Which two requirements should be included in this policy?
An engineer is configuring a guest password policy and needs to ensure that the password complexity requirements are set to mitigate brute force attacks. Which two requirements should be included in this policy? (Choose two)A . access code controlB . active username limitC . minimum password lengthD . user name...
If a user reports a device lost or stolen, which portal should be used to prevent the device from accessing the network while still providing information about why the device is blocked?
If a user reports a device lost or stolen, which portal should be used to prevent the device from accessing the network while still providing information about why the device is blocked?A . BYODB . Client ProvisioningC . GuestD . BlacklistView AnswerAnswer: D
Which command should be used to complete this configuration?
An engineer is implementing Cisco ISE and needs to configure 802.1X. The port settings are configured for port-based authentication. Which command should be used to complete this configuration?A . dot1x system-auth-controlB . aaa authentication dot1x default group radiusC . dot1x pae authenticatorD . authentication port-control autoView AnswerAnswer: A
Which persona should be configured with the largest amount of storage in this environment?
An engineer is configuring a virtual Cisco ISE deployment and needs each persona to be on a different node. Which persona should be configured with the largest amount of storage in this environment?A . Platform Exchange GridB . Monitoring and Trouble shooingC . Primary AdministrationD . Policy ServicesView AnswerAnswer: C
Which two responses from the RADIUS server to NAS are valid during the authentication process? (Choose two)
Which two responses from the RADIUS server to NAS are valid during the authentication process? (Choose two)A . access-acceptB . access-challengeC . access-responseD . access-requestE . access-reservedView AnswerAnswer: AB
During BYOD flow, where does a Microsoft Windows PC download the Network Setup Assistant from?
During BYOD flow, where does a Microsoft Windows PC download the Network Setup Assistant from?A . Native OTA functionalityB . Cisco ISE directlyC . Cisco App StoreD . Microsoft App StoreView AnswerAnswer: B
In a Cisco ISE split deployment model, which load is split between the nodes?
In a Cisco ISE split deployment model, which load is split between the nodes?A . AAAB . device admissionC . network admissionD . log collectionView AnswerAnswer: A
Which two features are available when the primary admin node is down and the secondary admin node has not been promoted? (Choose two)
Which two features are available when the primary admin node is down and the secondary admin node has not been promoted? (Choose two)A . new AD user 802.1X authenticationB . BYODC . guest AUPD . HotspotE . postureView AnswerAnswer: AE
What is the purpose of the ip http server command on a switch?
What is the purpose of the ip http server command on a switch?A . It enables the https server for users for web authenticationB . It enables MAB authentication on the switchC . It enables the switch to redirect users for web authentication.D . It enables dot1x authentication on the...
Client provisioning resources can be added into the Cisco ISE Administration node from which three of these? (Choose three.)
Client provisioning resources can be added into the Cisco ISE Administration node from which three of these? (Choose three.)A . FTPB . TFTPC . www-cisco.comD . local diskE . Posture Agent ProfileView AnswerAnswer: CDE