What is the minimum certainty factor when creating a profiler policy?
What is the minimum certainty factor when creating a profiler policy?A . the minimum number that a predefined condition provides B. the maximum number that a predefined condition provides C. the minimum number that a device certainty factor must reach to become a member of the profile D. the maximum...
If a user reports a device lost or stolen, which portal should be used to prevent the device from accessing the network while still providing information about why the device is blocked?
If a user reports a device lost or stolen, which portal should be used to prevent the device from accessing the network while still providing information about why the device is blocked?A . Client Provisioning B. Guest C. BYOD D. BlacklistView AnswerAnswer: D Explanation: https://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/Borderless_Networks/Unified_Access/BYOD_Design_Guide/Managing_Lost_or_Stolen_Device.html#90273 The Blacklist identity group is...
What must be done to accomplish this task?
An administrator is trying to collect metadata information about the traffic going across the network to gam added visibility into the hosts. This Information will be used to create profiling policies for devices us mg Cisco ISE so that network access policies can be used. What must be done to...
What must be created to accomplish this task?
The IT manager wants to provide different levels of access to network devices when users authenticate using TACACS+. The company needs specific commands to be allowed based on the Active Directory group membership of the different roles within the IT department. The solution must minimize the number of objects created...
Which two methods should a sponsor select to create bulk guest accounts from the sponsor portal? (Choose two)
Which two methods should a sponsor select to create bulk guest accounts from the sponsor portal? (Choose two)A . Random B. Monthly C. Daily D. Imported E. KnownView AnswerAnswer: A,D
Which posture condition should the administrator configure in order for this policy to work?
There is a need within an organization for a new policy to be created in Cisco ISE. It must validate that a specific anti-virus application is not only installed, but running on a machine before it is allowed access to the network. Which posture condition should the administrator configure in...
What is the reason for these restrictions?
A Cisco device has a port configured in multi-authentication mode and is accepting connections only from hosts assigned the SGT of SGT_0422048549 The VLAN trunk link supports a maximum of 8 VLANS. What is the reason for these restrictions?A . The device is performing inline tagging without acting as a...
What must be done to identify the problem?
A network administrator is setting up wireless guest access and has been unsuccessful in testing client access. The endpoint is able to connect to the SSID but is unable to grant access to the guest network through the guest portal. What must be done to identify the problem?A . Use...
Which probe should be enabled to meet these requirements?
An administrator is configuring new probes to use with Cisco ISE and wants to use metadata to help profile the endpoints. The metadata must contain traffic information relating to the endpoints instead of industry-standard protocol information. Which probe should be enabled to meet these requirements?A . NetFlow probe B. DNS...