Which configuration is causing this problem?
A Cisco ISE administrator needs to ensure that guest endpoint registrations are only valid for one day When testing the guest policy flow, the administrator sees that the Cisco ISE does not delete the endpoint in the Guest Endpoints identity store after one day and allows access to the guest...
Which two methods should a sponsor select to create bulk guest accounts from the sponsor portal? (Choose two)
Which two methods should a sponsor select to create bulk guest accounts from the sponsor portal? (Choose two)A . RandomB . MonthlyC . DailyD . ImportedE . KnownView AnswerAnswer: A,D
Which two features are available when the primary admin node is down and the secondary admin node has not been promoted? (Choose two.)
Which two features are available when the primary admin node is down and the secondary admin node has not been promoted? (Choose two.)A . hotspotB . new AD user 802 1X authenticationC . postureD . BYODE . guest AUPView AnswerAnswer: B,C
Which two task types are included in the Cisco ISE common tasks support for TACACS+ profiles? (Choose two)
Which two task types are included in the Cisco ISE common tasks support for TACACS+ profiles? (Choose two)A . FirepowerB . WLCC . IOSD . ASAE . ShellView AnswerAnswer: B,E Explanation: https://www.cisco.com/c/en/us/td/docs/security/ise/2-1/admin_guide/b_ise_admin_guide_21/b_ise_admin_guide_20_chapter_0100010.html TACACS+ Profile TACACS+ profiles control the initial login session of the device administrator. A session refers to each...
Which use case validates a change of authorization?
Which use case validates a change of authorization?A . An authenticated, wired EAP-capable endpoint is discoveredB . An endpoint profiling policy is changed for authorization policy.C . An endpoint that is disconnected from the network is discoveredD . Endpoints are created through device registration for the guestsView AnswerAnswer: B Explanation:...
What is a characteristic of the UDP protocol?
What is a characteristic of the UDP protocol?A . UDP can detect when a server is down.B . UDP offers best-effort deliveryC . UDP can detect when a server is slowD . UDP offers information about a non-existent serverView AnswerAnswer: B Explanation: https://www.cisco.com/c/en/us/support/docs/security-vpn/remote-authentication-dial-user-service-radius/13838-10.html
Which Cisco ISE service allows an engineer to check the compliance of endpoints before connecting to the network?
Which Cisco ISE service allows an engineer to check the compliance of endpoints before connecting to the network?A . personasB . qualysC . nexposeD . postureView AnswerAnswer: D Explanation: https://www.cisco.com/c/en/us/td/docs/security/ise/2-1/admin_guide/b_ise_admin_guide_21/b_ise_admin_guide_20_chapter_010110.html Posture is a service in Cisco Identity Services Engine (Cisco ISE) that allows you to check the state, also known...
Drag the descriptions on the left onto the components of 802.1X on the right
DRAG DROP Drag the descriptions on the left onto the components of 802.1X on the right. View AnswerAnswer: Explanation: https://netlabz.wordpress.com/2016/09/24/cisco-ise-fundamentals/
What must be done in order to provide the CA this information?
An administrator is attempting to replace the built-in self-signed certificates on a Cisco ISE appliance. The CA is requesting some information about the appliance in order to sign the new certificate . What must be done in order to provide the CA this information? A. Install the Root CA and...
A network engineer is configuring a network device that needs to filter traffic based on security group tags using a security policy on a routed into this task?
A network engineer is configuring a network device that needs to filter traffic based on security group tags using a security policy on a routed into this task?A . cts authorization listB . cts role-based enforcementC . cts cache enableD . cts role-based policy priority-staticView AnswerAnswer: B