Which WLC debug command would be used to troubleshoot authentication issues on a 802. 1X enabled WLAN?
Which WLC debug command would be used to troubleshoot authentication issues on a 802. 1X enabled WLAN?A . debug dot11 aaa manager allB . debug wps mfp IwappC . debug dot11 stateD . debug dot1x eventsView AnswerAnswer: D
Which TCP port is used for the guest portal On ISE?
An engineer has created a redirect ACL to forward traffic to Cisco ISE. Which TCP port is used for the guest portal On ISE?A . 8080B . 443C . 8021D . 8443View AnswerAnswer: D Explanation: Reference: https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/115732-central-web-auth-00.html
Which two accounting types are used to implement accounting with RADIUS? (Choose two.)
Which two accounting types are used to implement accounting with RADIUS? (Choose two.)A . NetworkB . UserC . AttributeD . DeviceE . ResourceView AnswerAnswer: AE
Which conditions in the authorization policy must the network administrator provision on Cisco ISE to accomplish this task?
A network administrator must remediate unpatched servers by redirecting them to their remediation portal. Which conditions in the authorization policy must the network administrator provision on Cisco ISE to accomplish this task?A . noncompliantB . quarantineC . compliantD . URL redirectView AnswerAnswer: D
Which method of registering devices on the BYOD My Devices Portal requires that the user have a supplicant installed?
Which method of registering devices on the BYOD My Devices Portal requires that the user have a supplicant installed?A . MABB . single SS1DC . web authenticationD . dual SSIDView AnswerAnswer: D
Which action is a Cisco recommended practice while attempting to increase efficiency on the monitoring nodes?
Which action is a Cisco recommended practice while attempting to increase efficiency on the monitoring nodes?A . Back up data and transfer to a remote repository on regular basisB . Remove endpoints when not active.C . Re-index the data on a regular basis.D . Compress the data regularlyView AnswerAnswer: A...
Which two methods can an employee use to add their devices to the network?
A customer has implemented a BYOD policy to allow employees to use personal devices on the corporate network. Which two methods can an employee use to add their devices to the network? (Choose two.)A . Client Information SignalingB . My Device portalC . Client Handshake AuthenticationD . Helpdesk registrationE ....
Which description of SXP is true?
Which description of SXP is true?A . applies SGT along every hop in the network pathB . propagates SGT on a device upon which SGT inline tagging is unsupportedC . removes SGT from every in the network pathD . propagates SGT on a device which inline tagging is supportedView AnswerAnswer:...
Which two endpoint operating systems are supported during BYOD onboarding? (Choose two.)
Which two endpoint operating systems are supported during BYOD onboarding? (Choose two.)A . Red Hat Enterprise LinuxB . BlackBerryC . NookD . Microsoft WindowsE . AndroidView AnswerAnswer: DE Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/security/ise/2-2/admin_guide/b_ise_admin_guide_22/b_ise_admin_guide_22_chapter_01111.pdf
In the redirect URL authorization attribute, which Cisco ISE node acts as the web server when performing CWA?
In the redirect URL authorization attribute, which Cisco ISE node acts as the web server when performing CWA?A . AdministrationB . MonitoringC . Policy ServiceD . pxGridView AnswerAnswer: C Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/security/ise/2-3/admin_guide/b_ise_admin_guide_23/b_ise_admin_guide_23_chapter_01111.html