Which RADIUS attribute is used primarily to differentiate an IEEE 802.1x request from a Cisco MAB request?
Which RADIUS attribute is used primarily to differentiate an IEEE 802.1x request from a Cisco MAB request?A . RADIUS Attribute (5) NAS-PortB . RADIUS Attribute (6) Service-TypeC . RADIUS Attribute (7) Framed-ProtocolD . RADIUS Attribute (61) NAS-Port-TypeView AnswerAnswer: B
How many days does Cisco ISE wait before it purges a session from the active session list if no RADIUS Accounting STOP message is received?
How many days does Cisco ISE wait before it purges a session from the active session list if no RADIUS Accounting STOP message is received?A . 1B . 5C . 10D . 15View AnswerAnswer: B
Which two EAP types require server side certificates? (Choose two.)
Which two EAP types require server side certificates? (Choose two.)A . EAP-TLSB . EAP-FAST/TLSC . EAP-MD5D . EAP-PEAPE . EAP-FAST/GTCView AnswerAnswer: A,D
Enter server values to begin the configuration.
Enter server values to begin the configuration.View AnswerAnswer: D
Which portals enable this?
A company wants to allow employees to register and manage their own devices that do not support NSP. Which portals enable this?A . MDM portalsB . Client provisioning portalsC . My devices portalsD . BYOD PortalsView AnswerAnswer: C
Which three network access devices allow for static security group tag assignment? (Choose three.)
Which three network access devices allow for static security group tag assignment? (Choose three.)A . intrusion prevention systemB . access layer switchC . data center access switchD . load balancerE . VPN concentratorF . wireless LAN controllerView AnswerAnswer: B,C,E
Which profiling capability allows you to gather and forward network packets to an analyzer?
Which profiling capability allows you to gather and forward network packets to an analyzer?A . collectorB . spannerC . retrieverD . aggregatorView AnswerAnswer: A
The links outside the TrustSec area in the given SGA architecture are unprotected. On which two links does EAC take place?
Refer to the exhibit. The links outside the TrustSec area in the given SGA architecture are unprotected. On which two links does EAC take place? (Choose two.)A . between switch 2 and switch 3B . between switch 5 and host 2C . between host 1 and switch 1D . between...
What is the effect of the ip http secure-server command on a Cisco ISE?
What is the effect of the ip http secure-server command on a Cisco ISE?A . It enables the HTTP server for users to connect on the command line.B . It enables the HTTP server for users to connect using Web-based authentication.C . It enables the HTTPS server for users to...
You are installing Cisco ISE on nodes that will be used in a distributed deployment. After the initial bootstrap process, what state will the Cisco ISE nodes be in?
You are installing Cisco ISE on nodes that will be used in a distributed deployment. After the initial bootstrap process, what state will the Cisco ISE nodes be in?A . RemoteB . Policy serviceC . AdministrationD . StandaloneView AnswerAnswer: D