<< Prev Question Next Question >>

Question 90/184

Which two are technologies that secure the control plane of the Cisco router? (Choose two.)

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (184q)
Question 1: If an endpoint is marked noncompliant during that download, ...
Question 2: During client provisioning on a Mac OS X system, the client ...
Question 3: Which network access device feature can you configure to gat...
Question 4: A network administration wants to set up a posture condition...
Question 5: What are two possible reasons why a scheduled nightly backup...
Question 6: Your guest-access wireless network is experiencing degraded ...
Question 7: When using CA for identity source, which method can be used ...
Question 8: What type of identity group is the Blacklist identity group?...
Question 9: An engineer must ensure that all client operating systems ha...
Question 10: Refer to the exhibit. (Exhibit) Which statement about the au...
Question 11: A user reports that a switch's RADIUS accounting packets are...
Question 12: A company has implemented a dual SSID BYOD design. A provisi...
Question 13: During BYOD flow, where does a Microsoft Windows 8.1 PC down...
Question 14: A security engineer has a new TrustSec project and must crea...
Question 15: Which configuration must you perform on a switch to deploy C...
Question 16: Which profiling probe collects the user-agent string?...
Question 17: Which remediation type ensures that Automatic Updates config...
Question 18: What EAP method supports mutual certificate-based authentica...
Question 19: Which redirect-URL is pushed by Cisco ISE for posture redire...
Question 20: Which valid external identity source can be used with Cisco ...
Question 21: Refer to the exhibit. (Exhibit) If the host sends a packet a...
Question 22: How many bits are in a security group tag?...
Question 23: Which radius attribute can be used to dynamically assign the...
Question 24: Which two are best practices to implement profiling services...
Question 25: In this simulation, you are task to examine the various auth...
Question 26: Which 802.1X command ignores Access-Reject during EAP authen...
Question 27: What endpoint operating system provides native support for t...
Question 28: Which condition triggers wireless authentication?...
Question 29: What are three portals provided by PSN? (Choose three.)...
Question 30: A company has implemented a dual SSID BYOD design. A provisi...
Question 31: Which 802.1x command is needed for ACL to be applied on a sw...
Question 32: A network administrator has just added a front desk receptio...
Question 33: Which option describes the purpose of configuring Native Sup...
Question 34: Which option is the code field of n EAP packet?...
Question 35: You are installing Cisco ISE on nodes that will be used in a...
Question 36: An engineer of Company A wants to know what kind of devices ...
Question 37: Refer to the exhibit. Which is the mode operational flow sho...
Question 38: Refer to the exhibit. (Exhibit) You are troubleshooting RADI...
Question 39: SIMULATION The Secure-X company has recently successfully te...
Question 40: An engineer of Company A will be sending guest credentials t...
Question 41: Which two options must be used on Cisco ISE to enable the TA...
Question 42: When 802.1X is implemented, how do the client (supplicant) a...
Question 43: A network administrator is seeing a posture status "unknown'...
Question 44: Which packets are allowed on a dot1x port with no authentica...
Question 45: Which action does the command private-vlan association 100,2...
Question 46: In a Cisco ISE deployment, which traffic is permitted by the...
Question 47: Which of these is a configurable Cisco IOS feature that trig...
Question 48: Which NAC agents support remediation? (Choose three.)...
Question 49: Which description of the use of low-impact mode in a Cisco I...
Question 50: Which components must be selected for a client provisioning ...
Question 51: The posture run-time services encapsulates which protocol se...
Question 52: A network is seeing a posture status "unknown" for a single ...
Question 53: Which two protocols does Cisco Prime Infrastructure use for ...
Question 54: An engineer is investigating an issue with their Posture Run...
Question 55: Which technology performs CoA Support Posture Service?...
Question 56: Which statement about a distributed Cisco ISE deployment is ...
Question 57: Refer to the exhibit. (Exhibit) Which statement describes th...
Question 58: In this simulation, you are task to examine the various auth...
Question 59: You configured wired 802.1X with EAP-TLS on Windows machines...
Question 60: Cisco IOS IPS uses which alerting protocol with a pull mecha...
Question 61: Which two options are functional components of the posture s...
Question 62: Which two components are required for creating native suppli...
Question 63: SIMULATION The Secure-X company has started to tested the 80...
Question 64: Which port does Cisco ISE use for native supplicant provisio...
Question 65: Which Smart Call Home profile is used for anonymous reportin...
Question 66: Which type of remediation does Windows Server Update Service...
Question 67: Which profiling capability allows you to gather and forward ...
Question 68: Which two posture redirect ACLs and remediation DACLs must b...
Question 69: Which statement about the authentication protocol used in th...
Question 70: Which advanced option within a WLAN must be enabled to trigg...
Question 71: (Exhibit) Refer to the exhibit. If the user matches the give...
Question 72: Which configuration is required in the Cisco ISE Authenticat...
Question 73: Which three host modes support MACsec? (Choose three.)...
Question 74: What are Supplicant and Authentication server that support E...
Question 75: What is the function of the SGACL policy matrix on a Cisco T...
Question 76: Which three events immediately occur when a user clicks regi...
Question 77: Which RADIUS attribute can be used to dynamically assign the...
Question 78: How does the device sensor send information to a RADIUS serv...
Question 79: Which three options can be pushed from Cisco ISE server as p...
Question 80: Which Cisco ISE feature can differentiate a corporate endpoi...
Question 81: What two values does Cisco recommend you adjust and test to ...
Question 82: Refer to the exhibit. (Exhibit) Which ISE flow mode does thi...
Question 83: Which method does Cisco prefer to securely deploy guest wire...
Question 84: (Exhibit) Refer to the exhibit. Which authentication method ...
Question 85: An engineer must enable SGACL policy globally for a Cisco Tr...
Question 86: Within a BYOD environment, when employees add devices using ...
Question 87: When you select Centralized Web Auth in the ISE Authorizatio...
Question 88: Which default identity source is used by the MyDevices_Porta...
Question 89: An engineer has discovered that a NAD is already configured ...
Question 90: Which two are technologies that secure the control plane of ...
Question 91: Which three remediation actions are supported by the Web Age...
Question 92: Which feature enables the Cisco ISE DHCP profiling capabilit...
Question 93: Which option is a recommended agent for guest posture assess...
Question 94: In Cisco ISE 1.3, which feature is available to a sponsor in...
Question 95: What is the result of configuring the command dotlx system-a...
Question 96: An engineer is troubleshooting an issue between the switch a...
Question 97: You are finding that the 802.1X-configured ports are going i...
Question 98: Which two options are EAP methods supported by Cisco ISE? (C...
Question 99: In Cisco ISE 1.3, where is BYOD enabled with dual-SSID onboa...
Question 100: Which option is the correct format of username in MAB authen...
Question 101: Which feature must you configure on a switch to allow it to ...
Question 102: Which two of these are potential results of an attacker perf...
Question 103: Which command on the switch ensures that the Service-Type at...
Question 104: Which operating system type needs access to the Internet to ...
Question 105: Which type of SGT classification method is required when aut...
Question 106: By default, how many days does Cisco ISE wait before it purg...
Question 107: What three changes require restarting the application servic...
Question 108: An engineer must limit the configuration parameters that can...
Question 109: Which profiling probe collects the user-agent string?...
Question 110: How many days does Cisco ISE wait before it purges a session...
Question 111: Which definition of "posturing" as it relates to a general n...
Question 112: Which description of the purpose of the continue option in a...
Question 113: An engineer wants do allow dynamic vlan assignment from ISE....
Question 114: Which two statements about MAB are true? (Choose two.)...
Question 115: The switch 2960-x the below configuration: (sw-if)# switchpo...
Question 116: Which of these allows you to add event actions globally base...
Question 117: A network security engineer is considering configuring 802.1...
Question 118: What are the four code fields which identify the type of an ...
Question 119: When configuring the Auto Update feature for Cisco IOS IPS, ...
Question 120: What are two actions that can occur when an 802.1X-enabled p...
Question 121: Which type of access list is the most scalable that Cisco IS...
Question 122: A company wants to allow employees to register and manage th...
Question 123: (Exhibit) Refer to the exhibit. If a user with privilege 15 ...
Question 124: Which two Active Directory authentication methods are suppor...
Question 125: Which three options can be pushed from a Cisco ISE server as...
Question 126: A customer is concerned with the use of the issued laptops e...
Question 127: Which two options enable security group tags to the assigned...
Question 128: A security administrator wants to profile endpoints and gain...
Question 129: Which protocol provides the real time request to the service...
Question 130: Which ISE feature is used to facilitate a BYOD deployment?...
Question 131: Which two additional fields are added to an Ethernet frame w...
Question 132: What is the default posture status for non-agent capable dev...
Question 133: What are two methods of enforcement with SGTs?...
Question 134: What is the SGt assignment when authentication is not availa...
Question 135: If the user is in a non-compliant state and wants to Get out...
Question 136: Which option is one method for transporting security group t...
Question 137: A security engineer must create an Antivirus remediation pol...
Question 138: Which attribute is needed for Cisco ISE to profile a device ...
Question 139: Within a BYOD environment, when employees add devices using ...
Question 140: You are troubleshooting reported connectivity issues from re...
Question 141: Which port does cisco ISE use for native supplicant provisio...
Question 142: A malicious user gained network access by spoofing printer c...
Question 143: Which two attributes are delivered by the DHCP probe to the ...
Question 144: In this simulation, you will need to answer three multiple c...
Question 145: What are three ways that an SGT can be assigned to network t...
Question 146: Which command would be used in order to maintain a single op...
Question 147: When using a DHCP probe in a Cisco ISE deployment, which typ...
Question 148: Refer to the exhibit. (Exhibit) The links outside the TrustS...
Question 149: With which two appliance-based products can Cisco Prime Infr...
Question 150: Which three ISE posture remediation actions are supported by...
Question 151: An engineer wants to migrate 802.1x deployment phase from Op...
Question 152: A security engineer has configured a switch port in x closed...
Question 153: What are two functions of Diagnostic tool? (Choose two.)...
Question 154: DRAG DROP A security engineer is deploying Cisco ISE for a c...
Question 155: Refer to exhibit, which statement about the authentication p...
Question 156: Which command defines administrator CLI access in ACS5.x?...
Question 157: An engineer is designing a BYOD environment utilizing Cisco ...
Question 158: Which devices support download of environmental data and IP ...
Question 159: In this simulation, you are task to examine the various auth...
Question 160: Why does Cisco recommend assigning dynamic classification se...
Question 161: When using endpoint access control, which two access methods...
Question 162: Which Cisco IOS IPS feature allows to you remove one or more...
Question 163: Which statement about the CAK is true?...
Question 164: Which ISE deployment mode is similar to the industry standar...
Question 165: Which Cisco IOS IPS risk rating component uses a low value o...
Question 166: You are troubleshooting wired 802.1X authentications and see...
Question 167: In this simulation, you are task to examine the various auth...
Question 168: (Exhibit) Refer to the Exhibit. In a distributed deployment ...
Question 169: A user configured a Cisco Identity Service Engine and switch...
Question 170: Which three statement about Windows Server Update Services r...
Question 171: When Cisco IOS IPS is configured to use SDEE for event notif...
Question 172: Which supplicants(s) and server(s) are capable of supporting...
Question 173: You are configuring SGA on a network device that is unable t...
Question 174: Which two accounting types are used to implement accounting ...
Question 175: Where is dynamic SGT classification configured?...
Question 176: Which type of SGT propagation does a WLC in a data center re...
Question 177: Which two options can a sponsor select to create bulk guest ...
Question 178: Which interface-level command is needed to turn on dot1x aut...
Question 179: You discover that the Cisco ISE is failing to connect to the...
Question 180: When is it most appropriate to choose IPS functionality base...
Question 181: In Cisco ISE 1.3 and above, which two operations are allowed...
Question 182: Which option is the correct redirect-ACL for Wired-CWA, with...
Question 183: (Exhibit) Refer to the exhibit. Which two things must be ver...
Question 184: Which two NAC agents support file remediation? (Choose two.)...