What is a method for transporting security group tags throughout the network?

What is a method for transporting security group tags throughout the network?A . by enabling 802.1AE on every network device B. by the Security Group Tag Exchange Protocol C. by embedding the security group tag in the IP header D. by embedding the security group tag in the 802.1Q headerView...

April 20, 2023 No Comments READ MORE +

Which two roles are taken on by the administration person within a Cisco ISE distributed environment? (Choose two.)

Which two roles are taken on by the administration person within a Cisco ISE distributed environment? (Choose two.)A . backup B. secondary C. standby D. primary E. activeView AnswerAnswer: B,D

April 20, 2023 No Comments READ MORE +

Which two actions must be verified to confirm that the internet is accessible via guest access when configuring a guest portal? (Choose two.)

Which two actions must be verified to confirm that the internet is accessible via guest access when configuring a guest portal? (Choose two.)A . The guest device successfully associates with the correct SSID. B. The guest user gets redirected to the authentication page when opening a browser. C. The guest...

April 20, 2023 No Comments READ MORE +

Which two events trigger a CoA for an endpoint when CoA is enabled globally for ReAuth? (Choose two.)

Which two events trigger a CoA for an endpoint when CoA is enabled globally for ReAuth? (Choose two.)A . endpoint marked as lost in My Devices Portal B. addition of endpoint to My Devices Portal C. endpoint profile transition from Apple-Device to Apple-iPhone D. endpoint profile transition from Unknown to...

April 20, 2023 No Comments READ MORE +

What must be done to accomplish this task?

An engineer has been tasked with standing up a new guest portal for customers that are waiting in the lobby. There is a requirement to allow guests to use their social media logins to access the guest network to appeal to more customers. What must be done to accomplish this...

April 20, 2023 No Comments READ MORE +

Which feature should be configured to achieve this in a scalable manner?

A network engineer must enforce access control using special tags, without re-engineering the network design. Which feature should be configured to achieve this in a scalable manner?A . SGT B. dACL C. VLAN D. RBACView AnswerAnswer: A

April 19, 2023 No Comments READ MORE +

Which alternate method should be used to tell users how to remediate?

MacOS users are complaining about having to read through wordy instructions when remediating their workstations to gam access to the network. Which alternate method should be used to tell users how to remediate?A . URL link B. message text C. executable D. file distributionView AnswerAnswer: A Explanation: https://www.sciencedirect.com/topics/computer-science/remediation-action

April 19, 2023 No Comments READ MORE +

Which command most be issued for this to work?

A network administrator is configuring a secondary cisco ISE node from the backup configuration of the primary cisco ISE node to create a high availability pair The Cisco ISE CA certificates and keys must be manually backed up from the primary Cisco ISE and copied into the secondary Cisco ISE....

April 19, 2023 No Comments READ MORE +

Which Cisco ISE deployment model is recommended for an enterprise that has over 50,000 concurrent active endpoints?

Which Cisco ISE deployment model is recommended for an enterprise that has over 50,000 concurrent active endpoints?A . large deployment with fully distributed nodes running all personas B. medium deployment with primary and secondary PAN/MnT/pxGrid nodes with shared PSNs C. medium deployment with primary and secondary PAN/MnT/pxGrid nodes with dedicated...

April 19, 2023 No Comments READ MORE +

What must be done to accomplish this task effciently?

An organization is migrating its current guest network to Cisco ISE and has 1000 guest users in the current database There are no resources to enter this information into the Cisco ISE database manually. What must be done to accomplish this task effciently?A . Use a CSV file to import...

April 18, 2023 No Comments READ MORE +