Which permission is common to the Active Directory Join and Leave operations?

Which permission is common to the Active Directory Join and Leave operations?A . Create a Cisco ISE machine account in the domain if the machine account does not already existB . Remove the Cisco ISE machine account from the domain.C . Set attributes on the Cisco ISE machine accountD ....

May 16, 2020 No Comments READ MORE +

Which two fields are available when creating an endpoint on the context visibility page of Cisco IS? (Choose two)

Which two fields are available when creating an endpoint on the context visibility page of Cisco IS? (Choose two)A . Policy AssignmentB . Endpoint FamilyC . Identity Group AssignmentD . Security Group TagE . IP AddressView AnswerAnswer: AC

May 15, 2020 No Comments READ MORE +

What is the purpose of the ip http server command on a switch?

What is the purpose of the ip http server command on a switch?A . It enables the https server for users for web authenticationB . It enables MAB authentication on the switchC . It enables the switch to redirect users for web authentication.D . It enables dot1x authentication on the...

May 15, 2020 No Comments READ MORE +

Which two values are compared by the binary comparison function in authentication that is based on Active Directory? (Choose Two)

Which two values are compared by the binary comparison function in authentication that is based on Active Directory? (Choose Two)A . subject alternative name and the common nameB . MS-CHAFV2 provided machine credentials and credentials stored in Active DirectoryC . user-presented password hash and a hash stored in Active DirectoryD...

May 15, 2020 No Comments READ MORE +

What does the dot1x system-auth-control command do?

What does the dot1x system-auth-control command do?A . causes a network access switch not to track 802.1x sessionsB . globally enables 802.1xC . enables 802.1x on a network access device interfaceD . causes a network access switch to track 802.1x sessionsView AnswerAnswer: B Explanation: https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst4500/XE3-8-0E/15- 24E/configuration/guide/xe-380-configuration/dot1x.html

May 15, 2020 No Comments READ MORE +

In which two ways can users and endpoints be classified for TrustSec? (Choose two)

In which two ways can users and endpoints be classified for TrustSec? (Choose two)A . VLANB . SXPC . dynamicD . QoSE . SGACLView AnswerAnswer: AE

May 14, 2020 No Comments READ MORE +

Client provisioning resources can be added into the Cisco ISE Administration node from which three of these? (Choose three.)

Client provisioning resources can be added into the Cisco ISE Administration node from which three of these? (Choose three.)A . FTPB . TFTPC . www-cisco.comD . local diskE . Posture Agent ProfileView AnswerAnswer: CDE

May 12, 2020 No Comments READ MORE +

How is policy services node redundancy achieved in a deployment?

How is policy services node redundancy achieved in a deployment?A . by enabling VIPB . by utilizing RADIUS server list on the NADC . by creating a node groupD . by deploying both primary and secondary nodeView AnswerAnswer: D

May 12, 2020 No Comments READ MORE +

Which profiling probe collects the user-agent string?

Which profiling probe collects the user-agent string?A . DHCPB . ADC . HTTPD . NMAPView AnswerAnswer: C

May 12, 2020 No Comments READ MORE +

What are the three functional requirements and their associated VMware technologies?

The hardware operations team is planning to purchase new ESXi hosts for the upcoming budget year and is requesting recommendations on the type of servers to purchase for a web application. The web application consists of hundreds of small virtual machines (1 vCPU and 8GB of RAM) that are members...

May 11, 2020 No Comments READ MORE +