Which action ensures the users are able to log into the network devices?
An administrator is configuring cisco ISE lo authenticate users logging into network devices using TACACS+ The administrator is not seeing any oí the authentication in the TACACS+ live logs . Which action ensures the users are able to log into the network devices?A . Enable the device administration service in...
Which SSID type accomplishes this configuration?
An engineer is configuring a dedicated SSID for onboarding devices . Which SSID type accomplishes this configuration?A . dual B. hidden C. broadcast D. guestView AnswerAnswer: A Explanation: https://community.cisco.com/t5/security-documents/ise-byod-dual-vs-single-ssid-onboarding/ta-p/3641422 https://www.youtube.com/watch?v=HH_Xasqd9k4&ab_channel=CiscoISE-IdentityServicesEngine http://www.labminutes.com/sec0053_ise_1_1_byod_wireless_onboarding_dual_ssid
An engineer is working with a distributed deployment of Cisco ISE and needs to configure various network probes to collect a set of attributes from the used to accomplish this task?
An engineer is working with a distributed deployment of Cisco ISE and needs to configure various network probes to collect a set of attributes from the used to accomplish this task?A . policy service B. monitoring C. pxGrid D. primary policy administratorView AnswerAnswer: B
Which two features are available when the primary admin node is down and the secondary admin node has not been promoted? (Choose two.)
Which two features are available when the primary admin node is down and the secondary admin node has not been promoted? (Choose two.)A . hotspot B. new AD user 802 1X authentication C. posture D. BYOD E. guest AUPView AnswerAnswer: B,A
Which Cisco ISE service allows an engineer to check the compliance of endpoints before connecting to the network?
Which Cisco ISE service allows an engineer to check the compliance of endpoints before connecting to the network?A . personas B. qualys C. nexpose D. postureView AnswerAnswer: D Explanation: https://www.cisco.com/c/en/us/td/docs/security/ise/2-1/admin_guide/b_ise_admin_guide_21/b_ise_admin_guide_20_chapter_010110.html Posture is a service in Cisco Identity Services Engine (Cisco ISE) that allows you to check the state, also known...
Which use case validates a change of authorization?
Which use case validates a change of authorization?A . An authenticated, wired EAP-capable endpoint is discovered B. An endpoint profiling policy is changed for authorization policy. C. An endpoint that is disconnected from the network is discovered D. Endpoints are created through device registration for the guestsView AnswerAnswer: B Explanation:...
Which command is typed within the CU of a switch to view the troubleshooting output?
Refer to the exhibit: Which command is typed within the CU of a switch to view the troubleshooting output?A . show authentication sessions mac 000e.84af.59af details B. show authentication registrations C. show authentication interface gigabitethemet2/0/36 D. show authentication sessions methodView AnswerAnswer: A
Which default endpoint identity group does an endpoint that does not match any profile in Cisco ISE become a member of?
Which default endpoint identity group does an endpoint that does not match any profile in Cisco ISE become a member of?A . Endpoint B. unknown C. blacklist D. white list E. profiledView AnswerAnswer: B Explanation: If you do not have a matching profiling policy, you can assign an unknown profiling...
What is the problem'?
An administrator enables the profiling service for Cisco ISE to use for authorization policies while in closed mode. When the endpoints connect, they receive limited access so that the profiling probes can gather information and Cisco ISE can assign the correct profiles. They are using the default values within Cisco...
Which portal must the security engineer configure to accomplish this task?
An engineer is designing a BYOD environment utilizing Cisco ISE for devices that do not support native supplicants. Which portal must the security engineer configure to accomplish this task?A . MDM B. Client provisioning C. My devices D. BYODView AnswerAnswer: C Explanation: https://www.cisco.com/c/en/us/td/docs/security/ise/2-2/admin_guide/b_ise_admin_guide_22/b_ise_admin_guide_22_chapter_01111.html