Which two responses from the RADIUS server to NAS are valid during the authentication process? (Choose two)
Which two responses from the RADIUS server to NAS are valid during the authentication process? (Choose two)A . access-response B. access-request C. access-reserved D. access-accept E. access-challengeView AnswerAnswer: B,D
What is causing this issue to occur?
An engineer is configuring 802.1X and is testing out their policy sets. After authentication, some endpoints are given an access-reject message but are still allowed onto the network . What is causing this issue to occur?A . The switch port is configured with authentication event server dead action authorize vlan....
Which configuration is causing this behavior?
An organization wants to split their Cisco ISE deployment to separate the device administration functionalities from the mam deployment. For this to work, the administrator must deregister any nodes that will become a part of the new deployment, but the button for this option is grayed out. Which configuration is...
Which feature should be configured to achieve this in a scalable manner?
A network engineer must enforce access control using special tags, without re-engineering the network design . Which feature should be configured to achieve this in a scalable manner?A . SGT B. dACL C. VLAN D. RBACView AnswerAnswer: A
What must be done to make the information available?
An organization has a fully distributed Cisco ISE deployment When implementing probes, an administrator must scan for unknown endpoints to learn the IP-to-MAC address bindings. The scan is complete on one FPSN. but the information is not available on the others . What must be done to make the information...
What must match between Cisco ISE and the network access device to successfully authenticate endpoints?
What must match between Cisco ISE and the network access device to successfully authenticate endpoints?A . SNMP version B. shared secret C. certificate D. profileView AnswerAnswer: B Explanation: https://www.cisco.com/en/US/docs/security/ise/1.0/user_guide/ise10_man_network_device s.html
What is a function of client provisioning?
What is a function of client provisioning?A . Client provisioning ensures that endpoints receive the appropriate posture agents. B. Client provisioning checks a dictionary attribute with a value. C. Client provisioning ensures an application process is running on the endpoint. D. Client provisioning checks the existence, date, and versions of...
What is the problem?
An administrator is troubleshooting an endpoint that is supposed to bypass 802 1X and useMAB. The endpoint is bypassing 802.1X and successfully getting network access usingMAB. however the endpoint cannot communicate because it cannot obtain an IP address. What is the problem?A . The DHCP probe for Cisco ISE is...
What happens when an internal user is configured with an external identity store for authentication, but an engineer uses the Cisco ISE admin portal to select an internal identity store as the identity source?
What happens when an internal user is configured with an external identity store for authentication, but an engineer uses the Cisco ISE admin portal to select an internal identity store as the identity source?A . Authentication is redirected to the internal identity source. B. Authentication is redirected to the external...
What must be done to validate the AAA configuration and identify the problem with the TACACS+ servers?
An administrator is configuring TACACS+ on a Cisco switch but cannot authenticate users with Cisco ISE. The configuration contains the correct key of Cisc039712287. but the switch is not receiving a response from the Cisco ISE instance. What must be done to validate the AAA configuration and identify the problem...