Which values are compared by the binary comparison function in authentication that is based on Active Directory?
Which values are compared by the binary comparison function in authentication that is based on Active Directory?A . subject alterative name and the common nameB . user-presented certificate and a certificate stored in Active Directory.C . MS-CHAPV 2 provided machine credentials and credentials stored in Active DirectoryD . user-presented password...
Which port does Cisco ISE use for native supplicant provisioning of a Windows laptop?
Which port does Cisco ISE use for native supplicant provisioning of a Windows laptop?A . TCP 443B . TCP 8909C . UDP 1812D . TCP 8905View AnswerAnswer: D
Which type of access list should be used for this configuration?
An engineer is configuring web authentication and needs to allow specific protocols to permit DNS traffic. Which type of access list should be used for this configuration?A . extended ACLB . standard ACLC . reflexive ACLD . numbered ACLView AnswerAnswer: A
Using the Cisco ISE Guest Sponsor Portal, which guest services can the receptionist provide?
A network administrator has just added a front desk receptionist account to the Cisco ISE Guest Service sponsor group. Using the Cisco ISE Guest Sponsor Portal, which guest services can the receptionist provide?A . Create and manage guest user accountsB . Keep track of guest user act vi ties.C ....
Which two ports must be open between Cisco ISE and the client when you configure posture on Cisco ISE? (Choose two.)
Which two ports must be open between Cisco ISE and the client when you configure posture on Cisco ISE? (Choose two.)A . TCP 8443B . TCP 443C . TCP 8905D . TCP 80E . TCP 8906View AnswerAnswer: AC
What gives Cisco ISE an option to scan endpoints for vulnerabilities?
What gives Cisco ISE an option to scan endpoints for vulnerabilities?A . authorization policyB . authentication profileC . authorization profileD . authentication policyView AnswerAnswer: A
Which two requirements should be included in this policy?
An engineer is configuring a guest password policy and needs to ensure that the password complexity requirements are set to mitigate brute force attacks. Which two requirements should be included in this policy? (Choose two)A . access code controlB . active username limitC . minimum password lengthD . user name...
If a user reports a device lost or stolen, which portal should be used to prevent the device from accessing the network while still providing information about why the device is blocked?
If a user reports a device lost or stolen, which portal should be used to prevent the device from accessing the network while still providing information about why the device is blocked?A . BYODB . Client ProvisioningC . GuestD . BlacklistView AnswerAnswer: D
Which command should be used to complete this configuration?
An engineer is implementing Cisco ISE and needs to configure 802.1X. The port settings are configured for port-based authentication. Which command should be used to complete this configuration?A . dot1x system-auth-controlB . aaa authentication dot1x default group radiusC . dot1x pae authenticatorD . authentication port-control autoView AnswerAnswer: A
Which persona should be configured with the largest amount of storage in this environment?
An engineer is configuring a virtual Cisco ISE deployment and needs each persona to be on a different node. Which persona should be configured with the largest amount of storage in this environment?A . Platform Exchange GridB . Monitoring and Trouble shooingC . Primary AdministrationD . Policy ServicesView AnswerAnswer: C