Which ISE feature is used to facilitate a BYOD deployment?

Which ISE feature is used to facilitate a BYOD deployment?A . self-service personal device registration and onboardingB . Guest Service Sponsor PortalC . Local Web AuthD . Guest Identity Source SequenceView AnswerAnswer: A

July 2, 2018 No Comments READ MORE +

What implementation must be added to the WLC to enable 802.1X and CoA for wireless endpoints?

What implementation must be added to the WLC to enable 802.1X and CoA for wireless endpoints?A . the ISEB . an ACLC . a routerD . a policy serverView AnswerAnswer: A

June 29, 2018 No Comments READ MORE +

What user rights does an account need to join ISE to a Microsoft Active Directory domain?

What user rights does an account need to join ISE to a Microsoft Active Directory domain?A . Create and Delete Computer ObjectsB . Domain AdminC . Join and Leave DomainD . Create and Delete User ObjectsView AnswerAnswer: A

June 28, 2018 No Comments READ MORE +

Which interface-level command is needed to turn on dot1x authentication?

Which interface-level command is needed to turn on dot1x authentication?A . authentication pae authenticatorB . aaa server radius dynamic-authorC . authentication host-mode single-hostD . dot1x system-auth-controlView AnswerAnswer: C Explanation: In order to enable 802.1x functionality, enter this command: Switch(config)# dot1x system-auth-control

June 28, 2018 No Comments READ MORE +

Which network component would issue the CoA?

Which network component would issue the CoA?A . switchB . endpointC . Admin NodeD . Policy Service NodeView AnswerAnswer: D

June 26, 2018 No Comments READ MORE +

Which two components are required to connect to a WLAN network that is secured by EAP-TLS authentication? (Choose two.)

Which two components are required to connect to a WLAN network that is secured by EAP-TLS authentication? (Choose two.)A . Kerberos authentication serverB . AAA/RADIUS serverC . PSKsD . CA serverView AnswerAnswer: B,D

June 26, 2018 No Comments READ MORE +

Which configuration is required in the Cisco ISE Authentication policy to allow Central Web Authentication?

Which configuration is required in the Cisco ISE Authentication policy to allow Central Web Authentication?A . Dot1x and if authentication failed continueB . MAB and if user not found continueC . MAB and if authentication failed continueD . Dot1x and if user not found continueView AnswerAnswer: B

June 24, 2018 No Comments READ MORE +

Which option is the code field of n EAP packet?

Which option is the code field of n EAP packet?A . one byte and 1=request, 2=response 3=failure 4=successB . two byte and 1=request, 2=response, 3=success, 4=failureC . two byte and 1=request 2=response 3=failure 4=successD . one byte and 1=request 2=response 3=success 4=failureView AnswerAnswer: D

June 23, 2018 No Comments READ MORE +

What are two actions that can occur when an 802.1X-enabled port enters violation mode? (Choose two.)

What are two actions that can occur when an 802.1X-enabled port enters violation mode? (Choose two.)A . The port is error disabled.B . The port drops packets from any new device that sends traffic to the port.C . The port generates a port resistance error.D . The port attempts to...

June 22, 2018 No Comments READ MORE +

What implementation must be added to the WLC to enable 802.1X and CoA for wireless endpoints?

What implementation must be added to the WLC to enable 802.1X and CoA for wireless endpoints?A . the ISEB . an ACLC . a routerD . a policy serverView AnswerAnswer: A

June 19, 2018 No Comments READ MORE +