Which permission is common to the Active Directory Join and Leave operations?
Which permission is common to the Active Directory Join and Leave operations?A . Create a Cisco ISE machine account in the domain if the machine account does not already existB . Remove the Cisco ISE machine account from the domain.C . Set attributes on the Cisco ISE machine accountD ....
Which two fields are available when creating an endpoint on the context visibility page of Cisco IS? (Choose two)
Which two fields are available when creating an endpoint on the context visibility page of Cisco IS? (Choose two)A . Policy AssignmentB . Endpoint FamilyC . Identity Group AssignmentD . Security Group TagE . IP AddressView AnswerAnswer: AC
What is the purpose of the ip http server command on a switch?
What is the purpose of the ip http server command on a switch?A . It enables the https server for users for web authenticationB . It enables MAB authentication on the switchC . It enables the switch to redirect users for web authentication.D . It enables dot1x authentication on the...
Which two values are compared by the binary comparison function in authentication that is based on Active Directory? (Choose Two)
Which two values are compared by the binary comparison function in authentication that is based on Active Directory? (Choose Two)A . subject alternative name and the common nameB . MS-CHAFV2 provided machine credentials and credentials stored in Active DirectoryC . user-presented password hash and a hash stored in Active DirectoryD...
What does the dot1x system-auth-control command do?
What does the dot1x system-auth-control command do?A . causes a network access switch not to track 802.1x sessionsB . globally enables 802.1xC . enables 802.1x on a network access device interfaceD . causes a network access switch to track 802.1x sessionsView AnswerAnswer: B Explanation: https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst4500/XE3-8-0E/15- 24E/configuration/guide/xe-380-configuration/dot1x.html
In which two ways can users and endpoints be classified for TrustSec? (Choose two)
In which two ways can users and endpoints be classified for TrustSec? (Choose two)A . VLANB . SXPC . dynamicD . QoSE . SGACLView AnswerAnswer: AE
Client provisioning resources can be added into the Cisco ISE Administration node from which three of these? (Choose three.)
Client provisioning resources can be added into the Cisco ISE Administration node from which three of these? (Choose three.)A . FTPB . TFTPC . www-cisco.comD . local diskE . Posture Agent ProfileView AnswerAnswer: CDE
How is policy services node redundancy achieved in a deployment?
How is policy services node redundancy achieved in a deployment?A . by enabling VIPB . by utilizing RADIUS server list on the NADC . by creating a node groupD . by deploying both primary and secondary nodeView AnswerAnswer: D
Which profiling probe collects the user-agent string?
Which profiling probe collects the user-agent string?A . DHCPB . ADC . HTTPD . NMAPView AnswerAnswer: C
What are the three functional requirements and their associated VMware technologies?
The hardware operations team is planning to purchase new ESXi hosts for the upcoming budget year and is requesting recommendations on the type of servers to purchase for a web application. The web application consists of hundreds of small virtual machines (1 vCPU and 8GB of RAM) that are members...