4 Flashcards

4 (36 cards)

1
Q

Which device acts as an authenticator during the 802.1X authentication process?

A. RADIUS server
B. Cisco switch
C. LDAP server
D. Cisco ISE PSN
A

B. Cisco switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

An engineer must use certificate authentication for endpoints that connect to a wired network with a Cisco ISE deployment. The engineer must define the certificate field used as the principal username. What is needed to complete the configuration?

A. authorization profile
B. authentication policy
C. authorization rule
D. authentication profile
A

D. authentication profile

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a difference between TACACS+ compared to RADIUS? (Choose two.)

A. TACACS+ encrypts only the password, and RADIUS encrypts the entire packet payload.
B. TACACS+ uses a connection-oriented transport, and RADIUS uses a connectionless transport.
C. TACACS+ supports 802.1X network access control, and RADIUS supports only MAB.
D. TACACS+ offers multiple protocol support, and RADIUS supports only IP traffic.
A

B. TACACS+ uses a connection-oriented transport, and RADIUS uses a connectionless transport.
D. TACACS+ offers multiple protocol support, and RADIUS supports only IP traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A client with MAC address 04:77:10:14:67:AB connects to the network. The client does not support 802.1X. Which setting must be enabled in the Allowed Authentication Protocols list in your Authentication Policy for Cisco ISE Server to support MAB authentication for this MAC address?

A. Process Host Lookup
B. EAP-FAST
C. EAP-TTLS
D. MS-CHAPv2
A

A. Process Host Lookup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A network engineer must configure a policy rule to check the endpoint. The policy must ensure disk encryption is enabled and the appropriate antivirus software version is installed. Which configuration must the engineer apply to the rule?

A. dictionary compound condition
B. compound posture condition
C. simple posture condition
D. dictionary simple condition
A

B. compound posture condition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which persona configuration feature is used when setting personas in Cisco ISE for a node that will give network access and receive RADIUS requests?

A. pxGrid Node
B. Monitoring Node
C. Policy Service Node
D. Policy Administration Node
A

C. Policy Service Node

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

https://img.examtopics.com/300-715/image11.png

Refer to the exhibit. An engineer needs to configure central web authentication on the Cisco Wireless LAN Controller to use Cisco ISE for all guests connected to the wireless network. The components are configured:

  • Cisco Wireless LAN Controller
  • authorization profile on the Cisco ISE
  • authentication rule on the Cisco ISE

What must be configured next on the Cisco ISE?

A. authorization rule
B. authorization policy
C. accounting profile
D. authentication profile
A

B. authorization policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

An endpoint with the MAC address 04:85:70:26:64:AB attempts to connect to the network. The security administrator wants to ensure that before authentication, only limited access is provided for services including DHCP and DNS Full network access is only granted upon successful 802.1X authentication. Which ISE deployment mode should the administrator configure to meet the requirements?

A. low-impact mode
B. closed mode
C. monitor mode
D. open mode
A

A. low-impact mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a difference between TACACS+ as compared to RADIUS from an AAA perspective?

A. TACACS+ separates AAA services, whereas RADIUS combines authentication and authorization.
B. TACACS+ combines all roles into a single privilege level, whereas RADIUS separates privilege levels.
C. TACACS+ supports only Cisco devices, whereas RADIUS supports any RADUIS-compatible device.
D. TACACS+ supports only local authentication, whereas RADIUS supports remote authentication.
A

A. TACACS+ separates AAA services, whereas RADIUS combines authentication and authorization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A network engineer must configure BYOD using Cisco ISE. In the deployment, the users must be able to submit CSR through the end devices. Which two features must be enabled to meet the requirement? (Choose two.)

A. Define a certificate group tag.
B. A new BYOD portal must be created.
C. Add SuperAdmin account into portal admin group.
D. Cisco ISE internal CA service must be enabled.
E. A certificate provisioning portal must be configured.
A

D. Cisco ISE internal CA service must be enabled.
E. A certificate provisioning portal must be configured.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

An administrator must deploy the Cisco Secure Client posture agent to employee endpoints that access a wireless network by using URL redirection in Cisco ISE. The compliance module must be downloaded from Cisco and uploaded to the Cisco ISE client provisioning resource. What must be used to upload the compliance module?

A. Client Provisioning Portal
B. Secure Client configuration
C. agent resources from the local disk
D. Secure Client posture profile
A

A. Client Provisioning Portal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

An administrator must configure Cisco ISE to authenticate the administrative superuser to manage a Cisco Adaptive Security Appliance firewall. The solution must meet the requirements:

  • The user must be authenticated against Microsoft AD.
  • The user must have full management administrative access to the Cisco Adaptive Security Appliance firewall.
  • The user must not use the enable command.

The configurations were performed:

  • joined Cisco ISE to AD and retrieved AD groups
  • added the Cisco Adaptive Security Appliance firewall
  • enabled Device Admin Service in Cisco ISE
  • configured TACACS command sets
  • configured a TACACS profile
  • configured an authorization policy
  • configured the Cisco Adaptive Security Appliance firewall for authentication and authorization

Which two actions must be performed in Cisco ISE? (Choose two.)

A. Configure an authentication profile on Cisco ISE.
B. Set Default Privilege to 1 and Maximum Privilege to 15 in the TACACS profile.
C. Add all authorized admin commands to the TACACS profile.
D. Set Default Privilege to 15 and Maximum Privilege to 15 in the TACACS profile.
E. Select "Permit any command that is not listed below" in the TACACS profile.
A

D. Set Default Privilege to 15 and Maximum Privilege to 15 in the TACACS profile.
E. Select “Permit any command that is not listed below” in the TACACS profile.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a primary function of RADIUS compared to TACACS?

A. RADIUS provides AAA for network access, whereas TACACS provides AAA for device administration.
B. RADIUS supports command accounting, whereas TACACS supports only start/stop accounting.
C. RADIUS supports multiple privilege levels, whereas TACACS supports only one privilege level.
D. RADIUS supports command authorization, whereas TACACS provides no support for commands.
A

A. RADIUS provides AAA for network access, whereas TACACS provides AAA for device administration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which two external identity stores are supported by Cisco ISE for password types? (Choose two.)

A. TACACS+ Token Server
B. RADIUS Token Server
C. LDAP
D. SQL
E. OBDC
A

B. RADIUS Token Server
C. LDAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

An engineer configures Cisco ISE and Cisco Catalyst switches to enforce Cisco TrustSec policies. The engineer must use a nondisruptive deployment approach for new devices by deploying TrustSec policies in staging, preproduction, and production. Which action must be taken to complete the configuration?

A. Configure Security Group Tag Exchange Protocol on the new devices and integrate the devices in groups with Cisco ISE.
B. Configure policy matrices in Cisco ISE and assign the new devices to the policy matrices.
C. Integrate the new devices in staging, preproduction, and production network device groups.
D. Configure a different security group tag for the new devices in the staging, preproduction, and production stages.
A

A. Configure Security Group Tag Exchange Protocol on the new devices and integrate the devices in groups with Cisco ISE.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Using the SAML protocol, an administrator must configure the Cisco ISE Sponsor portal to authenticate users with an external Microsoft Active Directory Federation Services server. The configurations were performed:

  • created a new SAML identity provider profile in Cisco ISE
  • exported the service provider information
  • configured all the required Active Directory Federation Services configurations
  • imported the Active Directory Federation Services metadata
  • configured groups in the new SAML identity provider profile
  • added attributes to the new SAML identity provider profile
  • configured Advanced Settings in the new SAML identity provider profile

Which two actors must be taken to complete the configuration? (Choose two.)

A. Configure the Sponsor portal HTTPS port for Active Directory Federation Services integration
B. Configure an identity source sequence in the Sponsor portal
C. Allow Kerberos single sign-on on the Sponsor portal
D. Customize the Sponsor portal pages for integration with Active Directory Federation Services
E. Add SAML identity provider groups in Sponsor Group Members
A

B. Configure an identity source sequence in the Sponsor portal
E. Add SAML identity provider groups in Sponsor Group Members

17
Q

A network administrator must restrict sponsor account privileges for managing guest accounts on Cisco ISE for a new account that is being created. Sponsor groups currently exist for each business unit. The new sponsor that is being added must be restricted to only managing guest accounts created by sponsors from the same sponsor group. In which group must the new sponsor account be configured?

A. GROUP_ACCOUNTS
B. OWN_ACCOUNTS
C. ALL_ ACCOUNTS
D. ALL_EMPLOYEES
A

B. OWN_ACCOUNTS

18
Q

Drag and drop the steps of the onboarding process from the left into the order they authenticate on the right. Not all options are used.

The employee connects to the open ssid before the provisioning process, and the employee must connect to th ecoporate ssid after the process

the authentication used to connect tot he coporate SSID is used for single sing-on to the onboarding and provisioning process.

the employee must configure the supplicant on the device to connect to the corpotate SSID

A change of authorization is used to provide full access after the provisioning process without requiren the employee to reconnect to the network

A

SINGLE SSID

the authentication used to connect tot he coporate SSID is used for single sing-on to the onboarding and provisioning process.

the employee must configure the supplicant on the device to connect to the corpotate SSID

A change of authorization is used to provide full access after the provisioning process without requiren the employee to reconnect to the network

19
Q

An engineer must configure a posture policy with Cisco Temporal Agent workflow. Which two configurations must the engineer apply to meet the requirement? (Choose two.)

A. Configure the Secure Client Posture module.
B. Configure the client provisioning policy.
C. Create the posture requirements.
D. Create the posture condition.
E. Configure client provisioning resources.
A

C. Create the posture requirements.
D. Create the posture condition.

20
Q

Which nodes are supported in a distributed Cisco ISE deployment?

A. Monitoring nodes for PxGrid services
B. Policy Service nodes for session failover
C. Policy Service nodes for automatic failover
D. Administration nodes for session failover
A

B. Policy Service nodes for session failover

21
Q

A network security administrator must integrate Cisco ISE with Active Directory. The administrator must carry out a join operation. Which action must the security administrator take?

A. Search Active Directory to see if admin user account exists
B. Remove the ISE machine account from the domain
C. Join Cisco ISE to the Active Directory domain
D. Remove Cisco ISE user account from the domain.
A

C. Join Cisco ISE to the Active Directory domain

22
Q

An engineer is deploying Cisco ISE in a network that contains an existing Cisco Secure Firewall ASA. The customer requested that Cisco TrustSec be configured so that Cisco ISE and the firewall can share SGT information. Which protocol must be configured on Cisco ISE to meet the requirement?

A. RADUIS
B. pxGrid
C. PAC
D. SXP
23
Q

Which component of the 802.1X authentication process provides the identity credentials and communicates using EAP at Layer 2?

A. authentication server
B. authenticator
C. authentication database
D. supplicant
A

D. supplicant

24
Q

An engineer is configuring a new Cisco ISE node. The Cisco ISE must make authorization decisions based on the threat and vulnerability attributes received from the threat and vulnerability adapters. Which persona must be enabled?

A. pxGrid
B. Policy Service
C. Administration
D. Monitoring
25
An engineer is configuring a new Cisco ISE node. Context-sensitive information must be shared between the Cisco ISE and a Cisco ASA. Which persona must be enabled? A. pxGrid B. Administration C. Policy Service D. Monitoring
A. pxGrid
26
DRAG DROP - A security engineer configures a Cisco Catalyst switch to use Cisco TrustSec. The engineer must define the PAC key to authenticate the switch to Cisco ISE. Drag and drop the commands from the left into sequence on the right. Not all options are used. A.appliance(config-radius-server) #address ipv4 10.201.214.24 auth-port 1812 acct-port 1813 B.appliance(config)# cts import-pac disk1:/pac_file.pac password Cisco123 C. appliance(config)#aaa new-model D. appliance(config-radius-server) #pac key Cisco123 E. appliance(config)#radius server cisco-ise F. appliance(config-radius-server) #address
C B E D
27
An engineer is deploying Cisco ISE into an existing wireless environment for a hospital. The requirement from the customer is that the WLC use Cisco ISE for Central Web Authentication. The company also has a Cisco MSE that is used with the WLC to restrict access to patient records over wireless to the room of the patient only. Which option must be selected in the Authorization Profile on Cisco ISE to support the integration? A. MAP Location B. Access Type C. Track Movement D. Service Template
A. MAP Location
28
https://img.examtopics.com/300-715/image16.png Refer to the exhibit. An engineer must configure central web authentication on the Cisco Wireless LAN Controller to use Cisco ISE for all guests connected to the wireless network. The Cisco Wireless LAN Controller and the Cisco ISE were configured, and the RADIUS-related ports were opened on the firewall. Which additional port must be opened to allow communication between the Cisco Wireless LAN Controller and Cisco ISE? A. TCP 80 B. UDP 1645 C. UDP 1813 D. TCP 8443
D. TCP 8443
29
An engineer must provide network access using a Cisco ISE policy that matches the identity group of endpoints unrecognized by any Cisco ISE profilers and manually adds the endpoints to a new identity group named legacy devices. These configurations were performed on the new endpoint page: * configured profiling policy * configured the legacy devices identity group What must be configured next to complete the configuration? A. endpoint operating system B. endpoint device name C. endpoint description D. endpoint MAC address
D. endpoint MAC address
30
An administrator must onboard MacOS endpoints that connect to Cisco switches using the BYOD portal in Cisco ISE. The authentication method must be configured to meet these requirements: * Cisco ISE identifies itself by providing its identity certificate to the endpoint. * The endpoint validates the Cisco ISE identity certificate. * The endpoint provides its endpoint identity certificate, signed by Cisco ISE, to Cisco ISE. * Cisco ISE confirms the endpoint certificate validity, and the endpoint is authorized onto the network. Which protocol must be configured? A. EAP-TLS B. EAP-GTC C. EAP-FAST D. EAP-TTLS
EAP-TLS
31
Which Cisco ISE feature enables administrators to enroll a certificate to an endpoint with MAC address 04:90:45:06:46:AA without the need for an external PKI? A. ISE Internal CA B. Endpoint Identity Service C. Guest Access D. Posture Assessment
A. ISE Internal CA
32
An administrator plans to use Cisco ISE to deploy posture policies to assess Microsoft Windows endpoints that run Cisco Secure Client. The administrator wants to minimize the occurrence of messages related to unknown posture profiles if Cisco ISE fails to determine the posture of the endpoint. Secure Client is deployed to all the endpoints, and all the required Cisco ISE authentication, authorization, and posture policy configurations were performed. Which action must be taken next to complete the configuration? A. Configure a native supplicant on the endpoints to support the posture policies B. Install the compliance module on the endpoints C. Install the latest version of the Secure Client dent on the endpoints D. Enable Cisco ISE posture on Secure Client configuration.
B. Install the compliance module on the endpoints
33
An engineer is assigned to enhance security across the campus network. The task is to enable MAB across all access switches in the network. Which command must be entered on the switch to enable MAB? A. Switch(config)# authentication port-control auto B. Switch(config)# mab C. Switch# authentication port-control auto D. Switch(config-if)# mab
D. Switch(config-if)# mab
34
An administrator must enable helpdesk users to view users' information on wireless LAN controllers in a Cisco ISE environment. The solution must meet these requirements: * Authenticate the helpdesk users against the local ISE database. * Allow the helpdesk users to access the Monitor tab tor the WLC. These configurations were performed: * added a wireless LAN controller * configured user accounts * enabled Device Admin Service in Cisco ISE * configured a TACACS profile * configured a policy set * configured an authentication policy * configured an authorization policy Which two actions must be taken in Cisco ISE? (Choose two.) A. Configure an authentication profile B. Assign the Monitor role in the TACACS profile C. Configure an identity group. D. Assign the Wireless role in the TACACS profile E. Configure TACACS command sets.
B. Assign the Monitor role in the TACACS profile E. Configure TACACS command sets.
35
What is a difference between RADIUS compared to TACACS+? A. RADIUS separates AAand TACACS+ combines authentication and authorization. B. RADIUS has multiprotocol support, and TACACS+ supports only IP C. RADIUS uses UDP ports 1812 and 1813. and TACACS+ uses UDP ports 1645 and 1646 D. RADIUS encrypts passwords only, and TACACS+ encrypts all packets.
D. RADIUS encrypts passwords only, and TACACS+ encrypts all packets.
36
An administrator must configure Cisco ISE to send CoA requests to a Cisco switch using SNMP. These configurations were performed: * enabled SNMP on the switch * added the switch to Cisco ISE * configured a network device profile * configured the NAD port detection method * configured the operation to be performed on the switch port * configured an authorization profile Which two configurations must be performed to send the CoA requests? (Choose two.) A. Configure a network device group B. Configure the SNMP server in Cisco ISE. C. Configure the switch SNMP settings of the NAD D. Configure SNMP authentication in Cisco ISE E. Select the CoA type as SNMP in the network device profile.
C. Configure the switch SNMP settings of the NAD E. Select the CoA type as SNMP in the network device profile.