Which network component would issue the CoA?
Which network component would issue the CoA?A . switchB . endpointC . Admin NodeD . Policy Service NodeView AnswerAnswer: D
Which two attributes are delivered by the DHCP probe to the Cisco ISE? (Choose two.)
Which two attributes are delivered by the DHCP probe to the Cisco ISE? (Choose two.)A . dhcp-client-identifierB . framed-IP-addressC . host-nameD . calling-station-IDE . MAC addressView AnswerAnswer: A,C
Which two options are valid for configuring IEEE 802.1AE MACSec between switches in a TrustSec network? (Choose two.)
Which two options are valid for configuring IEEE 802.1AE MACSec between switches in a TrustSec network? (Choose two.)A . manually on links between supported switchesB . in the Cisco Identity Services EngineC . in the global configuration of a TrustSec non-seed switchD . dynamically on links between supported switchesE ....
Which model does Cisco support in a RADIUS change of authorization implementation?
Which model does Cisco support in a RADIUS change of authorization implementation?A . pushB . pullC . policyD . securityView AnswerAnswer: A
What EAP method supports mutual certificate-based authentication?
What EAP method supports mutual certificate-based authentication?A . EAP-TTLSB . EAP-MSCHAPC . EAP-TLSD . EAP-MD5View AnswerAnswer: C
Which three events immediately occur when a user clicks “Register” on their device in a single-SSID BYOD onboarding registration process (Choose three).
Which three events immediately occur when a user clicks “Register” on their device in a single-SSID BYOD onboarding registration process (Choose three).A . CA certificate is sent to the device from Cisco ISEB . An endpoint is added to a RegistereDevices identity groupC . RADIUS access request is sent to...
Which five portals are provided by PSN? (Choose five.)
Which five portals are provided by PSN? (Choose five.)A . guestB . sponsorC . my devicesD . blacklistE . client provisioningF . adminG . monitoring and troubleshootingView AnswerAnswer: A,B,C,D,E
A network administrator must enable which protocol to utilize EAP-Chaining?
A network administrator must enable which protocol to utilize EAP-Chaining?A . EAP-FASTB . EAP-TLSC . MSCHAPv2D . PEAPView AnswerAnswer: A
In AAA, what function does authentication perform?
In AAA, what function does authentication perform?A . It identifies the actions that the user can perform on the device.B . It identifies the user who is trying to access a device.C . It identifies the actions that a user has previously taken.D . It identifies what the user can...
Which two authentication stores are supported to design a wireless network using PEAP EAP-MSCHAPv2 as the authentication method? (Choose two.)
Which two authentication stores are supported to design a wireless network using PEAP EAP-MSCHAPv2 as the authentication method? (Choose two.)A . Microsoft Active DirectoryB . ACSC . LDAPD . RSA Secure-IDE . Certificate ServerView AnswerAnswer: A,B