Which command enables 802.1X globally on a Cisco switch?
Which command enables 802.1X globally on a Cisco switch?A . dot1x system-auth-controlB . dot1x pae authenticatorC . authentication port-control autoD . aaa new-modelView AnswerAnswer: A
Which two activities can be done using Cisco DNA Center? (Choose two.)
Which two activities can be done using Cisco DNA Center? (Choose two.)A . DHCPB . designC . accountingD . DNSE . provisionView AnswerAnswer: B E
Which PKI enrollment method allows the user to separate authentication and enrollment actions and also provides an option to specify HTTP/TFTP commands to perform file retrieval from the server?
Which PKI enrollment method allows the user to separate authentication and enrollment actions and also provides an option to specify HTTP/TFTP commands to perform file retrieval from the server?A . urlB . profileC . terminalD . selfsignedView AnswerAnswer: B
What is the admin5 user able to do on HQ_Router after this configuration?
Refer to the exhibit. A network administrator configures command authorization for the admm5 user. What is the admin5 user able to do on HQ_Router after this configuration?A . complete no configurationsB . add subinterfacesC . complete all configurationsD . set the IP address of an interfaceView AnswerAnswer: A
What is a difference between DMVPN and sVTI?
What is a difference between DMVPN and sVTI?A . DMVPN supports tunnel encryption, whereas sVTI does not.B . DMVPN supports dynamic tunnel establishment, whereas sVTI does not.C . DMVPN supports static tunnel establishment, whereas sVTI does not.D . DMVPN provides interoperability with other vendors, whereas sVTI does not.View AnswerAnswer: B
When Cisco and other industry organizations publish and inform users of known security findings and vulnerabilities, which name is used?
When Cisco and other industry organizations publish and inform users of known security findings and vulnerabilities, which name is used?A . Common Vulnerabilities and ExposuresB . Common Exploits and VulnerabilitiesC . Common Security ExploitsD . Common Vulnerabilities, Exploits and ThreatsView AnswerAnswer: A Explanation: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/cve/174/cve-addressed-1741.html
What action is needed to authenticate the VPN?
0.0.0 command on host A The tunnel is not being established to host B. What action is needed to authenticate the VPN? A. Enter the same command on host B. B. Enter the command with a different password on host B. C. Change isakmp to ikev2 in the command on...
An MDM provides which two advantages to an organization with regards to device management? (Choose two.)
An MDM provides which two advantages to an organization with regards to device management? (Choose two.)A . asset inventory managementB . allowed application managementC . Active Directory group policy managementD . network device managementE . critical device managementView AnswerAnswer: B E
Which CoA type achieves this goal?
An engineer must force an endpoint to re-authenticate an already authenticated session without disrupting the endpoint to apply a new or updated policy from ISE. Which CoA type achieves this goal?A . Port BounceB . CoA TerminateC . CoA ReauthD . CoA Session QueryView AnswerAnswer: C
Under which two circumstances is a CoA issued? (Choose two.)
Under which two circumstances is a CoA issued? (Choose two.)A . A new authentication rule was added to the policy on the Policy Service nodeB . An endpoint is deleted on the Identity Service Engine serverC . A new Identity Source Sequence is created and referenced in the authentication policyD...