What is the purpose of the Audit Viewer in the Monitoring section of ClearPass Policy Manager?

What is the purpose of the Audit Viewer in the Monitoring section of ClearPass Policy Manager?A . to audit client authenticationsB . to display changes made to the ClearPass configurationC . to display the entire configuration of the ClearPass Policy ManagerD . to audit the network for PCI complianceE ....

February 25, 2021 No Comments READ MORE +

What are the likely causes of this?

A hotel chain deployed ClearPass Guest. When hotel guests connect to the Guest SSID, launch a web browser and enter the address www.google.com, they are unable to immediately see the web login page. What are the likely causes of this? (Select two.)A . The ClearPass server has a trusted server...

February 25, 2021 No Comments READ MORE +

Which Enforcement Profile is applied?

Refer to the exhibit. A user who is tagged with the ClearPass roles of Role_Engineer and developer, but not testqa, connects to the network with a corporate Windows laptop. Which Enforcement Profile is applied?A . WIRELESS_GUEST_NETWORKB . WIRELESS_CAPTIVE_NETWORKC . WIRELESS_HANDHELD_NETWORKD . WIRELESS_EMPLOYEE_NETWORKView AnswerAnswer: D

March 13, 2020 No Comments READ MORE +

What does the traffic received and sent statistics present?

Refer to the exhibit. A user logged in to the Self-Service Portal as shown. What does the traffic received and sent statistics present?A . These show the total amount of traffic the guest transmitted, as seen through RADIUS CoA packets from the NAD to ClearPass.B . These show the total...

March 13, 2020 No Comments READ MORE +

What enforcement profile should be used in the health check service?

A customer wants to make enforcement decisions during 802.1x authentication based on a client’s Onguard posture token. What enforcement profile should be used in the health check service?A . Quarantine VLANB . RADIUS CoAC . RADIUS AcceptD . RADIUS RejectE . Full Access VLAView AnswerAnswer: B

March 9, 2020 No Comments READ MORE +

Based on the Enforcement Profile configuration shown, which statement accurately describes what is sent?

Refer to the exhibit. Based on the Enforcement Profile configuration shown, which statement accurately describes what is sent?A . A limited access VLAN value is sent to the Network Access Device.B . A message is sent to the Onguard Agent on the client device.C . An unhealthy role value is...

March 7, 2020 No Comments READ MORE +

What does Authorization allow us to do in a Policy Service?

What does Authorization allow us to do in a Policy Service?A . To use attributes in databases in role mapping and Enforcement.B . To use attributes stored in databases in Enforcement only, but not role mapping.C . To use attributes stored in external databases for Enforcement, but not internal databases.D...

March 3, 2020 No Comments READ MORE +

Which two services are also available on a remote computer that has the Agent for Windows installed, even if the Deduplication feature is unavailable on the Backup Exec server?

When the Deduplication feature is installed on a Backup Exec server, four services are installed. Which two services are also available on a remote computer that has the Agent for Windows installed, even if the Deduplication feature is unavailable on the Backup Exec server?A . Backup Exec Deduplication Engine and...

March 3, 2020 No Comments READ MORE +

Assigned risk ratings are based upon:

Assigned risk ratings are based upon:A . Root cause analysis.B . Risk probability and impact assessment.C . Expert judgment.D . Revised stakeholders' tolerances.View AnswerAnswer: B

March 2, 2020 No Comments READ MORE +

What is true?

A bank would like to deploy ClearPass Guest with web login authentication so that their customers can self-register on the network to get network access when they have meetings with bank employees. However, they’re concerned about security. What is true? (Choose three.)A . If HTTPS is used for the web...

March 2, 2020 No Comments READ MORE +