What must be done to ensure that both devices for a particular user are able to access the guest network simultaneously?

A network engineer is configuring guest access and notices that when a guest user registers a second device for access, the first device loses access. What must be done to ensure that both devices for a particular user are able to access the guest network simultaneously?A . Configure the sponsor...

April 15, 2023 No Comments READ MORE +

Which action accomplishes this task for VPN users?

An engineer tests Cisco ISE posture services on the network and must configure the compliance module to automatically download and install on endpoints. Which action accomplishes this task for VPN users?A . Create a Cisco AnyConnect configuration and Client Provisioning policy within Cisco ISE. B. Configure the compliance module to...

April 15, 2023 No Comments READ MORE +

An engineer needs to configure a compliance policy on Cisco ISE to ensure that the latest encryption software is running on the C drive of all endpoints

DRAG DROP An engineer needs to configure a compliance policy on Cisco ISE to ensure that the latest encryption software is running on the C drive of all endpoints. Drag and drop the configuration steps from the left into the sequence on the right to accomplish this task. View AnswerAnswer:...

April 15, 2023 No Comments READ MORE +

Which configuration should be used when authentication is disabled and third-party switches are in use?

An engineer is configuring static SGT classification. Which configuration should be used when authentication is disabled and third-party switches are in use?A . VLAN to SGT mapping B. IP Address to SGT mapping C. L3IF to SGT mapping D. Subnet to SGT mappingView AnswerAnswer: B Explanation: https://community.cisco.com/t5/security-knowledge-base/segmentation-strategy/ta-p/3757424: "The method of...

April 14, 2023 No Comments READ MORE +

What must be done so that the port will allow voice and multiple data endpoints?

An administrator is configuring a switch port for use with 802 1X. What must be done so that the port will allow voice and multiple data endpoints?A . Configure the port with the authentication host-mode multi-auth command B. Connect the data devices to the port, then attach the phone behind...

April 14, 2023 No Comments READ MORE +

What is the minimum certainty factor when creating a profiler policy?

What is the minimum certainty factor when creating a profiler policy?A . the minimum number that a predefined condition provides B. the maximum number that a predefined condition provides C. the minimum number that a device certainty factor must reach to become a member of the profile D. the maximum...

April 14, 2023 No Comments READ MORE +

If a user reports a device lost or stolen, which portal should be used to prevent the device from accessing the network while still providing information about why the device is blocked?

If a user reports a device lost or stolen, which portal should be used to prevent the device from accessing the network while still providing information about why the device is blocked?A . Client Provisioning B. Guest C. BYOD D. BlacklistView AnswerAnswer: D Explanation: https://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/Borderless_Networks/Unified_Access/BYOD_Design_Guide/Managing_Lost_or_Stolen_Device.html#90273 The Blacklist identity group is...

April 14, 2023 No Comments READ MORE +

What must be done to accomplish this task?

An administrator is trying to collect metadata information about the traffic going across the network to gam added visibility into the hosts. This Information will be used to create profiling policies for devices us mg Cisco ISE so that network access policies can be used. What must be done to...

April 14, 2023 No Comments READ MORE +

What must be created to accomplish this task?

The IT manager wants to provide different levels of access to network devices when users authenticate using TACACS+. The company needs specific commands to be allowed based on the Active Directory group membership of the different roles within the IT department. The solution must minimize the number of objects created...

April 14, 2023 No Comments READ MORE +

Which two methods should a sponsor select to create bulk guest accounts from the sponsor portal? (Choose two)

Which two methods should a sponsor select to create bulk guest accounts from the sponsor portal? (Choose two)A . Random B. Monthly C. Daily D. Imported E. KnownView AnswerAnswer: A,D

April 14, 2023 No Comments READ MORE +