What must be done to ensure that both devices for a particular user are able to access the guest network simultaneously?

A network engineer is configuring guest access and notices that when a guest user registers a second device for access, the first device loses access. What must be done to ensure that both devices for a particular user are able to access the guest network simultaneously?A . Configure the sponsor...

January 13, 2023 No Comments READ MORE +

Which two methods should a sponsor select to create bulk guest accounts from the sponsor portal? (Choose two)

Which two methods should a sponsor select to create bulk guest accounts from the sponsor portal? (Choose two)A . Random B. Monthly C. Daily D. Imported E. KnownView AnswerAnswer: A,D

January 12, 2023 No Comments READ MORE +

Which protocol meets these requirements and why?

An administrator wants to configure network device administration and is trying to decide whether to use TACACS* or RADIUS. A reliable protocol must be used that can check command authorization. Which protocol meets these requirements and why?A . TACACS+ because it runs over TCP B. RADIUS because it runs over...

January 12, 2023 No Comments READ MORE +

What must be done to accomplish this goal?

There are several devices on a network that are considered critical and need to be placed into the ISE database and a policy used for them. The organization does not want to use profiling . What must be done to accomplish this goal?A . Enter the MAC address in the...

January 12, 2023 No Comments READ MORE +

Which action ensures the users are able to log into the network devices?

An administrator is configuring cisco ISE lo authenticate users logging into network devices using TACACS+ The administrator is not seeing any oí the authentication in the TACACS+ live logs . Which action ensures the users are able to log into the network devices?A . Enable the device administration service in...

January 12, 2023 No Comments READ MORE +

Which SSID type accomplishes this configuration?

An engineer is configuring a dedicated SSID for onboarding devices . Which SSID type accomplishes this configuration?A . dual B. hidden C. broadcast D. guestView AnswerAnswer: A Explanation: https://community.cisco.com/t5/security-documents/ise-byod-dual-vs-single-ssid-onboarding/ta-p/3641422 https://www.youtube.com/watch?v=HH_Xasqd9k4&ab_channel=CiscoISE-IdentityServicesEngine http://www.labminutes.com/sec0053_ise_1_1_byod_wireless_onboarding_dual_ssid

January 12, 2023 No Comments READ MORE +

An engineer is working with a distributed deployment of Cisco ISE and needs to configure various network probes to collect a set of attributes from the used to accomplish this task?

An engineer is working with a distributed deployment of Cisco ISE and needs to configure various network probes to collect a set of attributes from the used to accomplish this task?A . policy service B. monitoring C. pxGrid D. primary policy administratorView AnswerAnswer: B

January 11, 2023 No Comments READ MORE +

Which two features are available when the primary admin node is down and the secondary admin node has not been promoted? (Choose two.)

Which two features are available when the primary admin node is down and the secondary admin node has not been promoted? (Choose two.)A . hotspot B. new AD user 802 1X authentication C. posture D. BYOD E. guest AUPView AnswerAnswer: B,A

January 11, 2023 No Comments READ MORE +

Which Cisco ISE service allows an engineer to check the compliance of endpoints before connecting to the network?

Which Cisco ISE service allows an engineer to check the compliance of endpoints before connecting to the network?A . personas B. qualys C. nexpose D. postureView AnswerAnswer: D Explanation: https://www.cisco.com/c/en/us/td/docs/security/ise/2-1/admin_guide/b_ise_admin_guide_21/b_ise_admin_guide_20_chapter_010110.html Posture is a service in Cisco Identity Services Engine (Cisco ISE) that allows you to check the state, also known...

January 11, 2023 No Comments READ MORE +

Which use case validates a change of authorization?

Which use case validates a change of authorization?A . An authenticated, wired EAP-capable endpoint is discovered B. An endpoint profiling policy is changed for authorization policy. C. An endpoint that is disconnected from the network is discovered D. Endpoints are created through device registration for the guestsView AnswerAnswer: B Explanation:...

January 11, 2023 No Comments READ MORE +