Which use case validates a change of authorization?
Which use case validates a change of authorization?A . An authenticated, wired EAP-capable endpoint is discoveredB . An endpoint profiling policy is changed for authorization policy.C . An endpoint that is disconnected from the network is discoveredD . Endpoints are created through device registration for the guestsView AnswerAnswer: B Explanation:...
What is a characteristic of the UDP protocol?
What is a characteristic of the UDP protocol?A . UDP can detect when a server is down.B . UDP offers best-effort deliveryC . UDP can detect when a server is slowD . UDP offers information about a non-existent serverView AnswerAnswer: B Explanation: https://www.cisco.com/c/en/us/support/docs/security-vpn/remote-authentication-dial-user-service-radius/13838-10.html
Which Cisco ISE service allows an engineer to check the compliance of endpoints before connecting to the network?
Which Cisco ISE service allows an engineer to check the compliance of endpoints before connecting to the network?A . personasB . qualysC . nexposeD . postureView AnswerAnswer: D Explanation: https://www.cisco.com/c/en/us/td/docs/security/ise/2-1/admin_guide/b_ise_admin_guide_21/b_ise_admin_guide_20_chapter_010110.html Posture is a service in Cisco Identity Services Engine (Cisco ISE) that allows you to check the state, also known...
Drag the descriptions on the left onto the components of 802.1X on the right
DRAG DROP Drag the descriptions on the left onto the components of 802.1X on the right. View AnswerAnswer: Explanation: https://netlabz.wordpress.com/2016/09/24/cisco-ise-fundamentals/
What must be done in order to provide the CA this information?
An administrator is attempting to replace the built-in self-signed certificates on a Cisco ISE appliance. The CA is requesting some information about the appliance in order to sign the new certificate . What must be done in order to provide the CA this information? A. Install the Root CA and...
A network engineer is configuring a network device that needs to filter traffic based on security group tags using a security policy on a routed into this task?
A network engineer is configuring a network device that needs to filter traffic based on security group tags using a security policy on a routed into this task?A . cts authorization listB . cts role-based enforcementC . cts cache enableD . cts role-based policy priority-staticView AnswerAnswer: B
The phones do not have the ability to auto switch port for authentication?
An administrator is adding a switch to a network that is running Cisco ISE and is only for IP Phones. The phones do not have the ability to auto switch port for authentication?A . enable bypass-MACB . dot1x system-auth-controlC . mabD . enable network-authenticationView AnswerAnswer: B
Which two components are required for creating a Native Supplicant Profile within a BYOD flow? (Choose two)
Which two components are required for creating a Native Supplicant Profile within a BYOD flow? (Choose two)A . Windows SettingsB . Connection TypeC . iOS SettingsD . Redirect ACLE . Operating SystemView AnswerAnswer: B,E Explanation: https://www.cisco.com/c/en/us/td/docs/security/ise/2-1/admin_guide/b_ise_admin_guide_21/b_ise_admin_guide_20_chapter_010101.html #reference_21024A3B2B27427EAC78495E56962729
Which two roles are taken on by the administration person within a Cisco ISE distributed environment? (Choose two.)
Which two roles are taken on by the administration person within a Cisco ISE distributed environment? (Choose two.)A . backupB . secondaryC . standbyD . primaryE . activeView AnswerAnswer: B,D
Which type of access list should be used for this configuration?
An engineer is configuring web authentication and needs to allow specific protocols to permit DNS traffic . Which type of access list should be used for this configuration?A . reflexive ACLB . extended ACLC . standard ACLD . numbered ACLView AnswerAnswer: B