Which configuration is causing this problem?

A Cisco ISE administrator needs to ensure that guest endpoint registrations are only valid for one day When testing the guest policy flow, the administrator sees that the Cisco ISE does not delete the endpoint in the Guest Endpoints identity store after one day and allows access to the guest...

April 4, 2022 No Comments READ MORE +

Which two methods should a sponsor select to create bulk guest accounts from the sponsor portal? (Choose two)

Which two methods should a sponsor select to create bulk guest accounts from the sponsor portal? (Choose two)A . RandomB . MonthlyC . DailyD . ImportedE . KnownView AnswerAnswer: A,D

April 4, 2022 No Comments READ MORE +

Which two features are available when the primary admin node is down and the secondary admin node has not been promoted? (Choose two.)

Which two features are available when the primary admin node is down and the secondary admin node has not been promoted? (Choose two.)A . hotspotB . new AD user 802 1X authenticationC . postureD . BYODE . guest AUPView AnswerAnswer: B,C

April 3, 2022 No Comments READ MORE +

Which two task types are included in the Cisco ISE common tasks support for TACACS+ profiles? (Choose two)

Which two task types are included in the Cisco ISE common tasks support for TACACS+ profiles? (Choose two)A . FirepowerB . WLCC . IOSD . ASAE . ShellView AnswerAnswer: B,E Explanation: https://www.cisco.com/c/en/us/td/docs/security/ise/2-1/admin_guide/b_ise_admin_guide_21/b_ise_admin_guide_20_chapter_0100010.html TACACS+ Profile TACACS+ profiles control the initial login session of the device administrator. A session refers to each...

April 3, 2022 No Comments READ MORE +

Which use case validates a change of authorization?

Which use case validates a change of authorization?A . An authenticated, wired EAP-capable endpoint is discoveredB . An endpoint profiling policy is changed for authorization policy.C . An endpoint that is disconnected from the network is discoveredD . Endpoints are created through device registration for the guestsView AnswerAnswer: B Explanation:...

April 3, 2022 No Comments READ MORE +

What is a characteristic of the UDP protocol?

What is a characteristic of the UDP protocol?A . UDP can detect when a server is down.B . UDP offers best-effort deliveryC . UDP can detect when a server is slowD . UDP offers information about a non-existent serverView AnswerAnswer: B Explanation: https://www.cisco.com/c/en/us/support/docs/security-vpn/remote-authentication-dial-user-service-radius/13838-10.html

April 2, 2022 No Comments READ MORE +

Which Cisco ISE service allows an engineer to check the compliance of endpoints before connecting to the network?

Which Cisco ISE service allows an engineer to check the compliance of endpoints before connecting to the network?A . personasB . qualysC . nexposeD . postureView AnswerAnswer: D Explanation: https://www.cisco.com/c/en/us/td/docs/security/ise/2-1/admin_guide/b_ise_admin_guide_21/b_ise_admin_guide_20_chapter_010110.html Posture is a service in Cisco Identity Services Engine (Cisco ISE) that allows you to check the state, also known...

April 2, 2022 No Comments READ MORE +

Drag the descriptions on the left onto the components of 802.1X on the right

DRAG DROP Drag the descriptions on the left onto the components of 802.1X on the right. View AnswerAnswer: Explanation: https://netlabz.wordpress.com/2016/09/24/cisco-ise-fundamentals/

April 2, 2022 No Comments READ MORE +

What must be done in order to provide the CA this information?

An administrator is attempting to replace the built-in self-signed certificates on a Cisco ISE appliance. The CA is requesting some information about the appliance in order to sign the new certificate . What must be done in order to provide the CA this information? A. Install the Root CA and...

August 26, 2021 No Comments READ MORE +

A network engineer is configuring a network device that needs to filter traffic based on security group tags using a security policy on a routed into this task?

A network engineer is configuring a network device that needs to filter traffic based on security group tags using a security policy on a routed into this task?A . cts authorization listB . cts role-based enforcementC . cts cache enableD . cts role-based policy priority-staticView AnswerAnswer: B

August 25, 2021 No Comments READ MORE +