Filters
Question type

Study Flashcards

In which two ways can users and endpoints be classified for TrustSec? (Choose two.)


A) VLAN
B) dynamic
C) QoS
D) SGACL
E) SXP

F) A) and D)
G) None of the above

Correct Answer

verifed

verified

Which Cisco ISE service allows an engineer to check the compliance of endpoints before connecting to the network?


A) qualys
B) posture
C) personas
D) nexpose

E) C) and D)
F) B) and D)

Correct Answer

verifed

verified

Which profiling probe collects the user-agent string?


A) DHCP
B) HTTP
C) NMAP
D) AD

E) B) and C)
F) A) and C)

Correct Answer

verifed

verified

If a user reports a device lost or stolen, which portal should be used to prevent the device from accessing the network while still providing information about why the device is blocked?


A) Client Provisioning
B) BYOD
C) Guest
D) Block list

E) A) and C)
F) A) and B)

Correct Answer

verifed

verified

Which personas can a Cisco ISE node assume?


A) policy service, gatekeeping, and monitoring
B) administration, monitoring, and gatekeeping
C) administration, policy service, and monitoring
D) administration, policy service, gatekeeping

E) A) and C)
F) A) and D)

Correct Answer

verifed

verified

What are two requirements of generating a single certificate in Cisco ISE by using a certificate provisioning portal, without generating a certificate signing request? (Choose two.)


A) Enter the IP address of the device.
B) Enter the common name.
C) Choose the hashing method.
D) Locate the CSV file for the device MAC.
E) Select the certificate template.

F) C) and D)
G) A) and D)

Correct Answer

verifed

verified

Which two ports must be open between Cisco ISE and the client when you configure posture on Cisco ISE? (Choose two.)


A) TCP 80
B) TCP 8905
C) TCP 8443
D) TCP 8906
E) TCP 443

F) None of the above
G) C) and D)

Correct Answer

verifed

verified

If a user reports a device lost or stolen, which portal should be used to prevent the device from accessing the network while still providing information about why the device is blocked?


A) Client Provisioning
B) BYOD
C) Guest
D) Blacklist

E) B) and C)
F) All of the above

Correct Answer

verifed

verified

What allows an endpoint to obtain a digital certificate from Cisco ISE during a BYOD flow?


A) Application Visibility and Control
B) Supplicant Provisioning Wizard
C) My Devices Portal
D) Network Access Control

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

An engineer is configuring web authentication using non-standard ports and needs the switch to redirect traffic to the correct port. Which command should be used to accomplish this task?


A) permit tcp any any eq <port number>
B) ip http port <port number>
C) aaa group server radius
D) aaa group server radius proxy

E) A) and B)
F) B) and D)

Correct Answer

verifed

verified

An engineer is configuring a guest password policy and needs to ensure that the password complexity requirements are set to mitigate brute force attacks. Which two requirements should be included in this policy? (Choose two.)


A) active username limit
B) password expiration period
C) access code control
D) username expiration date
E) minimum password length

F) All of the above
G) A) and D)

Correct Answer

verifed

verified

What are two components of the posture requirement when configuring Cisco ISE posture? (Choose two.)


A) Client Provisioning portal
B) remediation actions
C) updates
D) access policy
E) conditions

F) A) and E)
G) B) and D)

Correct Answer

verifed

verified

Which are two characteristics of TACACS+? (Choose two.)


A) It separates authorization and authentication functions.
B) It combines authorization and authentication functions.
C) It uses UDP port 49.
D) It encrypts the password only.
E) It uses TCP port 49.

F) A) and E)
G) None of the above

Correct Answer

verifed

verified

During BYOD flow, where does a Microsoft Windows PC download the Network Setup Assistant?


A) Microsoft App Store
B) Cisco App Store
C) Cisco ISE directly
D) Native OTA functionality

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

During BYOD flow, from where does a Microsoft Windows PC download the Network Setup Assistant?


A) Microsoft App Store
B) Cisco App Store
C) Cisco ISE directly
D) Native OTA functionality

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

What is needed to configure wireless guest access on the network?


A) endpoint already profiled in ISE
B) WEBAUTH ACL for redirection
C) Captive Portal Bypass turned on
D) valid user account in Active Directory

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Which two task types are included in the Cisco ISE common tasks support for TACACS+ profiles? (Choose two.)


A) ASA
B) Firepower
C) Shell
D) WLC
E) IOS

F) A) and B)
G) A) and E)

Correct Answer

verifed

verified

Which two responses from the RADIUS server to NAS are valid during the authentication process? (Choose two.)


A) access-challenge
B) access-accept
C) access-request
D) access-reserved
E) access-response

F) A) and D)
G) A) and C)

Correct Answer

verifed

verified

What sends the redirect ACL that is configured in the authorization profile back to the Cisco WLC?


A) State attribute
B) Class attribute
C) Event
D) Cisco-av-pair

E) A) and D)
F) None of the above

Correct Answer

verifed

verified

Which permission is common to the Active Directory Join and Leave operations?


A) Remove the Cisco ISE machine account from the domain.
B) Search Active Directory to see if a Cisco ISE machine account already exists.
C) Set attributes on the Cisco ISE machine account.
D) Create a Cisco ISE machine account in the domain if the machine account does not already exist.

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

Showing 41 - 60 of 65

Related Exams

Show Answer