Which type of access list is the most scalable that Cisco ISE can use to implement network authorization enforcement for a large number of users?
Which type of access list is the most scalable that Cisco ISE can use to implement network authorization enforcement for a large number of users?A . downloadable access listsB . named access listsC . VLAN access listsD . MAC address access listsView AnswerAnswer: A
Which term describes a software application that seeks connectivity to the network via a network access device?
Which term describes a software application that seeks connectivity to the network via a network access device?A . authenticatorB . serverC . supplicantD . WLCView AnswerAnswer: C
Which attribute is needed for Cisco ISE to profile a device with HTTP probe?
Which attribute is needed for Cisco ISE to profile a device with HTTP probe?A . user-agentB . OUIC . host-nameD . cdp-cache-platformE . dhcp-class-identifierF . sysDescrView AnswerAnswer: A
Which of the following statement is correct?
Scenario: Currently, many users are expehecing problems using their AnyConnect NAM supplicant to login to the network. The rr desktop support staff have already examined and vehfed the AnyConnect NAM configuration is correct. In this simulation, you are tasked to examine the various ISE GUI screens to determine the ISE...
When you configure an endpoint profiling policy rule, which option describes the purpose of the minimum certainty factor?
When you configure an endpoint profiling policy rule, which option describes the purpose of the minimum certainty factor?A . It is compared to the total certainty metric of an individual endpoint to determine whether the endpoint can be trusted.B . It is compared to the assigned certainty value of an...
If the given configuration is applied to the object-group vpnservers, during which time period are external users able to connect?
Refer to the exhibit. If the given configuration is applied to the object-group vpnservers, during which time period are external users able to connect?A . From Friday at 6:00 p.m. until Monday at 8:00 a.m.B . From Monday at 8:00 a.m. until Friday at 6:00 p.m.C . From Friday at...
What is a requirement for posture administration services in Cisco ISE?
What is a requirement for posture administration services in Cisco ISE?A . at least one Cisco router to store Cisco ISE profiling policiesB . Cisco NAC Agents that communicate with the Cisco ISE serverC . an ACL that points traffic to the Cisco ISE deploymentD . the advanced license package...
Which setting provides the best security for a WLAN and authenticates users against a centralized directory store?
Which setting provides the best security for a WLAN and authenticates users against a centralized directory store?A . WPA2 AES-CCMP and 801.X authenticationB . WPA2 AES-CCMP and PSK authenticationC . WPA2 TKIP and PSK authenticationD . WPA2 TKIP and 802.1X authenticationView AnswerAnswer: A
In an 802.1X authorization process, a network access device provides which three functions? (Choose three.)
In an 802.1X authorization process, a network access device provides which three functions? (Choose three.)A . Filters traffic prior to authenticationB . Passes credentials to authentication serverC . Enforces policy provided by authentication serverD . Hosts a central web authentication pageE . Confirms supplicant protocol complianceF . Validates authentication credentialsView...
If the user matches the given TACACS+ profile on Cisco ISE, which command can the user enter from shell prompt on a Cisco switch?
Refer to the exhibit. If the user matches the given TACACS+ profile on Cisco ISE, which command can the user enter from shell prompt on a Cisco switch?A . enableB . enable 10C . show runD . configure terminalView AnswerAnswer: B