Which action do you take to define the global authorization exception policy by using a Device Admin Policy Set?
Which action do you take to define the global authorization exception policy by using a Device Admin Policy Set?A . Configure the policy by using Proxy Sequence mode.B . Configure a rule-based condition in a policy set.C . Define the policy for each group of devices.D . Define the policy...
Drag and drop the portals from the left onto the correct portal tasks on the right
DRAG DROP Drag and drop the portals from the left onto the correct portal tasks on the right. View AnswerAnswer: Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/security/ise/1-4/admin_guide/b_ise_admin_guide_14/b_ise_admin_guide_14_chapter_010000.html
Which ISE flow mode does this diagram represent?
Refer to the exhibit. Which ISE flow mode does this diagram represent?A . Closed modeB . Monitor modeC . Application modeD . Low-impact modeView AnswerAnswer: B
In an 802. 1X deployment what two components are responsible for facilitating the authentication process? (Choose two.)
In an 802. 1X deployment what two components are responsible for facilitating the authentication process? (Choose two.)A . MACSecB . MAC addressC . an authentication serverD . a routerE . a supplicantView AnswerAnswer: CE Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/Security/TrustSec_1-99/Dot1X_Deployment/Dot1x_Dep_Guide.html
Which ISE deployment mode is similar to the industry standard 802 1X behavior?
Which ISE deployment mode is similar to the industry standard 802 1X behavior?A . policy modeB . monitor modeC . closed modeD . low-impact modeView AnswerAnswer: C
When configuring a BYOD portal, which two tasks must be completed? (Choose two.)
When configuring a BYOD portal, which two tasks must be completed? (Choose two.)A . Enable policy services.B . Create endpoint identity groupsC . Customize device portalsD . Create a client provisioning portal.E . Create external identity sources.View AnswerAnswer: AB Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/security/ise/1- 4/admin_guide/b_ise_admin_guide_14/b_ise_admin_guide_14_chapter_010000.html
Which description of the cause of this issue is true?
A network administrator found that the IP device tracking table on a switch is not getting updated when the client has a static IP address, but if the address is from DHCP, the table is getting updated. Which description of the cause of this issue is true?A . The switch...
Which two statements about RADIUS are true1? (Choose two.)
Which two statements about RADIUS are true1? (Choose two.)A . It uses UDP ports 1812 and 1813.B . It encrypts the payload.C . It encrypts the password onlyD . It uses TCP ports 1812 and 1813.E . It separates authorization and authentication functionsView AnswerAnswer: AC Explanation: Reference: https://www.cisco.com/c/en/us/support/docs/security-vpn/remote-authentication-dial-user-service-radius/13838-10.html#comp_udp_tcp
Which type of guest deployment is needed to allow the Client Provisioning portal?
A wireless deployment must check guest device compliance before allowing access to the network. Which type of guest deployment is needed to allow the Client Provisioning portal?A . central web authenticationB . sponsoredC . hotspotD . self-registeredView AnswerAnswer: A
Which internal Cisco ISE component reduces demand on JVM memory by limiting the number of devices the profiler handles?
Which internal Cisco ISE component reduces demand on JVM memory by limiting the number of devices the profiler handles?A . eventHandlerQueueStzeB . maxEndPomtslnLocalDbC . NetworkDeviceEventHandterD . forwarderQueueSizeView AnswerAnswer: A