<< Prev Question Next Question >>

Question 214/229

An engineer must ensure that all client operating systems have the AnyConnect Agent for an upcoming posture implementation. Which two versions of OS does the AnyConnect posture agent support? (Choose two.)

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (229q)
Question 1: What are three portals provided by PSN? (Choose three.)...
Question 2: Which two Cisco ISE administration options are available in ...
Question 3: Which option restricts guests from connecting more than one ...
Question 4: Within a BYOD environment, when employees add devices using ...
Question 5: When using CA for identity source, which method can be used ...
Question 6: Which action does the command private-vlan association 100,2...
Question 7: Which advanced authentication setting is needed to allow an ...
Question 8: Which two of these are potential results of an attacker perf...
Question 9: Which three algorithms should be avoided due to security con...
Question 10: If an endpoint is marked noncompliant during that download, ...
Question 11: Which mechanism does Cisco ISE use to force a device off the...
Question 12: Which protocol is EAP encapsulated in for communications bet...
Question 13: What are two actions that can occur when an 802.1X-enabled p...
Question 14: Which protocol sends authentication and accounting in differ...
Question 15: Which option is required for inline security group tag propa...
Question 16: Which three statement about Windows Server Update Services r...
Question 17: Which Cisco ISE feature can differentiate a corporate endpoi...
Question 18: Which 802.1x command is needed for ACL to be applied on a sw...
Question 19: A company wants to allow employees to register and manage th...
Question 20: You are configuring SGA on a network device that is unable t...
Question 21: You have configured a Cisco ISE 1.2 deployment for self-regi...
Question 22: What three changes require restarting the application servic...
Question 23: When configuring NAT, which three protocols that are shown m...
Question 24: Scenario In this simulation, you are task to examine the var...
Question 25: After an endpoint has completed authentication with MAB, a s...
Question 26: What are two client-side requirements of the NAC Agent and N...
Question 27: You discover that the Cisco ISE is failing to connect to the...
Question 28: When performing NAT, which of these is a limitation you need...
Question 29: Which feature must you configure on a switch to allow it to ...
Question 30: Instructions In this simulation, you will need to answer thr...
Question 31: Refer to the exhibit. (Exhibit) The links outside the TrustS...
Question 32: A properly configured Cisco ISE Policy Service node is not r...
Question 33: Which type of remediation does Windows Server Update Service...
Question 34: A security administrator wants to profile endpoints and gain...
Question 35: (Exhibit) Refer to the exhibit. Which authentication method ...
Question 36: Which authorization method is the Cisco best practice to all...
Question 37: Which two types of client provisioning resources are used fo...
Question 38: Which network component would issue the CoA?...
Question 39: You are troubleshooting wired 802.1X authentications and see...
Question 40: Which error in a redirect ACL can cause the redirection of a...
Question 41: Which two answers are potential results of an attacker that ...
Question 42: You configured wired 802.1X with EAP-TLS on Windows machines...
Question 43: Which type of SGT classification method is required when aut...
Question 44: Which supplicants(s) and server(s) are capable of supporting...
Question 45: Under which circumstance would an inline posture node be dep...
Question 46: Where must periodic re-authentication be configured to allow...
Question 47: What is a required configuration step for an 802.1X capable ...
Question 48: What EAP method supports mutual certificate-based authentica...
Question 49: Which two are technologies that secure the control plane of ...
Question 50: Which two statements about MAB are true? (Choose two.)...
Question 51: A network is seeing a posture status "unknown" for a single ...
Question 52: You are troubleshooting reported connectivity issues from re...
Question 53: Which are two functional components of the posture service? ...
Question 54: Which method does Cisco prefer to securely deploy guest wire...
Question 55: When RADIUS NAC and AAA Override are enabled for WLC on a Ci...
2 commentQuestion 56: Refer to the exhibit. Which is the mode operational flow sho...
Question 57: When is it feasible for a port to be both a guest VLAN and a...
Question 58: When you are configuring DHCP snooping, how should you class...
Question 59: What are two methods of enforcement with SGTs?...
Question 60: Which command configures console port authorization under li...
Question 61: An engineer wants do allow dynamic vlan assignment from ISE....
Question 62: Which two attributes must match between two Cisco ASA device...
Question 63: Where is dynamic SGT classification configured?...
Question 64: Which feature enables the Cisco ISE DHCP profiling capabilit...
Question 65: Which three events immediately occur when a user clicks regi...
Question 66: A malicious user gained network access by spoofing printer c...
Question 67: Which two options are EAP methods supported by Cisco ISE? (C...
Question 68: Scenario In this simulation, you are task to examine the var...
Question 69: You enabled the guest session limit feature on the Cisco ISE...
Question 70: Changes were made to the ISE server while troubleshooting, a...
Question 71: Which feature of Cisco ASA allows VPN users to be postured a...
Question 72: Refer to the exhibit. (Exhibit) You are configuring permissi...
Question 73: An engineer must enable SGACL policy globally for a Cisco Tr...
Question 74: Which technology performs CoA Support Posture Service?...
Question 75: Cisco IOS IPS uses which alerting protocol with a pull mecha...
Question 76: When Cisco IOS IPS signatures are being tuned, how is the Ta...
Question 77: Which 802.1X command ignores Access-Reject during EAP authen...
Question 78: Refer to the exhibit. (Exhibit) Which statement about the au...
Question 79: An organization has recently deployed ISE with Trustsec capa...
Question 80: A network administration wants to set up a posture condition...
Question 81: Your guest-access wireless network is experiencing degraded ...
Question 82: Which three options can be pushed from Cisco ISE server as p...
Question 83: Which condition triggers wireless authentication?...
Question 84: Which two additional fields are added to an Ethernet frame w...
Question 85: Which Cisco IOS IPS feature allows to you remove one or more...
Question 86: Refer to exhibit, which statement about the authentication p...
Question 87: In a Cisco ISE deployment, which traffic is permitted by the...
Question 88: Which statement about a distributed Cisco ISE deployment is ...
1 commentQuestion 89: Which port does cisco ISE use for native supplicant provisio...
Question 90: During client provisioning on a Mac OS X system, the client ...
Question 91: Which two identity store options allow you to authorize base...
Question 92: Which debug command on a Cisco WLC shows the reason that a c...
Question 93: When using endpoint access control, which two access methods...
Question 94: What are two possible reasons why a scheduled nightly backup...
Question 95: The posture run-time services encapsulates which protocol se...
Question 96: When is it most appropriate to choose IPS functionality base...
Question 97: Which configuration must you perform on a switch to deploy C...
Question 98: In an 802.1X environment, which feature allows for non-802.1...
Question 99: Which two switchport commands enable MAB and allow non-802.1...
Question 100: In an 802.1X authorization process, a network access device ...
Question 101: Which state is a Cisco IOS IPS signature in if it does not t...
1 commentQuestion 102: What is the SGt assignment when authentication is not availa...
Question 103: What are three ways that an SGT can be assigned to network t...
Question 104: Which ISE deployment mode is similar to the industry standar...
Question 105: When using a DHCP probe in a Cisco ISE deployment, which typ...
1 commentQuestion 106: Which two statements about administrative access to the ACS ...
Question 107: You are installing Cisco ISE on nodes that will be used in a...
1 commentQuestion 108: An engineer of Company A will be sending guest credentials t...
Question 109: What is the default posture status for non-agent capable dev...
Question 110: When enabling the Cisco IOS IPS feature, which step should y...
Question 111: During BYOD flow, where does a Microsoft Windows 8.1 PC down...
1 commentQuestion 112: Which statement about the authentication protocol used in th...
Question 113: The corporate security policy requires multiple elements to ...
Question 114: Which command would be used in order to maintain a single op...
Question 115: Which three are required steps to enable SXP on a Cisco ASA?...
Question 116: When you add a new PSN for guest access services, which two ...
Question 117: Which Cisco IOS IPS risk rating component uses a low value o...
Question 118: When Cisco IOS IPS is configured to use SDEE for event notif...
Question 119: Which functionality does the Cisco ISE self-provisioning flo...
Question 120: Refer to the exhibit. (Exhibit) Which URL must you enter in ...
Question 121: What type of identity group is the Blacklist identity group?...
Question 122: Which default identity source is used by the MyDevices_Porta...
Question 123: Which two statements about administrative access to the Cisc...
Question 124: Which action must an administrator take after joining a Cisc...
Question 125: Which of these is a configurable Cisco IOS feature that trig...
Question 126: Which two posture redirect ACLs and remediation DACLs must b...
Question 127: Which three of these are features of data plane security on ...
Question 128: Which two options are valid for configuring IEEE 802.1AE MAC...
Question 129: Which two are valid ISE posture conditions? (Choose two.)...
Question 130: A network administrator is seeing a posture status "unknown'...
Question 131: Which time allowance is the minimum that can be configured f...
Question 132: Which EAP method uses a modified version of the MS-CHAP auth...
Question 133: A network security engineer is considering configuring 802.1...
Question 134: What are the initial steps must you perform to add the ISE t...
Question 135: A customer is concerned with the use of the issued laptops e...
Question 136: Which Cisco ISE 1.x protocol can be used to control admin ac...
1 commentQuestion 137: Which definition of "posturing" as it relates to a general n...
Question 138: Which two Cisco Catalyst switch interface commands allow onl...
Question 139: Instructions In this simulation, you will need to answer thr...
Question 140: A security engineer must create an Antivirus remediation pol...
Question 141: Which two components are required for creating native suppli...
Question 142: Which profiling probe collects the user-agent string?...
Question 143: What steps must you perform to deploy a CA-signed identify c...
Question 144: Which attribute is needed for Cisco ISE to profile a device ...
Question 145: Which description of the use of low-impact mode in a Cisco I...
Question 146: Which three remediation actions are supported by the Web Age...
Question 147: Which statement about the Cisco ISE BYOD feature is true?...
Question 148: Which two Active Directory authentication methods are suppor...
Question 149: Which statement about IOS accounting is true?...
Question 150: What is the result of configuring the command dotlx system-a...
Question 151: Which three ISE posture remediation actions are supported by...
Question 152: When configuring the Auto Update feature for Cisco IOS IPS, ...
Question 153: Within a BYOD environment, when employees add devices using ...
1 commentQuestion 154: An engineer of Company A wants to know what kind of devices ...
Question 155: You are finding that the 802.1X-configured ports are going i...
Question 156: Which two fields are characteristics of IEEE 802.1AE frame? ...
Question 157: How many days does Cisco ISE wait before it purges a session...
Question 158: When 802.1X is implemented, how do the client (supplicant) a...
Question 159: A user is on a wired connection and the posture status is no...
Question 160: Scenario: Currently, many users are experiencing problems us...
Question 161: Which three statements describe differences between TACACS+ ...
Question 162: What is the effect of the ip http secure-server command on a...
Question 163: Refer to the exhibit. (Exhibit) Which statement describes th...
Question 164: Scenario In this simulation, you are task to examine the var...
Question 165: Which two are best practices to implement profiling services...
Question 166: A network administrator must enable which protocol to utiliz...
Question 167: Which radius attribute can be used to dynamically assign the...
Question 168: When you configure an endpoint profiling policy rule, which ...
Question 169: When you select Centralized Web Auth in the ISE Authorizatio...
Question 170: What is the purpose of the Cisco ISE Guest Service Sponsor P...
Question 171: A network administrator needs to determine the ability of ex...
1 commentQuestion 172: The switch 2960-x the below configuration: (sw-if)# switchpo...
Question 173: Which two profile attributes can be collected by a Cisco Wir...
Question 174: Which network access device feature can you configure to gat...
Question 175: Which command defines administrator CLI access in ACS5.x?...
Question 176: Which remediation type ensures that Automatic Updates config...
Question 177: Where would a Cisco ISE administrator define a named ACL to ...
Question 178: Which devices support download of environmental data and IP ...
Question 179: In Cisco ISE, which probe must be enabled to collect profili...
Question 180: Which RADIUS attribute is used primarily to differentiate an...
Question 181: What are the initial steps to configure an ACS as a TACACS s...
Question 182: An engineer wants to migrate 802.1x deployment phase from Op...
Question 183: If the user is in a non-compliant state and wants to Get out...
Question 184: A company has implemented a dual SSID BYOD design. A provisi...
Question 185: A security engineer has a new TrustSec project and must crea...
Question 186: With which two appliance-based products can Cisco Prime Infr...
1 commentQuestion 187: Which packets are allowed on a dot1x port with no authentica...
Question 188: An engineer has discovered that a NAD is already configured ...
Question 189: Which components must be selected for a client provisioning ...
Question 190: Certain endpoints are missing DHCP profiling data. Which opt...
Question 191: Which two options enable security group tags to the assigned...
Question 192: Which statement about the CAK is true?...
Question 193: In Cisco ISE 1.3, where is BYOD enabled with dual-SSID onboa...
Question 194: Which three pieces of information can be found in an authent...
Question 195: What attribute could be obtained from the SNMP query probe?...
Question 196: Which profiling capability allows you to gather and forward ...
Question 197: Instructions In this simulation, you will need to answer thr...
Question 198: Which statement best describes inside policy based NAT?...
Question 199: Which of these allows you to add event actions globally base...
Question 200: Which three host modes support MACsec? (Choose three.)...
Question 201: What steps must you perform to deploy a CA-signed identity c...
Question 202: Which five portals are provided by PSN? (Choose five.)...
Question 203: What user rights does an account need to join ISE to a Micro...
1 commentQuestion 204: Which three network access devices allow for static security...
Question 205: In Cisco ISE, which two actions can be taken based on matchi...
Question 206: Which advanced option within a WLAN must be enabled to trigg...
Question 207: Which three posture states can be used for authorization rul...
Question 208: Which two identity databases are supported when PEAP-MSCHAPv...
Question 209: What implementation must be added to the WLC to enable 802.1...
Question 210: Which two portals can be configured to use portal FQDN? (Cho...
Question 211: Which ISE feature is used to facilitate a BYOD deployment?...
Question 212: Refer to the exhibit. (Exhibit) You are troubleshooting RADI...
Question 213: Which valid external identity source can be used with Cisco ...
Question 214: An engineer must ensure that all client operating systems ha...
Question 215: Scenario In this simulation, you are task to examine the var...
Question 216: Which option is the code field of n EAP packet?...
Question 217: Which two profile attributes can be collected by a Cisco Cat...
Question 218: Which NAC agents support remediation? (Choose three.)...
Question 219: The NAC Agent v4.9.x uses which ports and protocols to commu...
Question 220: What endpoint operating system provides native support for t...
Question 221: What is the function of the SGACL policy matrix on a Cisco T...
Question 222: Which type of access list is the most scalable that Cisco IS...
Question 223: An engineer is investigating an issue with their Posture Run...
Question 224: Which effect does the ip http secure-server command have on ...
Question 225: A security engineer has configured a switch port in x closed...
Question 226: When RADIUS NAC and AAA Override are enabled for a WLC on a ...
Question 227: Which statement about Cisco ISE BYOD is true?...
Question 228: Which option is a recommended agent for guest posture assess...
Question 229: A network engineer is configuring HTTP based CWA on a switch...