Which use case validates a change of authorization?
Which use case validates a change of authorization?A . An authenticated, wired EAP-capable endpoint is discovered.B . An endpoint prof g policy is changed for authorization policy.C . An endpoint that is disconnected from the network is discoveredD . Endpoints are created through device registration for the guestsView AnswerAnswer: B
Which two ports do network devices typically use for CoA? (Choose two.)
Which two ports do network devices typically use for CoA? (Choose two.)A . 1700B . 19005C . 443D . 80802E . 3799View AnswerAnswer: AE
Which two features must be used on Cisco ISE to enable the TACACS+ feature? (Choose two.)
Which two features must be used on Cisco ISE to enable the TACACS+ feature? (Choose two.)A . Device Administration LicenseB . Server SequenceC . External TACACS ServersD . Command SetsE . Device Admin ServiceView AnswerAnswer: AE
Which command should be used to accomplish this task?
A network engineer is configuring a network device that needs to filter traffic based on security group tags using a security policy on a routed interface. Which command should be used to accomplish this task?A . cts authorization listB . cts role-based enforcementC . cts role-based policy priority-staticD . cts...
Which values are compared by the binary comparison function in authentication that is based on Active Directory?
Which values are compared by the binary comparison function in authentication that is based on Active Directory?A . subject alterative name and the common nameB . user-presented certificate and a certificate stored in Active Directory.C . MS-CHAPV 2 provided machine credentials and credentials stored in Active DirectoryD . user-presented password...
Which port does Cisco ISE use for native supplicant provisioning of a Windows laptop?
Which port does Cisco ISE use for native supplicant provisioning of a Windows laptop?A . TCP 443B . TCP 8909C . UDP 1812D . TCP 8905View AnswerAnswer: D
Which type of access list should be used for this configuration?
An engineer is configuring web authentication and needs to allow specific protocols to permit DNS traffic. Which type of access list should be used for this configuration?A . extended ACLB . standard ACLC . reflexive ACLD . numbered ACLView AnswerAnswer: A
Using the Cisco ISE Guest Sponsor Portal, which guest services can the receptionist provide?
A network administrator has just added a front desk receptionist account to the Cisco ISE Guest Service sponsor group. Using the Cisco ISE Guest Sponsor Portal, which guest services can the receptionist provide?A . Create and manage guest user accountsB . Keep track of guest user act vi ties.C ....
Which two ports must be open between Cisco ISE and the client when you configure posture on Cisco ISE? (Choose two.)
Which two ports must be open between Cisco ISE and the client when you configure posture on Cisco ISE? (Choose two.)A . TCP 8443B . TCP 443C . TCP 8905D . TCP 80E . TCP 8906View AnswerAnswer: AC
What gives Cisco ISE an option to scan endpoints for vulnerabilities?
What gives Cisco ISE an option to scan endpoints for vulnerabilities?A . authorization policyB . authentication profileC . authorization profileD . authentication policyView AnswerAnswer: A