Which two external identity stores support EAP-TLS and PEAP-TLS? (Choose two.)
Which two external identity stores support EAP-TLS and PEAP-TLS? (Choose two.)A . Active Directory B. RADIUS Token C. Internal Database D. RSA SecurlD E. LDAPView AnswerAnswer: A,E
Which two commands should be run to complete the configuration?
Refer to the exhibit. A network engineers configuring the switch to accept downloadable ACLs from a Cisco ISC server. Which two commands should be run to complete the configuration? (Choose two)A . aaa authorization auth-proxy default group radius B. radius server vsa sand authentication C. radius-server attribute 8 include-in-access-req D....
Why is this occurring?
An administrator is manually adding a device to a Cisco ISE identity group to ensure that it is able to access the network when needed without authentication Upon testing, the administrator notices that the device never hits the correct authorization policy line using the condition EndPoints LogicalProfile EQUALS static_list Why...
What must be configured to accomplish this goal?
An engineer needs to configure Cisco ISE Profiling Services to authorize network access for IP speakers that require access to the intercom system. This traffic needs to be identified if the ToS bit is set to 5 and the destination IP address is the intercom system. What must be configured...
Which two ports do network devices typically use for CoA? (Choose two)
Which two ports do network devices typically use for CoA? (Choose two)A . 443 B. 19005 C. 8080 D. 3799 E. 1700View AnswerAnswer: D,E
Which task must be configured in order to meet this requirement?
A policy is being created in order to provide device administration access to the switches on a network. There is a requirement to ensure that if the session is not actively being used, after 10 minutes, it will be disconnected. Which task must be configured in order to meet this...
Which profiling probe collects the user-agent string?
Which profiling probe collects the user-agent string?A . DHCP B. AD C. HTTP D. NMAPView AnswerAnswer: C
Which protocol must be allowed for a BYOD device to access the BYOD portal?
Which protocol must be allowed for a BYOD device to access the BYOD portal?A . HTTP B. SMTP C. HTTPS D. SSHView AnswerAnswer: C
An engineer is working with a distributed deployment of Cisco ISE and needs to configure various network probes to collect a set of attributes from the used to accomplish this task?
An engineer is working with a distributed deployment of Cisco ISE and needs to configure various network probes to collect a set of attributes from the used to accomplish this task?A . policy service B. monitoring C. pxGrid D. primary policy administratorView AnswerAnswer: B
Which command is typed within the CU of a switch to view the troubleshooting output?
Refer to the exhibit: Which command is typed within the CU of a switch to view the troubleshooting output?A . show authentication sessions mac 000e.84af.59af details B. show authentication registrations C. show authentication interface gigabitethemet2/0/36 D. show authentication sessions methodView AnswerAnswer: A