Which Cisco ISE component intercepts HTTP and HTTPS requests and redirects them to the Guest User Portal?
Which Cisco ISE component intercepts HTTP and HTTPS requests and redirects them to the Guest User Portal?A . network access deviceB . Policy Service nodeC . Monitoring nodeD . Administration nodeView AnswerAnswer: A
Which two features must be used on Cisco ISE to enable the TACACS. feature? (Choose two)
Which two features must be used on Cisco ISE to enable the TACACS. feature? (Choose two)A . Device Administration LicenseB . Server SequenceC . Command SetsD . Device Admin ServiceE . External TACACS ServersView AnswerAnswer: E
What gives Cisco ISE an option to scan endpoints for vulnerabilities?
What gives Cisco ISE an option to scan endpoints for vulnerabilities?A . authorization policyB . authentication policyC . authentication profileD . authorization profileView AnswerAnswer: D
Which supplicant(s) and server(s) are capable of supporting EAR-CHAINING?
Which supplicant(s) and server(s) are capable of supporting EAR-CHAINING?A . Cisco AnyConnect NAM and Cisco Identity Service EngineB . Cisco AnyConnect NAM and Cisco Access Control ServerC . Cisco Secure Services Client and Cisco Access Control ServerD . Windows Native Supplicant and Cisco Identity Service EngineView AnswerAnswer: A
When configuring Active Directory groups, what does the Cisco ISE use to resolve ambiguous group names?
When configuring Active Directory groups, what does the Cisco ISE use to resolve ambiguous group names?A . MIBB . TGTC . OMABD . SIDView AnswerAnswer: D
What are two components of the posture requirement when configuring Cisco ISE posture? (Choose two)
What are two components of the posture requirement when configuring Cisco ISE posture? (Choose two)A . updatesB . remediation actionsC . Client Provisioning portalD . conditionsE . access policyView AnswerAnswer: BD
Which interface-level command is needed to turn on 802 1X authentication?
Which interface-level command is needed to turn on 802 1X authentication?A . Dofl1x pae authenticatorB . dot1x system-auth-controlC . authentication host-mode single-hostD . aaa server radius dynamic-authorView AnswerAnswer: A
Which two values are compared by the binary comparison function in authentication that is based on Active Directory? (Choose Two)
Which two values are compared by the binary comparison function in authentication that is based on Active Directory? (Choose Two)A . subject alternative name and the common nameB . MS-CHAFV2 provided machine credentials and credentials stored in Active DirectoryC . user-presented password hash and a hash stored in Active DirectoryD...
During BYOD flow, from where does a Microsoft Windows PC download the Network Setup Assistant?
During BYOD flow, from where does a Microsoft Windows PC download the Network Setup Assistant?A . Cisco App StoreB . Microsoft App StoreC . Cisco ISE directlyD . Native OTA functionalityView AnswerAnswer: A
What does the dot1x system-auth-control command do?
What does the dot1x system-auth-control command do?A . causes a network access switch not to track 802.1x sessionsB . globally enables 802.1xC . enables 802.1x on a network access device interfaceD . causes a network access switch to track 802.1x sessionsView AnswerAnswer: B Explanation: https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst4500/XE3-8-0E/15- 24E/configuration/guide/xe-380-configuration/dot1x.html