What is the deployment mode when two Cisco ISE nodes are configured in an environment?
What is the deployment mode when two Cisco ISE nodes are configured in an environment?A . distributedB . activeC . standaloneD . standardView AnswerAnswer: A
Which portal must the security engineer configure to accomplish this task?
An engineer is designing a BYOD environment utilizing Cisco ISE for devices that do not support native supplicants. Which portal must the security engineer configure to accomplish this task?A . MDMB . Client provisioningC . My devicesD . BYODView AnswerAnswer: C Explanation: https://www.cisco.com/c/en/us/td/docs/security/ise/2-2/admin_guide/b_ise_admin_guide_22/b_ise_admin_guide_22_chapter_01111.html
Which configuration is required in the Cisco ISE authentication policy to allow Central Web Authentication?
Which configuration is required in the Cisco ISE authentication policy to allow Central Web Authentication?A . MAB and if user not found, continueB . MAB and if authentication failed, continueC . Dot1x and if user not found, continueD . Dot1x and if authentication failed, continueView AnswerAnswer: A
Which two actions occur when a Cisco ISE server device administrator logs in to a device? (Choose two)
Which two actions occur when a Cisco ISE server device administrator logs in to a device? (Choose two)A . The device queries the internal identity storeB . The Cisco ISE server queries the internal identity storeC . The device queries the external identity storeD . The Cisco ISE server queries...
What is the issue"?
An administrator adds a new network device to the Cisco ISE configuration to authenticate endpoints to the network. The RADIUS test fails after the administrator configures all of the settings in Cisco ISE and adds the proper configurations to the switch . What is the issue"?A . The endpoint profile...
Which two probes will provide this information without forwarding SPAN packets to Cisco ISE?
When setting up profiling in an environment using Cisco ISE for network access control, an organization must use non-proprietary protocols for collecting the information at layer 2 . Which two probes will provide this information without forwarding SPAN packets to Cisco ISE? {Choose two.)A . DHCP SPAN probeB . SNMP...
What sends the redirect ACL that is configured in the authorization profile back to the Cisco WLC?
What sends the redirect ACL that is configured in the authorization profile back to the Cisco WLC?A . Cisco-av-pairB . Class attributeC . EventD . State attributeView AnswerAnswer: A
Which are two characteristics of TACACS+? (Choose two)
Which are two characteristics of TACACS+? (Choose two)A . It uses TCP port 49.B . It combines authorization and authentication functions.C . It separates authorization and authentication functions.D . It encrypts the password only.E . It uses UDP port 49.View AnswerAnswer: A,C
Which command should the engineer run on the interface to accomplish this goal?
A network security engineer needs to configure 802.1X port authentication to allow a single host to be authenticated for data and another single host to be authenticated for voice . Which command should the engineer run on the interface to accomplish this goal?A . authentication host-mode single-hostB . authentication host-mode...
Which two requirement complete this policy?
An engineer is configuring a guest password policy and needs to ensure that the password complexity requirements are set to mitigate brute force attacks . Which two requirement complete this policy? (Choose two)A . minimum password lengthB . active username limitC . access code controlD . gpassword expiration periodE ....