Which tool will complete a readiness assessment and outline hardware and software capable and incapable devices?

A network administrator needs to determine the ability of existing network devices to deliver key BYOD services. Which tool will complete a readiness assessment and outline hardware and software capable and incapable devices?A . Prime InfrastructureB . Network Control SystemC . Cisco Security ManagerD . Identity Services EngineView AnswerAnswer: A

September 8, 2018 No Comments READ MORE +

Where is dynamic SGT classification configured?

Where is dynamic SGT classification configured?A . Cisco ISEB . NADC . supplicantD . RADIUS proxyView AnswerAnswer: A

September 7, 2018 No Comments READ MORE +

What are the initial steps to configure an ACS as a TACACS server?

What are the initial steps to configure an ACS as a TACACS server?A . 1. Choose Network Devices and AAA Clients > Network Resources.2. Click Create.B . 1. Choose Network Resources > Network Devices and AAA Clients.2. Click Create.C . 1. Choose Network Resources > Network Devices and AAA Clients.2....

September 6, 2018 No Comments READ MORE +

Which three pieces of information can be found in an authentication detail report? (Choose three.)

Which three pieces of information can be found in an authentication detail report? (Choose three.)A . DHCP vendor IDB . user agent stringC . the authorization rule matched by the endpointD . the EAP method the endpoint is usingE . the RADIUS username being usedF . failed posture requirementView AnswerAnswer:...

September 5, 2018 No Comments READ MORE +

Which statement about the authentication protocol used in the configuration is true?

Refer to the exhibit. Which statement about the authentication protocol used in the configuration is true?A . There is separate authentic and authorization request packet.B . The authentication request contains only a password.C . The authentication and authorization requests are grouped in a single packet.D . The authentication request contains...

September 4, 2018 No Comments READ MORE +

Which 802.1x command is needed for ACL to be applied on a switch port?

Which 802.1x command is needed for ACL to be applied on a switch port?A . dot1x system-auth-controlB . dot1x pae authenticatorC . authentication port-control autoD . radius-server vsa send authenticationE . aaa authorization network default group radiusView AnswerAnswer: D

September 4, 2018 No Comments READ MORE +

What are two client-side requirements of the NAC Agent and NAC Web Agent installation? (Choose two.)

What are two client-side requirements of the NAC Agent and NAC Web Agent installation? (Choose two.)A . Administrator workstation rightsB . Active Directory Domain membershipC . Allowing of web browser activex installationD . WSUS service runningView AnswerAnswer: A,C

September 3, 2018 No Comments READ MORE +

Where is dynamic SGT classification configured?

Where is dynamic SGT classification configured?A . Cisco ISEB . NADC . supplicantD . RADIUS proxyView AnswerAnswer: A

September 3, 2018 No Comments READ MORE +

Which three statements about the given configuration are true?

Refer to the exhibit. Which three statements about the given configuration are true? (Choose three.)A . TACACS+ authentication configuration is complete.B . TACACS+ authentication configuration is incomplete.C . TACACS+ server hosts are configured correctly.D . TACACS+ server hosts are misconfigured.E . The TACACS+ server key is encrypted.F . The TACACS+...

September 2, 2018 No Comments READ MORE +

An administrator can leverage which attribute to assign privileges based on Microsoft Active Directory user groups?

An administrator can leverage which attribute to assign privileges based on Microsoft Active Directory user groups?A . member ofB . groupC . classD . personView AnswerAnswer: A

September 1, 2018 No Comments READ MORE +