What are two components of the posture requirement when configuring Cisco ISE posture? (Choose two)

What are two components of the posture requirement when configuring Cisco ISE posture? (Choose two)A . updatesB . remediation actionsC . Client Provisioning portalD . conditionsE . access policyView AnswerAnswer: B, D

August 12, 2024 No Comments READ MORE +

Which two protocols should complete this task?

A network engineer needs to ensure that the access credentials are not exposed during the 802.1x authentication among components. Which two protocols should complete this task?A . PEAPB . EAP-MD5C . LEAPD . EAP-TLSE . EAP-TTLSView AnswerAnswer: B, D

August 12, 2024 No Comments READ MORE +

What does the dot1x system-auth-control command do?

What does the dot1x system-auth-control command do?A . causes a network access switch not to track 802.1x sessionsB . globally enables 802.1xC . enables 802.1x on a network access device interfaceD . causes a network access switch to track 802.1x sessionsView AnswerAnswer: B Explanation: https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst4500/XE3-8-0E/15-24E/configuration/guide/xe-380-configuration/dot1x.html

August 11, 2024 No Comments READ MORE +

Which RADIUS attribute is used to dynamically assign the Inactivity active timer for MAB users from the Cisco ISE node?

Which RADIUS attribute is used to dynamically assign the Inactivity active timer for MAB users from the Cisco ISE node?A . session timeoutB . idle timeoutC . radius-server timeoutD . termination-actionView AnswerAnswer: B Explanation: When the inactivity timer is enabled, the switch monitors the activity from authenticated endpoints. When the...

August 11, 2024 No Comments READ MORE +

Which two default endpoint identity groups does Cisco ISE create? (Choose two)

Which two default endpoint identity groups does Cisco ISE create? (Choose two)A . block listB . endpointC . profiledD . allow listE . unknownView AnswerAnswer: C, E Explanation: https://www.cisco.com/c/en/us/td/docs/security/ise/2-1/admin_guide/b_ise_admin_guide_21/b_ise_admin_guide_20_chapter_010100.html Default Endpoint Identity Groups Created for EndpointsCisco ISE creates the following five endpoint identity groups by default: Blacklist, GuestEndpoints, Profiled, RegisteredDevices,...

August 11, 2024 No Comments READ MORE +

Which two responses from the RADIUS server to NAS are valid during the authentication process? (Choose two)

Which two responses from the RADIUS server to NAS are valid during the authentication process? (Choose two)A . access-responseB . access-requestC . access-reservedD . access-acceptE . access-challengeView AnswerAnswer: B, D

August 11, 2024 No Comments READ MORE +

What gives Cisco ISE an option to scan endpoints for vulnerabilities?

What gives Cisco ISE an option to scan endpoints for vulnerabilities?A . authorization policyB . authentication policyC . authentication profileD . authorization profileView AnswerAnswer: A

August 11, 2024 No Comments READ MORE +

Which three default endpoint identity groups does cisco ISE create? (Choose three)

Which three default endpoint identity groups does cisco ISE create? (Choose three)A . UnknownB . whitelistC . end pointD . profiledE . blacklistView AnswerAnswer: A, D , E Explanation: Default Endpoint Identity Groups Created for Endpoints Cisco ISE creates the following five endpoint identity groups by default: Blacklist, GuestEndpoints, Profiled,...

August 11, 2024 No Comments READ MORE +

Which two requirement complete this policy?

An engineer is configuring a guest password policy and needs to ensure that the password complexity requirements are set to mitigate brute force attacks. Which two requirement complete this policy? (Choose two)A . minimum password lengthB . active username limitC . access code controlD . gpassword expiration periodE . username...

August 10, 2024 No Comments READ MORE +

Which two values are compared by the binary comparison (unction in authentication that is based on Active Directory?

Which two values are compared by the binary comparison (unction in authentication that is based on Active Directory?A . subject alternative name and the common nameB . MS-CHAPv2 provided machine credentials and credentials stored in Active DirectoryC . user-presented password hash and a hash stored in Active DirectoryD . user-presented...

August 10, 2024 No Comments READ MORE +