Which two external identity stores support EAP-TLS and PEAP-TLS? (Choose two.)

Which two external identity stores support EAP-TLS and PEAP-TLS? (Choose two.)A . Active Directory B. RADIUS Token C. Internal Database D. RSA SecurlD E. LDAPView AnswerAnswer: A,E

April 25, 2023 No Comments READ MORE +

Which two commands should be run to complete the configuration?

Refer to the exhibit. A network engineers configuring the switch to accept downloadable ACLs from a Cisco ISC server. Which two commands should be run to complete the configuration? (Choose two)A . aaa authorization auth-proxy default group radius B. radius server vsa sand authentication C. radius-server attribute 8 include-in-access-req D....

April 25, 2023 No Comments READ MORE +

Why is this occurring?

An administrator is manually adding a device to a Cisco ISE identity group to ensure that it is able to access the network when needed without authentication Upon testing, the administrator notices that the device never hits the correct authorization policy line using the condition EndPoints LogicalProfile EQUALS static_list Why...

April 25, 2023 No Comments READ MORE +

What must be configured to accomplish this goal?

An engineer needs to configure Cisco ISE Profiling Services to authorize network access for IP speakers that require access to the intercom system. This traffic needs to be identified if the ToS bit is set to 5 and the destination IP address is the intercom system. What must be configured...

April 25, 2023 No Comments READ MORE +

Which two ports do network devices typically use for CoA? (Choose two)

Which two ports do network devices typically use for CoA? (Choose two)A . 443 B. 19005 C. 8080 D. 3799 E. 1700View AnswerAnswer: D,E

April 25, 2023 No Comments READ MORE +

Which task must be configured in order to meet this requirement?

A policy is being created in order to provide device administration access to the switches on a network. There is a requirement to ensure that if the session is not actively being used, after 10 minutes, it will be disconnected. Which task must be configured in order to meet this...

April 25, 2023 No Comments READ MORE +

Which profiling probe collects the user-agent string?

Which profiling probe collects the user-agent string?A . DHCP B. AD C. HTTP D. NMAPView AnswerAnswer: C

April 25, 2023 No Comments READ MORE +

Which protocol must be allowed for a BYOD device to access the BYOD portal?

Which protocol must be allowed for a BYOD device to access the BYOD portal?A . HTTP B. SMTP C. HTTPS D. SSHView AnswerAnswer: C

April 25, 2023 No Comments READ MORE +

An engineer is working with a distributed deployment of Cisco ISE and needs to configure various network probes to collect a set of attributes from the used to accomplish this task?

An engineer is working with a distributed deployment of Cisco ISE and needs to configure various network probes to collect a set of attributes from the used to accomplish this task?A . policy service B. monitoring C. pxGrid D. primary policy administratorView AnswerAnswer: B

April 24, 2023 No Comments READ MORE +

Which command is typed within the CU of a switch to view the troubleshooting output?

Refer to the exhibit: Which command is typed within the CU of a switch to view the troubleshooting output?A . show authentication sessions mac 000e.84af.59af details B. show authentication registrations C. show authentication interface gigabitethemet2/0/36 D. show authentication sessions methodView AnswerAnswer: A

April 24, 2023 No Comments READ MORE +