Which action ensures the users are able to log into the network devices?
An administrator is configuring cisco ISE lo authenticate users logging into network devices using TACACS+ The administrator is not seeing any oí the authentication in the TACACS+ live logs . Which action ensures the users are able to log into the network devices?A . Enable the device administration service in...
Which three default endpoint identity groups does cisco ISE create? (Choose three)
Which three default endpoint identity groups does cisco ISE create? (Choose three)A . UnknownB . whitelistC . end pointD . profiledE . blacklistView AnswerAnswer: A,D,E Explanation: Default Endpoint Identity Groups Created for Endpoints Cisco ISE creates the following five endpoint identity groups by default: Blacklist, GuestEndpoints, Profiled, Registered Devices, and...
Which configuration is required in the Cisco ISE authentication policy to allow Central Web Authentication?
Which configuration is required in the Cisco ISE authentication policy to allow Central Web Authentication?A . MAB and if user not found, continueB . MAB and if authentication failed, continueC . Dot1x and if user not found, continueD . Dot1x and if authentication failed, continueView AnswerAnswer: A
Which alternate method should be used to tell users how to remediate?
MacOS users are complaining about having to read through wordy instructions when remediating their workstations to gam access to the network. Which alternate method should be used to tell users how to remediate?A . URL linkB . message textC . executableD . file distributionView AnswerAnswer: A
Which two fields are available when creating an endpoint on the context visibility page of Cisco IS? (Choose two)
Which two fields are available when creating an endpoint on the context visibility page of Cisco IS? (Choose two)A . Policy AssignmentB . Endpoint FamilyC . Identity Group AssignmentD . Security Group TagE . IP AddressView AnswerAnswer: A,C
Which protocol must be allowed for a BYOD device to access the BYOD portal?
Which protocol must be allowed for a BYOD device to access the BYOD portal?A . HTTPB . SMTPC . HTTPSD . SSHView AnswerAnswer: C
Which supplicant(s) and server(s) are capable of supporting EAP-CHAINING?
Which supplicant(s) and server(s) are capable of supporting EAP-CHAINING?A . Cisco AnyConnect NAM and Cisco Identity Service EngineB . Cisco AnyConnect NAM and Cisco Access Control ServerC . Cisco Secure Services Client and Cisco Access Control ServerD . Windows Native Supplicant and Cisco Identity Service EngineView AnswerAnswer: A
An engineer is working with a distributed deployment of Cisco ISE and needs to configure various network probes to collect a set of attributes from the used to accomplish this task?
An engineer is working with a distributed deployment of Cisco ISE and needs to configure various network probes to collect a set of attributes from the used to accomplish this task?A . policy serviceB . monitoringC . pxGridD . primary policy administratorView AnswerAnswer: B
Which CoA configuration meets this requirement?
A new employee just connected their workstation to a Cisco IP phone. The network administrator wants to ensure that the Cisco IP phone remains online when the user disconnects their Workstation from the corporate network. Which CoA configuration meets this requirement?A . Port BounceB . ReauthC . NoCoAD . DisconnectView...
Which switch configuration change will allow only one voice and one data endpoint on each port?
Refer to the exhibit. Which switch configuration change will allow only one voice and one data endpoint on each port?A . Multi-auth to multi-domainB . Mab to dot1xC . Auto to manualD . Multi-auth to single-authView AnswerAnswer: A Explanation: https://community.cisco.com/t5/network-access-control/cisco-ise-multi-auth-or-multi-host/m-p/3750907