Where is client traffic decrypted in a controller-based wireless network protected with WPA2 Security?

Where is client traffic decrypted in a controller-based wireless network protected with WPA2 Security?A . Access PointB . SwitchC . Wireless LAN ControllerD . Authentication ServerView AnswerAnswer: A

October 8, 2018 No Comments READ MORE +

Which type of rate limiting can you implement on your network to correct the problem?

Your guest-access wireless network is experiencing degraded performance and excessive latency due to user saturation. Which type of rate limiting can you implement on your network to correct the problem?A . per-deviceB . per-policyC . per-access pointD . per-controllerE . per-applicationView AnswerAnswer: A

October 8, 2018 No Comments READ MORE +

Which network access device feature can you configure to gather raw endpoint data?

Which network access device feature can you configure to gather raw endpoint data?A . Device SensorB . Device ClassifierC . Switched Port AnalyzerD . Trust AnchorView AnswerAnswer: A

October 6, 2018 No Comments READ MORE +

Which statement about Cisco Management Frame Protection is true?

Which statement about Cisco Management Frame Protection is true?A . It enables stations to remain in power-save mode, except at specified intervals to receive data from the access point.B . It detects spoofed MAC addresses.C . It identifies potential RF jamming attacks.D . It protects against frame and device spoofing.View...

October 6, 2018 No Comments READ MORE +

Which option describes what can be used to determine if DHCP requests from clients are reaching Cisco ISE?

Certain endpoints are missing DHCP profiling data. Which option describes what can be used to determine if DHCP requests from clients are reaching Cisco ISE?A . output of show interface gigabitEthernet 0 from the CLIB . output of debug logging all 7 from the CLIC . output of show logging...

October 4, 2018 No Comments READ MORE +

Which condition must the network administrator configuration?

A network administration wants to set up a posture condition on Cisco ISE to check for the file name Posture.txt in C: on a Windows machine. Which condition must the network administrator configuration?A . Service conditionB . Registry conditionC . Application conditionD . File conditionView AnswerAnswer: D

October 2, 2018 No Comments READ MORE +

Which effect does the ip http secure-server command have on a Cisco ISE?

Which effect does the ip http secure-server command have on a Cisco ISE?A . It enables the HTTP server for users to connect on the command line.B . It enables the HTTP server for users to connect by using web-based authentication.C . It enables the HTTPS server for users to...

October 1, 2018 No Comments READ MORE +

Which feature enables the Cisco ISE DHCP profiling capabilities to determine and enforce authorization policies on mobile devices?

Which feature enables the Cisco ISE DHCP profiling capabilities to determine and enforce authorization policies on mobile devices?A . disabling the DHCP proxy optionB . DHCP option 42C . DHCP snoopingD . DHCP spoofingView AnswerAnswer: A

October 1, 2018 No Comments READ MORE +

Which three statements describe differences between TACACS+ and RADIUS? (Choose three.)

Which three statements describe differences between TACACS+ and RADIUS? (Choose three.)A . RADIUS encrypts the entire packet, while TACACS+ encrypts only the password.B . TACACS+ encrypts the entire packet, while RADIUS encrypts only the password.C . RADIUS uses TCP, while TACACS+ uses UDE . TACACS+ uses TCP, while RADIUS uses...

September 30, 2018 No Comments READ MORE +

What is the most likely reason for the failure?

Refer to the exhibit. You are troubleshooting RADIUS issues on the network and the debug radius command returns the given output. What is the most likely reason for the failure?A . An invalid username or password was entered.B . The RADIUS port is incorrect.C . The NAD is untrusted by...

September 26, 2018 No Comments READ MORE +