Which option is one method for transporting security group tags throughout the network?
Which option is one method for transporting security group tags throughout the network?A . by embedding the SGT in the IP headerB . via Security Group Exchange ProtocolC . by embedding the SGT in the 802.1Q headerD . by enabling 802.1AE on every network deviceView AnswerAnswer: B
What implementation must be added to the WLC to enable 802.1X and CoA for wireless endpoints?
What implementation must be added to the WLC to enable 802.1X and CoA for wireless endpoints?A . the ISEB . an ACLC . a routerD . a policy serverView AnswerAnswer: A
What attribute could be obtained from the SNMP query probe?
What attribute could be obtained from the SNMP query probe?A . FQDNB . CDPC . DHCP class identifierD . User agentView AnswerAnswer: B
Which three configuration elements are required?
A network engineer is configuring HTTP based CWA on a switch. Which three configuration elements are required? (Choose three.)A . HTTP server enabledB . Radius authentication on the port with MABC . Redirect access-listD . Redirect-URLE . HTTP secure server enabledF . Radius authentication on the port with 802.1xG ....
In a split ACS deployment with primary and secondary servers, which three statements about AAA load handling are true? (Choose three.)
In a split ACS deployment with primary and secondary servers, which three statements about AAA load handling are true? (Choose three.)A . During normal operations, each server processes the full workload of both servers.B . If a AAA connectivity problem occurs, the servers split the full load of authentication requests.C...
What two catalyst switch security features will prevent further violations?
A malicious user gained network access by spoofing printer connections that were authorized using MAB on four different switch ports at the same time. What two catalyst switch security features will prevent further violations? (Choose two)A . DHCP SnoopingB . 802.1AE MacSecC . Port securityD . IP Device trackingE ....
Which network component would issue the CoA?
Which network component would issue the CoA?A . switchB . endpointC . Admin NodeD . Policy Service NodeView AnswerAnswer: D
A network administrator must enable which protocol extension to utilize EAP-Chaining?
A network administrator must enable which protocol extension to utilize EAP-Chaining?A . EAP-FASTB . EAP-TLSC . MSCHAPv2D . PEAPView AnswerAnswer: A
Which description of the purpose of the Continue option in an authentication policy rule is true?
Which description of the purpose of the Continue option in an authentication policy rule is true?A . It allows Cisco ISE to check the list of rules in an authentication policy until there is a match.B . It sends an authentication to the next subrule within the same authentication rule.C . It allows...
Which two statements about administrative access to the ACS Solution Engine are true? (Choose two.)
Which two statements about administrative access to the ACS Solution Engine are true? (Choose two.)A . The ACS Solution Engine supports command-line connections through a serial-port connection.B . For GUI access, an administrative GUI user must be created with the add-guiadmin command.C . The ACS Solution Engine supports command-line connections...