Which ISE feature is used to facilitate a BYOD deployment?
Which ISE feature is used to facilitate a BYOD deployment?A . self-service personal device registration and onboardingB . Guest Service Sponsor PortalC . Local Web AuthD . Guest Identity Source SequenceView AnswerAnswer: A
What implementation must be added to the WLC to enable 802.1X and CoA for wireless endpoints?
What implementation must be added to the WLC to enable 802.1X and CoA for wireless endpoints?A . the ISEB . an ACLC . a routerD . a policy serverView AnswerAnswer: A
What user rights does an account need to join ISE to a Microsoft Active Directory domain?
What user rights does an account need to join ISE to a Microsoft Active Directory domain?A . Create and Delete Computer ObjectsB . Domain AdminC . Join and Leave DomainD . Create and Delete User ObjectsView AnswerAnswer: A
Which interface-level command is needed to turn on dot1x authentication?
Which interface-level command is needed to turn on dot1x authentication?A . authentication pae authenticatorB . aaa server radius dynamic-authorC . authentication host-mode single-hostD . dot1x system-auth-controlView AnswerAnswer: C Explanation: In order to enable 802.1x functionality, enter this command: Switch(config)# dot1x system-auth-control
Which network component would issue the CoA?
Which network component would issue the CoA?A . switchB . endpointC . Admin NodeD . Policy Service NodeView AnswerAnswer: D
Which two components are required to connect to a WLAN network that is secured by EAP-TLS authentication? (Choose two.)
Which two components are required to connect to a WLAN network that is secured by EAP-TLS authentication? (Choose two.)A . Kerberos authentication serverB . AAA/RADIUS serverC . PSKsD . CA serverView AnswerAnswer: B,D
Which configuration is required in the Cisco ISE Authentication policy to allow Central Web Authentication?
Which configuration is required in the Cisco ISE Authentication policy to allow Central Web Authentication?A . Dot1x and if authentication failed continueB . MAB and if user not found continueC . MAB and if authentication failed continueD . Dot1x and if user not found continueView AnswerAnswer: B
Which option is the code field of n EAP packet?
Which option is the code field of n EAP packet?A . one byte and 1=request, 2=response 3=failure 4=successB . two byte and 1=request, 2=response, 3=success, 4=failureC . two byte and 1=request 2=response 3=failure 4=successD . one byte and 1=request 2=response 3=success 4=failureView AnswerAnswer: D
What are two actions that can occur when an 802.1X-enabled port enters violation mode? (Choose two.)
What are two actions that can occur when an 802.1X-enabled port enters violation mode? (Choose two.)A . The port is error disabled.B . The port drops packets from any new device that sends traffic to the port.C . The port generates a port resistance error.D . The port attempts to...
What implementation must be added to the WLC to enable 802.1X and CoA for wireless endpoints?
What implementation must be added to the WLC to enable 802.1X and CoA for wireless endpoints?A . the ISEB . an ACLC . a routerD . a policy serverView AnswerAnswer: A