Which profiling probe collects the user-agent string?
Which profiling probe collects the user-agent string?A . DHCPB . ADC . HTTPD . NMAPView AnswerAnswer: C
What does the dot1x system-auth-control command do?
What does the dot1x system-auth-control command do?A . causes a network access switch not to track 802.1x sessionsB . globally enables 802.1xC . enables 802.1x on a network access device interfaceD . causes a network access switch to track 802.1x sessionsView AnswerAnswer: B Explanation: https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst4500/XE3-8-0E/15-24E/configuration/guide/xe-380-configuration/dot1x.html
How is policy services node redundancy achieved in a deployment?
How is policy services node redundancy achieved in a deployment?A . by enabling VIPB . by utilizing RADIUS server list on the NADC . by creating a node groupD . by deploying both primary and secondary nodeView AnswerAnswer: D
What gives Cisco ISE an option to scan endpoints for vulnerabilities?
What gives Cisco ISE an option to scan endpoints for vulnerabilities?A . authorization policyB . authentication policyC . authentication profileD . authorization profileView AnswerAnswer: D
a network?
What service can be enabled on the Cisco ISE node to identity the types of devices connecting to a network?A . MABB . profilingC . postureD . central web authenticationView AnswerAnswer: B
What are two components of the posture requirement when configuring Cisco ISE posture? (Choose two)
What are two components of the posture requirement when configuring Cisco ISE posture? (Choose two)A . updatesB . remediation actionsC . Client Provisioning portalD . conditionsE . access policyView AnswerAnswer: BD
Drag and Drop Question
Drag and Drop Question Drag the steps to configure a Cisco ISE node as a primary administration node from the left into the correct order on the night. View AnswerAnswer: Explanation: https://www.cisco.com/c/en/us/td/docs/security/ise/2-4/admin_guide/b_ise_admin_guide_24/b_ise_admin_guide_24_new_chapter_011.html Step 1 Choose Administration > System > Deployment. The Register button will be disabled initially. To enable this...
If a user reports a device lost or stolen, which portal should be used to prevent the device from accessing the network while still providing information about why the device is blocked?
If a user reports a device lost or stolen, which portal should be used to prevent the device from accessing the network while still providing information about why the device is blocked?A . Client ProvisioningB . GuestC . BYODD . BlacklistView AnswerAnswer: D Explanation: https://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/Borderless_Networks/Unified_Access/ BY OD_Design_Guide/Managing_Lost_or_Stolen_Device.html#90273 The Blacklist identity...
Which permission is common to the Active Directory Join and Leave operations?
Which permission is common to the Active Directory Join and Leave operations?A . Create a Cisco ISE machine account in the domain if the machine account does not already existB . Remove the Cisco ISE machine account from the domain.C . Set attributes on the Cisco ISE machine accountD ....
Which two task types are included in the Cisco ISE common tasks support for TACACS+ profiles? (Choose two.)
Which two task types are included in the Cisco ISE common tasks support for TACACS+ profiles? (Choose two.)A . FirepowerB . WLCC . IOSD . ASAE . ShellView AnswerAnswer: BE Explanation: https://www.cisco.com/c/en/us/td/docs/security/ise/2- 1/admin_guide/b_ise_admin_guide_21/b_ise_admin_guide_20_chapter_0100010.html TACACS+ Profile TACACS+ profiles control the initial login session of the device administrator. A session refers to...