Which option is one method for transporting security group tags throughout the network?

Which option is one method for transporting security group tags throughout the network?A . by embedding the SGT in the IP headerB . via Security Group Exchange ProtocolC . by embedding the SGT in the 802.1Q headerD . by enabling 802.1AE on every network deviceView AnswerAnswer: B

May 3, 2018 No Comments READ MORE +

What implementation must be added to the WLC to enable 802.1X and CoA for wireless endpoints?

What implementation must be added to the WLC to enable 802.1X and CoA for wireless endpoints?A . the ISEB . an ACLC . a routerD . a policy serverView AnswerAnswer: A

May 3, 2018 No Comments READ MORE +

What attribute could be obtained from the SNMP query probe?

What attribute could be obtained from the SNMP query probe?A . FQDNB . CDPC . DHCP class identifierD . User agentView AnswerAnswer: B

May 1, 2018 No Comments READ MORE +

Which three configuration elements are required?

A network engineer is configuring HTTP based CWA on a switch. Which three configuration elements are required? (Choose three.)A . HTTP server enabledB . Radius authentication on the port with MABC . Redirect access-listD . Redirect-URLE . HTTP secure server enabledF . Radius authentication on the port with 802.1xG ....

April 29, 2018 No Comments READ MORE +

In a split ACS deployment with primary and secondary servers, which three statements about AAA load handling are true? (Choose three.)

In a split ACS deployment with primary and secondary servers, which three statements about AAA load handling are true? (Choose three.)A . During normal operations, each server processes the full workload of both servers.B . If a AAA connectivity problem occurs, the servers split the full load of authentication requests.C...

April 29, 2018 No Comments READ MORE +

What two catalyst switch security features will prevent further violations?

A malicious user gained network access by spoofing printer connections that were authorized using MAB on four different switch ports at the same time. What two catalyst switch security features will prevent further violations? (Choose two)A . DHCP SnoopingB . 802.1AE MacSecC . Port securityD . IP Device trackingE ....

April 24, 2018 No Comments READ MORE +

Which network component would issue the CoA?

Which network component would issue the CoA?A . switchB . endpointC . Admin NodeD . Policy Service NodeView AnswerAnswer: D

April 21, 2018 No Comments READ MORE +

A network administrator must enable which protocol extension to utilize EAP-Chaining?

A network administrator must enable which protocol extension to utilize EAP-Chaining?A . EAP-FASTB . EAP-TLSC . MSCHAPv2D . PEAPView AnswerAnswer: A

April 20, 2018 No Comments READ MORE +

Which description of the purpose of the Continue option in an authentication policy rule is true?

Which description of the purpose of the Continue option in an authentication policy rule is true?A . It allows Cisco ISE to check the list of rules in an authentication policy until there is a match.B . It sends an authentication to the next subrule within the same authentication rule.C . It allows...

April 17, 2018 No Comments READ MORE +

Which two statements about administrative access to the ACS Solution Engine are true? (Choose two.)

Which two statements about administrative access to the ACS Solution Engine are true? (Choose two.)A . The ACS Solution Engine supports command-line connections through a serial-port connection.B . For GUI access, an administrative GUI user must be created with the add-guiadmin command.C . The ACS Solution Engine supports command-line connections...

April 17, 2018 No Comments READ MORE +