivirus updates installed before being allowed access to the corporate network?. Threat Services. Profiling Services. Provisioning Services. Posture Services.

An administrator is configuring posture assessment in Cisco ISE for the first time. Which two components must be uploaded to Cisco ISE to use Anyconnect for the agent configuration in a client provisioning policy? (Choose two.). Anyconnect network visibility module. Anyconnect compliance module. AnyConnectProfile.xml file. AnyConnectProfile.xsd file. Anyconnect agent image.

What is a difference between TACACS+ and RADIUS in regards to encryption?. TACACS+ encrypts only the password, whereas RADIUS encrypts the username and password. TACACS+ encrypts the username and password, whereas RADIUS encrypts only the password. TACACS+ encrypts the password, whereas RADIUS sends the entire packet in clear text. TACACS+ encrypts the entire packet, whereas RADIUS encrypts only the password.

An administrator must block access to BYOD endpoints that were onboarded without a certificate and have been reported as stolen in the Cisco ISE My Devices Portal. Which condition must be used when configuring an authorization policy that sets DenyAccess permission?. Endpoint Identity Group is Blocklist, and the BYOD state is Registered. Endpoint Identify Group is Blocklist, and the BYOD state is Pending. Endpoint Identity Group is Blocklist, and the BYOD state is Lost. Endpoint Identity Group is Blocklist, and the BYOD state is Reinstate.

An engineer needs to configure a new certificate template in the Cisco ISE Internal Certificate Authority to prevent BYOD devices from needing to re-enroll when their MAC address changes. Which option must be selected in the Subject Alternative Name field?. Common Name and GUID. MAC Address and GUID. Distinguished Name. Common Name.

What sends the redirect ACL that is configured in the authorization profile back to the Cisco WLC?. Cisco-av-pair. Class attribute. Event. State attribute.

Which two events trigger a CoA for an endpoint when CoA is enabled globally for ReAuth? (Choose two.). endpoint marked as lost in My Devices Portal. addition of endpoint to My Devices Portal. endpoint profile transition from Apple-Device to Apple-iPhone. endpoint profile transition from Unknown to Windows 10-Workstation. updating of endpoint dACL.

What is a requirement for Feed Service to work?. TCP port 3080 must be opened between Cisco ISE and the feed server. Cisco ISE has a base license. Cisco ISE has access to an internal server to download feed update. Cisco ISE has Internet access to download feed update.

Which advanced option within a WLAN must be enabled to trigger Central Web Authentication for Wireless users on AireOS controller?. DHCP server. static IP tunneling. override Interface ACL. AAA override.

What is a valid guest portal type?. Sponsored-Guest. My Devices. Sponsor. Captive-Guest.

The IT manager wants to provide different levels of access to network devices when users authenticate using TACACS+. The company needs specific commands to be allowed based on the Active Directory group membership of the different roles within the IT department. The solution must minimize the number of objects created in Cisco ISE. What must be created to accomplish this task?. one shell profile and one command set. multiple shell profiles and one command set. one shell profile and multiple command sets. multiple shell profiles and multiple command sets.

What are two differences of TACACS+ compared to RADIUS? (Choose two.). TACACS+ uses a connectionless transport protocol, whereas RADIUS uses a connection-oriented transport protocol. TACACS+ encrypts the full packet payload, whereas RADIUS only encrypts the password. TACACS+ only encrypts the password, whereas RADIUS encrypts the full packet payload. TACACS+ uses a connection-oriented transport protocol, whereas RADIUS uses a connectionless transport protocol. TACACS+ supports multiple sessions per user, whereas RADIUS supports one session per user.

What is a valid status of an endpoint attribute during the device registration process?. block listed. pending. unknown. DenyAccess.

An administrator is configuring the Native Supplicant Profile to be used with the Cisco ISE posture agents and needs to test the connection using wired devices to determine which profile settings are available. Which two configuration settings should be used to accomplish this task? (Choose two.). authentication mode. proxy host/IP. certificate template. security. allowed protocol.

What is needed to configure wireless guest access on the network?. endpoint already profiled in ISE. WEBAUTH ACL for redirection. valid user account in Active Directory. Captive Portal Bypass turned on.

Which configuration is required in the Cisco ISE authentication policy to allow Central Web Authentication?. MAB and if user not found, continue. MAB and if authentication failed, continue. Dot1x and if user not found, continue. Dot1x and if authentication failed, continue.

Which portal is used to customize the settings for a user to log in and download the compliance module?. Client Profiling. Client Endpoint. Client Provisioning. Client Guest.

Which term refers to an endpoint agent that tries to join an 802 1X-enabled network?. EAP Server. supplicant. client. Authenticator.

Which two features are available when the primary admin node is down and the secondary admin node has not been promoted? (Choose two.). hotspot. new AD user 802 1X authentication. posture. BYOD. guest AUP.

An organization wants to enable web-based guest access for both employees and visitors The goal is to use a single portal for both user types Which two authentication methods should be used to meet this requirement? (Choose two ). LDAP. 802.1X. Certificate-based. LOCAL. Mac based.

An organization is adding nodes to their Cisco ISE deployment and has two nodes designated as primary and secondary PAN and MnT nodes. The organization also has four PSNs An administrator is adding two more PSNs to this deployment but is having problems adding one of them What is the problem?. The new nodes must be set to primary prior to being added to the deployment. The current PAN is only able to track a max of four nodes. Only five PSNs are allowed to be in the Cisco ISE cube if configured this way. One of the new nodes must be designated as a pxGrid node.

Which two authentication protocols are supported by RADIUS but not by TACACS+? (Choose two.). MSCHAPv1. PAP. EAP. CHAP. MSCHAPv2.

What is a difference between RADIUS and TACACS+?. RADIUS uses connection-oriented transport, and TACACS+ uses best-effort delivery. RADIUS offers multiprotocol support, and TACACS+ supports only IP traffic. RADIUS combines authentication and authorization functions, and TACACS+ separates them. RADIUS supports command accounting, and TACACS+ does not.

An engineer is unable to use SSH to connect to a switch after adding the required CLI commands to the device to enable TACACS+. The device administration license has been added to Cisco ISE, and the required policies have been created. Which action is needed to enable access to the switch?. The ip ssh source-interface command needs to be set on the switch. 802.1X authentication needs to be configured on the switch. The RSA keypair used for SSH must be regenerated after enabling TACACS+. The switch needs to be added as a network device in Cisco ISE and set to use TACACS+.

What are two requirements of generating a single signing in Cisco ISE by using a certificate provisioning portal, without generating a certificate request? (Choose two ). Location the CSV file for the device MAC. Select the certificate template. Choose the hashing method. Enter the common name. Enter the IP address of the device.

What service can be enabled on the Cisco ISE node to identity the types of devices connecting to a network?. MAB. profiling. posture. central web authentication.

What does the dot1x system-auth-control command do?. causes a network access switch not to track 802.1x sessions. globally enables 802.1x. enables 802.1x on a network access device interface. causes a network access switch to track 802.1x sessions.

Which command displays all 802 1X/MAB sessions that are active on the switch ports of a Cisco Catalyst switch?. show authentication sessions output. Show authentication sessions. show authentication sessions interface Gi 1/0/x. show authentication sessions interface Gi1/0/x output.

Which personas can a Cisco ISE node assume ?. policy service, gatekeeping, and monitoring. administration, policy service, and monitoring. administration, policy service, gatekeeping. administration, monitoring, and gatekeeping.

An administrator has added a new Cisco ISE PSN to their distributed deployment. Which two features must the administrator enable to accept authentication requests and profile the endpoints correctly, and add them to their respective endpoint identity groups? (Choose two ). Session Services. Endpoint Attribute Filter. Posture Services. Profiling Services. Radius Service.

An administrator is configuring sponsored guest access using Cisco ISE Access must be restricted to the sponsor portal to ensure that only necessary employees can issue sponsored accounts and employees must be classified to do so What must be done to accomplish this task?. Configure an identity-based access list in Cisco ISE to restrict the users allowed to login. Edit the sponsor portal to only accept members from the selected groups. Modify the sponsor groups assigned to reflect the desired user groups. Create an authorization rule using the Guest Flow condition to authorize the administrators.

Refer to the exhibit. An engineer is configuring a client but cannot authenticate to Cisco ISE During troubleshooting, the show authentication sessions command was issued to display the authentication status of each port Which command gives additional information to help identify the problem with the authentication?. show authentication sessions. show authentication sessions Interface Gil/0 output. show authentication sessions interface Gi1/0 details. show authentication sessions output.

An administrator is manually adding a device to a Cisco ISE identity group to ensure that it is able to access the network when needed without authentication Upon testing, the administrator notices that the device never hits the correct authorization policy line using the condition EndPointsLogicalProfile EQUALS static_list Why is this occurring?. The dynamic logical profile is overriding the statically assigned profile. The device is changing identity groups after profiling instead ot remaining static. The logical profile is being statically assigned instead of the identity group. The identity group is being assigned instead of the logical profile.

What is a characteristic of the UDP protocol?. UDP can detect when a server is down. UDP offers best-effort delivery. UDP can detect when a server is slow. UDP offers information about a non-existent server.

Which two endpoint compliance statuses are possible? (Choose two.). unknown. known. invalid. compliant. valid.

Drag the steps to configure a Cisco ISE node as a primary administration node from the left into the correct order on the right. select the check box next to the current node, and then click Edit. click save. choose administration > system > deployment. click make primary.

Which are two characteristics of TACACS+? (Choose two). It uses TCP port 49. It combines authorization and authentication functions. It separates authorization and authentication functions. It encrypts the password only. It uses UDP port 49.

Which two ports do network devices typically use for CoA? (Choose two). 443. 19005. 8080. 3799. 1700.

An engineer is configuring the remote access VPN to use Cisco ISE for AAA and needs to conduct posture checks on the connecting endpoints After the endpoint connects, it receives its initial authorization result and continues onto the compliance scan What must be done for this AAA configuration to allow compliant access to the network?. Configure the posture authorization so it defaults to unknown status. Fix the CoA port number. Ensure that authorization only mode is not enabled. Enable dynamic authorization within the AAA server group.

Which two Cisco ISE deployment models require two nodes configured with dedicated PAN and MnT personas? (Choose two.). three PSN nodes. seven PSN nodes with one PxGrid node. five PSN nodes with one PxGrid node. two PSN nodes with one PxGrid node. six PSN nodes.

Which compliance status is set when a matching posture policy has been defined for that endpoint. but all the mandatory requirements during posture assessment are not met?. unauthorized. untrusted. non-compliant. unknown.

A Cisco device has a port configured in multi-authentication mode and is accepting connections only from hosts assigned the SGT of SGT_0422048549 The VLAN trunk link supports a maximum of 8 VLANS What is the reason for these restrictions?. The device is performing inline tagging without acting as a SXP speaker. The device is performing mime tagging while acting as a SXP speaker. The IP subnet addresses are dynamically mapped to an SGT. The IP subnet addresses are statically mapped to an SGT.

An administrator wants to configure network device administration and is trying to decide whether to use TACACS+ or RADIUS. A reliable protocol must be used that can check command authorization. Which protocol meets these requirements and why?. TACACS+ because it runs over TCP. RADIUS because it runs over UDP. RADIUS because it runs over TCP. TACACS+ because it runs over UDP.

Which two responses from the RADIUS server to NAS are valid during the authentication process? (Choose two). access-response. access-request. access-reserved. access-accept. access-challenge.

Which two components are required for creating a Native Supplicant Profile within a BYOD flow? (Choose two). Windows Settings. Connection Type. iOS Settings. Redirect ACL. Operating System.

What is the minimum certainty factor when creating a profiler policy?. the minimum number that a predefined condition provides. the maximum number that a predefined condition provides. the minimum number that a device certainty factor must reach to become a member of the profile. the maximum number that a device certainty factor must reach to become a member of the profile.

What gives Cisco ISE an option to scan endpoints for vulnerabilities?. authorization policy. authentication policy. authentication profile. authorization profile.

A network administrator has just added a front desk receptionist account to the Cisco ISE Guest Service sponsor group. Using the Cisco ISE Guest Sponsor Portal, which guest services can the receptionist provide ?. Keep track of guest user activities. Configure authorization settings for guest users. Create and manage guest user accounts. Authenticate guest users to Cisco ISE.

Which Cisco ISE deployment model provides redundancy by having every node in the deployment configured with the Administration, Policy Service, and Monitoring personas to protect from a complete node failure ?. distributed. dispersed. two-node. hybrid.

An administrator enables the profiling service for Cisco ISE to use for authorization policies while in closed mode. When the endpoints connect, they receive limited access so that the profiling probes can gather information and Cisco ISE can assign the correct profiles. They are using the default values within Cisco ISE. but the devices do not change their access due to the new profile. What is the problem ?. In closed mode, profiling does not work unless CDP is enabled. The profiling probes are not able to collect enough information to change the device profile. The profiler feed is not downloading new information so the profiler is inactive. The default profiler configuration is set to No CoA for the reauthentication setting.

Which RADIUS attribute is used to dynamically assign the inactivity active timer for MAB users from the Cisco ISE node ?. radius-server timeout. session-timeout. idle-timeout. termination-action.

Select and Place. Administration. Policy Service. Monitoring. pxGrid.

Select and Place. Uses username and password for authentication. uses certificates for authentication. changes credentials through the admin portal. supports fragmentation after the tunnel is established. uses the X.509 format. supports auto-enrollment for obtaining credentials.

Which interface-level command is needed to turn on 802.1X authentication ?. Dot1x pae authenticator. dot1x system-auth-control. authentication host-mode single-host. aaa server radius dynamic-author.

Which permission is common to the Active Directory Join and Leave operations ?. Create a Cisco ISE machine account in the domain if the machine account does not already exist. Remove the Cisco ISE machine account from the domain. Set attributes on the Cisco ISE machine account. Search Active Directory to see if a Cisco ISE machine account already exists.

Which two features must be used on Cisco ISE to enable the TACACS+ feature? (Choose two). Device Administration License. Server Sequence. Command Sets. Enable Device Admin Service. External TACACS Servers.

During BYOD flow, from where does a Microsoft Windows PC download the Network Setup Assistant?. Cisco App Store. Microsoft App Store. Cisco ISE directly. Native OTA functionality.

Which use case validates a change of authorization?. An authenticated, wired EAP-capable endpoint is discovered. An endpoint profiling policy is changed for authorization policy. An endpoint that is disconnected from the network is discovered. Endpoints are created through device registration for the guests.

An engineer is configuring Cisco ISE for guest services They would like to have any unregistered guests redirected to the guest portal for authentication then have a CoA provide them with full access to the network that is segmented via firewalls Why is the given configuration failing to accomplish this goal?. The Guest Flow condition is not in the line that gives access to the quest portal. The Network_Access_Authentication_Passed condition will not work with guest services for portal access. The Permit Access result is not set to restricted access in its policy line. The Guest Portal and Guest Access policy lines are in the wrong order.

An engineer is configuring ISE for network device administration and has devices that support both protocols. What are two benefits of choosing TACACS+ over RADIUS for these devices? (Choose two.). TACACS+ is FIPS compliant while RADIUS is not. TACACS+ is designed for network access control while RADIUS is designed for role-based access. TACACS+ uses secure EAP-TLS while RADIUS does not. TACACS+ provides the ability to authorize specific commands while RADIUS does not. TACACS+ encrypts the entire payload being sent while RADIUS only encrypts the password.

During a 802 1X deployment, an engineer must identify failed authentications without causing problems for the connected endpoint. Which command will successfully achieve this ?. dot1x system-auth-control. dot1x pae authenticator. authentication open. authentication port-control auto.

Report abuse