3 Flashcards
(100 cards)
Which two actions must be verified to confirm that the internet is accessible via guest access when configuring a guest portal? (Choose two.)
A. The guest device successfully associates with the correct SSID. B. The guest user gets redirected to the authentication page when opening a browser. C. The guest device has internal network access on the WLAN. D. The guest device can connect to network file shares. E. Cisco ISE sends a CoA upon successful guest authentication.
B. The guest user gets redirected to the authentication page when opening a browser.
E. Cisco ISE sends a CoA upon successful guest authentication.
An administrator made changes in Cisco ISE and needs to apply new permissions for endpoints that have already been authenticated by sending a CoA packet to the network devices. Which IOS command must be configured on the devices to accomplish this goal?
A. aaa server radius dynamic-author B. authentication command bounce-port C. authentication command disable-port D. aaa nas port extended
A. aaa server radius dynamic-author
An engineer needs to configure Cisco ISE Profiling Services to authorize network access for IP speakers that require access to the intercom system. This traffic needs to be identified if the ToS bit is set to 5 and the destination IP address is the intercom system. What must be configured to accomplish this goal?
A. NMAP B. NETFLOW C. pxGrid D. RADIUS
B. NETFLOW
An engineer needs to configure a Cisco ISE server to issue a CoA for endpoints already authenticated to access the network. The CoA option must be enforced on a session, even if there are multiple active sessions on a port. What must be configured to accomplish this task?
A. the Reauth CoA option in the Cisco ISE system profiling settings enabled B. an endpoint profiling policy with the No CoA option enabled C. an endpoint profiling policy with the Port Bounce CoA option enabled D. the Port Bounce CoA option in the Cisco ISE system profiling settings enabled
A. the Reauth CoA option in the Cisco ISE system profiling settings enabled
An administrator replaced a PSN in the distributed Cisco ISE environment. When endpoints authenticate to it, the devices are not getting the right profiles or attributes and as a result, are not hitting the correct policies. This was working correctly on the previous PSN. Which action must be taken to ensure the endpoints get identified?
A. Verify that the MnT node is tracking the session. B. Verify the shared secret used between the switch and the PSN. C. Verify that the profiling service is running on the new PSN. D. Verify that the authentication request the PSN is receiving is not malformed.
C. Verify that the profiling service is running on the new PSN.
An administrator must block access to BYOD endpoints that were onboarded without a certificate and have been reported as stolen in the Cisco ISE My Devices Portal. Which condition must be used when configuring an authorization policy that sets DenyAccess permission?
A. Endpoint Identity Group is Blocklist, and the BYOD state is Registered. B. Endpoint Identify Group is Blocklist, and the BYOD state is Pending. C. Endpoint Identity Group is Blocklist, and the BYOD state is Lost. D. Endpoint Identity Group is Blocklist, and the BYOD state is Reinstate.
A. Endpoint Identity Group is Blocklist, and the BYOD state is Registered.
An engineer needs to configure a new certificate template in the Cisco ISE Internal Certificate Authority to prevent BYOD devices from needing to re-enroll when their MAC address changes. Which option must be selected in the Subject Alternative Name field?
A. Common Name and GUID B. MAC Address and GUID C. Distinguished Name D. Common Name
B. MAC Address and GUID
A user changes the status of a device to stolen in the My Devices Portal of Cisco ISE. The device was originally onboarded in the BYOD wireless Portal without a certificate. The device is found later, but the user cannot re-onboard the device because Cisco ISE assigned the device to the Blocklist endpoint identity group. What must the user do in the My Devices Portal to resolve this issue?
A. Manually remove the device from the Blocklist endpoint identity group. B. Change the device state from Stolen to Not Registered. C. Change the BYOD registration attribute of the device to None. D. Delete the device, and then re-add the device.
D. Delete the device, and then re-add the device.
A security administrator is using Cisco ISE to create a BYOD onboarding solution for all employees who use personal devices on the corporate network. The administrator generates a Certificate Signing Request and signs the request using an external Certificate Authority server. Which certificate usage option must be selected when importing the certificate into ISE?
A. RADIUS B. DLTS C. Portal D. Admin
C. Portal
An engineer needs to configure a compliance policy on Cisco ISE to ensure that the latest encryption software is running on the C drive of all endpoints. Drag and drop the configuration steps from the left into the sequence on the right to accomplish this task.
select posture and disk encryption condition
access the disk encryption condition window
select the encryption settings
access policy elements and conditions
access policy elements and conditions
select posture and disk encryption condition
access the disk encryption condition window
select the encryption settings
What is a valid status of an endpoint attribute during the device registration process?
A. block listed B. pending C. unknown D. DenyAccess
B. pending
An administrator is configuring the Native Supplicant Profile to be used with the Cisco ISE posture agents and needs to test the connection using wired devices to determine which profile settings are available. Which two configuration settings should be used to accomplish this task? (Choose two.)
A. authentication mode B. proxy host/IP C. certificate template D. security E. allowed protocol
C. certificate template
E. allowed protocol
Which Cisco ISE solution ensures endpoints have the latest version of antivirus updates installed before being allowed access to the corporate network?
A. Threat Services B. Profiling Services C. Provisioning Services D. Posture Services
D. Posture Services
An administrator is configuring posture assessment in Cisco ISE for the first time. Which two components must be uploaded to Cisco ISE to use Anyconnect for the agent configuration in a client provisioning policy? (Choose two.)
A. Anyconnect network visibility module B. Anyconnect compliance module C. AnyConnectProfile.xml file D. AnyConnectProfile.xsd file E. Anyconnect agent image
B. Anyconnect compliance module
E. Anyconnect agent image
What is a difference between TACACS+ and RADIUS in regards to encryption?
A. TACACS+ encrypts only the password, whereas RADIUS encrypts the username and password. B. TACACS+ encrypts the username and password, whereas RADIUS encrypts only the password. C. TACACS+ encrypts the password, whereas RADIUS sends the entire packet in clear text. D. TACACS+ encrypts the entire packet, whereas RADIUS encrypts only the password.
D. TACACS+ encrypts the entire packet, whereas RADIUS encrypts only the password.
What is a difference between RADIUS and TACACS+?
A. RADIUS uses connection-oriented transport, and TACACS+ uses best-effort delivery. B. RADIUS offers multiprotocol support, and TACACS+ supports only IP traffic. C. RADIUS combines authentication and authorization functions, and TACACS+ separates them. D. RADIUS supports command accounting, and TACACS+ does not.
C. RADIUS combines authentication and authorization functions, and TACACS+ separates them.
An engineer is unable to use SSH to connect to a switch after adding the required CLI commands to the device to enable TACACS+. The device administration license has been added to Cisco ISE, and the required policies have been created. Which action is needed to enable access to the switch?
A. The ip ssh source-interface command needs to be set on the switch B. 802.1X authentication needs to be configured on the switch. C. The RSA keypair used for SSH must be regenerated after enabling TACACS+. D. The switch needs to be added as a network device in Cisco ISE and set to use TACACS+.
D. The switch needs to be added as a network device in Cisco ISE and set to use TACACS+.
An engineer needs to export a file in CSV format, encrypted with the password C1$c0438563935, and contains users currently configured in Cisco ISE. Drag and drop the steps from the left into the sequence on the right to complete this task.
Click Export Selected, click key, and enter the password.
Click Administration, and then clic Identity Management.
Click Start Export, and then click OK.
Click Identities, click users, and then select the list of users.
Click Administration, and then clic Identity Management.
Click Identities, click users, and then select the list of users.
Click Export Selected, click key, and enter the password.
Click Start Export, and then click OK.
The IT manager wants to provide different levels of access to network devices when users authenticate using TACACS+. The company needs specific commands to be allowed based on the Active Directory group membership of the different roles within the IT department. The solution must minimize the number of objects created in Cisco ISE. What must be created to accomplish this task?
A. one shell profile and one command set B. multiple shell profiles and one command set C. one shell profile and multiple command sets D. multiple shell profiles and multiple command sets
C. one shell profile and multiple command sets
What are two differences of TACACS+ compared to RADIUS? (Choose two.)
A. TACACS+ uses a connectionless transport protocol, whereas RADIUS uses a connection-oriented transport protocol. B. TACACS+ encrypts the full packet payload, whereas RADIUS only encrypts the password. C. TACACS+ only encrypts the password, whereas RADIUS encrypts the full packet payload. D. TACACS+ uses a connection-oriented transport protocol, whereas RADIUS uses a connectionless transport protocol. E. TACACS+ supports multiple sessions per user, whereas RADIUS supports one session per user.
B. TACACS+ encrypts the full packet payload, whereas RADIUS only encrypts the password.
D. TACACS+ uses a connection-oriented transport protocol, whereas RADIUS uses a connectionless transport protocol.
Which two authentication protocols are supported by RADIUS but not by TACACS+? (Choose two.)
A. MSCHAPv1 B. PAP C. EAP D. CHAP E. MSCHAPV2
C. EAP
E. MSCHAPV2
An engineer configured posture assessment for their network access control with the goal of using an agent that supports using service conditions for the assessment. The agent should run as a background process to avoid user interruption, but the user can see it when it is run. What is the problem?
A. The selected posture agent does not support the engineer's goal. B. The posture module was deployed using the headend instead of installing it with SCCM. C. The proper permissions were not given to the temporal agent to conduct the assessment. D. The user required remediation so the agent appeared in the notifications.
A. The selected posture agent does not support the engineer’s goal.
An engineer is deploying Cisco ISE to use 802.1X authentication for controlling access to the company’s wired network. The request from company management is to minimize the impact on users during the rollout of 802.1X on the company switches. Which mode must be used first in a phased 802.1X deployment to fulfill this request?
A. Monitor B. Open C. Low-impact D. Closed
A. Monitor
An engineer needs to create a Self-Registered Guest Portal in Cisco ISE in which guest users receive their passwords via SMS. Which two settings must be configured to accomplish this task? (Choose two.)
A. Choose the SMS provider previously configured as a SMS gateway under the Registration Form Settings. B. Select SMS for the Send Credential upon notification setting under Registration Form Settings. C. Choose the SMS provider previously configured as a SMS gateway under Device Registration Settings. D. Select Allow employees to use personal devices and SMS for notifications under BYOD. E. Select SMS for the Send Credential upon notification setting under the Login Page Settings.
A. Choose the SMS provider previously configured as a SMS gateway under the Registration Form Settings.
B. Select SMS for the Send Credential upon notification setting under Registration Form Settings.