What are two benefits of TACACS+ versus RADIUS for device administration? (Choose two)
What are two benefits of TACACS+ versus RADIUS for device administration? (Choose two)A . TACACS+ supports 802.1X, and RADIUS supports MABB . TACACS+ uses UDP, and RADIUS uses TCPC . TACACS+ has command authorization, and RADIUS does not.D . TACACS+ provides the service type, and RADIUS does notE . TACACS+...
What should you include in the recommendation?
You need to recommend a solution to meet the security requirements of the junior database administrators. What should you include in the recommendation?A . A server roleB . A database roleC . A credentialD . A shared loginView AnswerAnswer: C Explanation: * Scenario: A group of junior database administrators must...
What is a method for transporting security group tags throughout the network?
What is a method for transporting security group tags throughout the network?A . by enabling 802.1AE on every network deviceB . by the Security Group Tag Exchange ProtocolC . by embedding the security group tag in the IP headerD . by embedding the security group tag in the 802.1Q headerView...
Which command displays all 802 1X/MAB sessions that are active on the switch ports of a Cisco Catalyst switch?
Which command displays all 802 1X/MAB sessions that are active on the switch ports of a Cisco Catalyst switch?A . show authentication sessions outputB . Show authentication sessionsC . show authentication sessions interface Gi 1/0/xD . show authentication sessions interface Gi1/0/x outputView AnswerAnswer: B
Which permission is common to the Active Directory Join and Leave operations?
Which permission is common to the Active Directory Join and Leave operations?A . Create a Cisco ISE machine account in the domain if the machine account does not already existB . Remove the Cisco ISE machine account from the domain.C . Set attributes on the Cisco ISE machine accountD ....
Which two fields are available when creating an endpoint on the context visibility page of Cisco IS? (Choose two)
Which two fields are available when creating an endpoint on the context visibility page of Cisco IS? (Choose two)A . Policy AssignmentB . Endpoint FamilyC . Identity Group AssignmentD . Security Group TagE . IP AddressView AnswerAnswer: AC
What is the purpose of the ip http server command on a switch?
What is the purpose of the ip http server command on a switch?A . It enables the https server for users for web authenticationB . It enables MAB authentication on the switchC . It enables the switch to redirect users for web authentication.D . It enables dot1x authentication on the...
Which two values are compared by the binary comparison function in authentication that is based on Active Directory? (Choose Two)
Which two values are compared by the binary comparison function in authentication that is based on Active Directory? (Choose Two)A . subject alternative name and the common nameB . MS-CHAFV2 provided machine credentials and credentials stored in Active DirectoryC . user-presented password hash and a hash stored in Active DirectoryD...
What does the dot1x system-auth-control command do?
What does the dot1x system-auth-control command do?A . causes a network access switch not to track 802.1x sessionsB . globally enables 802.1xC . enables 802.1x on a network access device interfaceD . causes a network access switch to track 802.1x sessionsView AnswerAnswer: B Explanation: https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst4500/XE3-8-0E/15- 24E/configuration/guide/xe-380-configuration/dot1x.html
In which two ways can users and endpoints be classified for TrustSec? (Choose two)
In which two ways can users and endpoints be classified for TrustSec? (Choose two)A . VLANB . SXPC . dynamicD . QoSE . SGACLView AnswerAnswer: AE