Which two values are compared by the binary comparison (unction in authentication that is based on Active Directory?

Which two values are compared by the binary comparison (unction in authentication that is based on Active Directory?A . subject alternative name and the common name B. MS-CHAPv2 provided machine credentials and credentials stored in Active Directory C. user-presented password hash and a hash stored in Active Directory D. user-presented...

April 22, 2023 No Comments READ MORE +

What must be configured to accomplish this task?

An organization wants to standardize the 802 1X configuration on their switches and remove static ACLs on the switch ports while allowing Cisco ISE to communicate to the switch what access to provide What must be configured to accomplish this task?A . security group tag within the authorization policy B....

April 22, 2023 No Comments READ MORE +

Which type of access list should be used for this configuration?

An engineer is configuring web authentication and needs to allow specific protocols to permit DNS traffic. Which type of access list should be used for this configuration?A . reflexive ACL B. extended ACL C. standard ACL D. numbered ACLView AnswerAnswer: B

April 22, 2023 No Comments READ MORE +

Which action should accomplish this task?

An engineer is using Cisco ISE and configuring guest services to allow wireless devices to access the network. Which action should accomplish this task?A . Create the redirect ACL on the WLC and add it to the WLC policy B. Create the redirect ACL on the WLC and add it...

April 21, 2023 No Comments READ MORE +

Which two task types are included in the Cisco ISE common tasks support for TACACS+ profiles? (Choose two.)

Which two task types are included in the Cisco ISE common tasks support for TACACS+ profiles? (Choose two.)A . Firepower B. WLC C. IOS D. ASA E. ShellView AnswerAnswer: B,E Explanation: https://www.cisco.com/c/en/us/td/docs/security/ise/2-1/admin_guide/b_ise_admin_guide_21/b_ise_admin_guide_20_chapter_0100010.html TACACS+ Profile TACACS+ profiles control the initial login session of the device administrator. A session refers to each...

April 21, 2023 No Comments READ MORE +

What is a method for transporting security group tags throughout the network?

What is a method for transporting security group tags throughout the network?A . by enabling 802.1AE on every network device B. by the Security Group Tag Exchange Protocol C. by embedding the security group tag in the IP header D. by embedding the security group tag in the 802.1Q headerView...

April 20, 2023 No Comments READ MORE +

Which two roles are taken on by the administration person within a Cisco ISE distributed environment? (Choose two.)

Which two roles are taken on by the administration person within a Cisco ISE distributed environment? (Choose two.)A . backup B. secondary C. standby D. primary E. activeView AnswerAnswer: B,D

April 20, 2023 No Comments READ MORE +

Which two actions must be verified to confirm that the internet is accessible via guest access when configuring a guest portal? (Choose two.)

Which two actions must be verified to confirm that the internet is accessible via guest access when configuring a guest portal? (Choose two.)A . The guest device successfully associates with the correct SSID. B. The guest user gets redirected to the authentication page when opening a browser. C. The guest...

April 20, 2023 No Comments READ MORE +

Which two events trigger a CoA for an endpoint when CoA is enabled globally for ReAuth? (Choose two.)

Which two events trigger a CoA for an endpoint when CoA is enabled globally for ReAuth? (Choose two.)A . endpoint marked as lost in My Devices Portal B. addition of endpoint to My Devices Portal C. endpoint profile transition from Apple-Device to Apple-iPhone D. endpoint profile transition from Unknown to...

April 20, 2023 No Comments READ MORE +

What must be done to accomplish this task?

An engineer has been tasked with standing up a new guest portal for customers that are waiting in the lobby. There is a requirement to allow guests to use their social media logins to access the guest network to appeal to more customers. What must be done to accomplish this...

April 20, 2023 No Comments READ MORE +