<< Prev Question Next Question >>

Question 156/235

Which two EAP types require server side certificates? (Choose two.)

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (235q)
Question 1: In AAA, what function does authentication perform?...
Question 2: Which three statements about the Cisco ISE profiler are true...
Question 3: Which two identity databases are supported when PEAP-MSCHAPv...
Question 4: Which option is the correct format of username in MAB authen...
Question 5: What user rights does an account need to join ISE to a Micro...
Question 6: Which three network access devices allow for static security...
Question 7: The corporate security policy requires multiple elements to ...
1 commentQuestion 8: Which two types of web portals are related to guest services...
Question 9: Which type of probe is required when using a Cisco IOS Senso...
Question 10: Which condition triggers wireless authentication?...
Question 11: How frequently does the Profiled Endpoints dashlet refresh d...
Question 12: Which attribute is needed for Cisco ISE to profile a device ...
Question 13: (Exhibit) Refer to the exhibit. Which two things must be ver...
Question 14: Refer to the exhibit. (Exhibit) Which ISE flow mode does thi...
Question 15: Which feature of Cisco ASA allows VPN users to be postured a...
Question 16: Which effect does the ip http secure-server command have on ...
Question 17: Which type of remediation does Windows Server Update Service...
Question 18: Refer to the exhibit. (Exhibit) Which statement about the au...
Question 19: You are managing a network environment in which clients that...
Question 20: Which type of SGT propagation does a WLC in a data center re...
Question 21: Which error in a redirect ACL can cause the redirection of a...
Question 22: The NAC Agent v4.9.x uses which ports and protocols to commu...
Question 23: Which two portals can be configured to use portal FQDN? (Cho...
Question 24: In an ISE 1.3 environment, which path does a network enginee...
Question 25: Which EAP method uses a modified version of the MS-CHAP auth...
Question 26: (Exhibit) Refer to the exhibit. If the user matches the give...
Question 27: Which two components are required to connect to a WLAN netwo...
Question 28: Which two Cisco Catalyst switch interface commands allow onl...
Question 29: Which description of SXP is true?...
Question 30: Which two attributes must match between two Cisco ASA device...
Question 31: An organization has recently deployed ISE with the latest mo...
Question 32: From which location can you run reports on endpoint profilin...
Question 33: An engineer must enable SGACL policy globally for a Cisco Tr...
Question 34: Which statement about the CAK is true?...
Question 35: Which three components comprise the Cisco ISE profiler? (Cho...
Question 36: With which two appliance-based products can Cisco Prime Infr...
Question 37: Which two values are compared by the binary comparison funct...
Question 38: Which three are required steps to enable SXP on a Cisco ASA?...
Question 39: What three changes require restarting the application servic...
Question 40: A company has implemented a dual SSID BYOD design. A provisi...
Question 41: Which type of sensor requires an embedded data collector in ...
Question 42: Which type of SGT propagation does a WLC in a datacenter req...
Question 43: Which three ISE posture remediation actions are supported by...
Question 44: Which option is a recommended agent for guest posture assess...
Question 45: Which protocol provides the real time request to the service...
Question 46: Which Cisco IOS IPS risk rating component uses a low value o...
Question 47: A network is seeing a posture status "unknown" for a single ...
Question 48: Which statement about system time and NTP server configurati...
Question 49: Which three of these are features of data plane security on ...
Question 50: If an endpoint is marked noncompliant during that download, ...
Question 51: What is a feature of Cisco WLC and IPS synchronization?...
Question 52: What is a requirement for posture administration services in...
Question 53: A properly configured Cisco ISE Policy Service node is not r...
Question 54: Refer to the exhibit. (Exhibit) The links outside the TrustS...
Question 55: In a split ACS deployment with primary and secondary servers...
Question 56: Which two Active Directory authentication methods are suppor...
Question 57: Where is client traffic decrypted in a controller-based wire...
Question 58: Which setting provides the best security for a WLAN and auth...
Question 59: Which three statements describe differences between TACACS+ ...
Question 60: A new consultant must be granted network access for only six...
Question 61: Scenario In this simulation, you are task to examine the var...
Question 62: In an 802.1X deployment, what two components are responsible...
Question 63: An engineer must limit the configuration parameters that can...
Question 64: Cisco IOS IPS uses which alerting protocol with a pull mecha...
Question 65: Which action do you take to restrict network access for endp...
Question 66: An engineer must ensure that all client operating systems ha...
Question 67: On which type of node does the Cisco ISE sponsor portal resi...
Question 68: A security engineer has a new TrustSec project and must crea...
Question 69: Which option is the code field of n EAP packet?...
Question 70: When Cisco IOS IPS is configured to use SDEE for event notif...
Question 71: Which two NAC agents support file remediation? (Choose two.)...
Question 72: A network security engineer is considering configuring 802.1...
Question 73: Which configuration must you perform on a switch to deploy C...
Question 74: Which two authentication stores are supported to design a wi...
Question 75: What are the initial steps must you perform to add the ISE t...
Question 76: A network administrator noticed that wireless guests are abl...
Question 77: An engineer wants to migrate 802.1x deployment phase from Op...
Question 78: Which two are valid ISE posture conditions? (Choose two.)...
Question 79: Which administrative role has permission to assign Security ...
Question 80: What are two actions that can occur when an 802.1X-enabled p...
Question 81: Which two profile attributes can be collected by a Cisco Cat...
Question 82: When configuring NAT, which three protocols that are shown m...
Question 83: Which RADIUS attribute can be used to dynamically assign the...
Question 84: Refer to the exhibit. (Exhibit) If the given configuration i...
Question 85: What attribute could be obtained from the SNMP query probe?...
Question 86: Which state is a Cisco IOS IPS signature in if it does not t...
Question 87: An engineer has created a redirect ACL to forward traffic to...
Question 88: Which 802.1X command ignores Access-Reject during EAP authen...
Question 89: Which two endpoint operating systems are supported during BY...
Question 90: (Exhibit) Refer to the exhibit. Which authentication method ...
Question 91: What are the two values Cisco recommends that you configure ...
Question 92: You are finding that the 802.1X-configured ports are going i...
Question 93: In the command 'aaa authentication default group tacacs loca...
Question 94: When configuring the Auto Update feature for Cisco IOS IPS, ...
Question 95: Which two features are supported by named access list, but n...
Question 96: When using CA for identity source, which method can be used ...
Question 97: Which command configures console port authorization under li...
Question 98: Which client interface or interfaces are provisioned when th...
Question 99: Which statement about Cisco Management Frame Protection is t...
Question 100: You must recover a wireless client from quarantine. You disc...
Question 101: Which statement about Cisco ISE BYOD is true?...
Question 102: Which interface-level command is needed to turn on dot1x aut...
Question 103: You are configuring SGA on a network device that is unable t...
Question 104: Which option is one method for transporting security group t...
Question 105: Security Group Access requires which three syslog messages t...
Question 106: A network administrator needs to determine the ability of ex...
Question 107: An administrator is configuring an ASA firewall for to secur...
Question 108: In a Cisco ISE deployment, which traffic is permitted by the...
Question 109: How many days does Cisco ISE wait before it purges a session...
Question 110: Which guest service requires session services to be enabled ...
Question 111: Which components must be selected for a client provisioning ...
Question 112: Which port does cisco ISE use for native supplicant provisio...
Question 113: Refer to the exhibit. (Exhibit) You are troubleshooting RADI...
Question 114: Which two options are valid for configuring IEEE 802.1AE MAC...
Question 115: How many days does Cisco ISE wait before it purges a session...
Question 116: What is the result of configuring the command dotlx system-a...
Question 117: Which type of SGT classification method is required when aut...
Question 118: Which two Cisco ISE administration options are available in ...
Question 119: When you select Centralized Web Auth in the ISE Authorizatio...
Question 120: Which five portals are provided by PSN? (Choose five.)...
Question 121: An engineer of Company A wants to know what kind of devices ...
Question 122: Which two posture redirect ACLs and remediation DACLs must b...
Question 123: What are three portals provided by PSN? (Choose three.)...
Question 124: An administrator can leverage which attribute to assign priv...
Question 125: A network administrator must enable which protocol to utiliz...
Question 126: Which feature enables the Cisco ISE DHCP profiling capabilit...
Question 127: Why does Cisco recommend assigning dynamic classification se...
Question 128: Which action do you take to define the global authorization ...
Question 129: Which CoA type does a Cisco ISE PSN send to a network access...
Question 130: A wireless deployment must check guest device compliance bef...
Question 131: When you add a new PSN for guest access services, which two ...
Question 132: Which two accounting types are used to implement accounting ...
Question 133: If the user is in a non-compliant state and wants to Get out...
Question 134: During client provisioning on a Mac OS X system, the client ...
Question 135: Which command is useful when troubleshooting AAA Authenticat...
Question 136: Which authorization method is the Cisco best practice to all...
Question 137: Which two protocols does Cisco Prime Infrastructure use for ...
Question 138: Which default identity source is used by the MyDevices_Porta...
Question 139: Changes were made to the ISE server while troubleshooting, a...
Question 140: Which three statements about the Cisco wireless IPS solution...
Question 141: Refer to the exhibit. (Exhibit) If the host sends a packet a...
Question 142: When 802.1X is implemented, how do the client (supplicant) a...
Question 143: What is the SGT assignment when authentication is not availa...
Question 144: Which two options enable security group tags to the assigned...
Question 145: Scenario: Currently, many users are experiencing problems us...
Question 146: Wireless client supplicants attempting to authenticate to a ...
Question 147: Which configuration is required in the Cisco ISE Authenticat...
Question 148: Which protocol sends authentication and accounting in differ...
Question 149: An organization is deciding between single or dual SSID solu...
Question 150: Which two components are required for creating native suppli...
Question 151: Which two services are included in the Cisco ISE posture ser...
Question 152: Which option describes the purpose of configuring Native Sup...
Question 153: What are Supplicant and Authentication server that support E...
Question 154: Which keying mechanism is used with downlink MACsec?...
Question 155: Which internal Cisco ISE component reduces demand on JVM mem...
Question 156: Which two EAP types require server side certificates? (Choos...
Question 157: Which two of these are potential results of an attacker perf...
Question 158: Which WLC debug command would be used to troubleshoot authen...
Question 159: Which method does Cisco prefer to securely deploy guest wire...
Question 160: Instructions In this simulation, you will need to answer thr...
Question 161: Which Smart Call Home profile is used for anonymous reportin...
Question 162: Which option restricts guests from connecting more than one ...
Question 163: Which command enables static PAT for TCP port 25?...
Question 164: Which remediation type ensures that Automatic Updates config...
Question 165: A network engineer is configuring HTTP based CWA on a switch...
Question 166: Which two options are EAP methods supported by Cisco ISE? (C...
Question 167: When performing NAT, which of these is a limitation you need...
Question 168: A security engineer must provision dynamic TrustSec classifi...
Question 169: Which two protocols are supported with the Cisco IOS Device ...
Question 170: Refer to the exhibit. (Exhibit) Which three statements about...
Question 171: Which two additional fields are added to an Ethernet frame w...
Question 172: Which valid external identity source can be used with Cisco ...
Question 173: What is a required step when you deploy dynamic VLAN and ACL...
Question 174: A Cisco ISE deployment wants to use Active Directory as an e...
Question 175: Which model does Cisco support in a RADIUS change of authori...
Question 176: Which action does the command private-vlan association 100,2...
Question 177: A network administrator needs to implement a service that en...
Question 178: Which two identity store options allow you to authorize base...
1 commentQuestion 179: How does the device sensor send information to a RADIUS serv...
Question 180: A manager of Company A is hosting a conference. Conference p...
Question 181: Scenario In this simulation, you are task to examine the var...
Question 182: When you are configuring DHCP snooping, how should you class...
Question 183: Which three algorithms should be avoided due to security con...
Question 184: Which two statements about RADIUS are true? (Choose two.)...
Question 185: Which two simple posture conditions are valid? (Choose two.)...
Question 186: What protects MacSec Frames?
1 commentQuestion 187: Which definition of "posturing" as it relates to a general n...
Question 188: Refer to exhibit, which statement about the authentication p...
Question 189: Scenario In this simulation, you are task to examine the var...
Question 190: Which ISE feature is used to facilitate a BYOD deployment?...
Question 191: Which command is needed to enable dot1x globally on the swit...
Question 192: Which Cisco ISE feature can differentiate a corporate endpoi...
Question 193: A customer has implemented a BYOD policy to allow employees ...
Question 194: When Cisco IOS IPS signatures are being tuned, how is the Ta...
Question 195: Under which circumstance would an inline posture node be dep...
Question 196: In a basic ACS deployment consisting of two servers, for whi...
Question 197: Which option is the correct redirect-ACL for Wired-CWA, with...
Question 198: Which 802.1x command is needed for ACL to be applied on a sw...
Question 199: Which description of the purpose of the continue option in a...
Question 200: In an 802.1X authorization process, a network access device ...
Question 201: You configured wired 802.1X with EAP-TLS on Windows machines...
Question 202: Which task must you perform on a node before it can host Cis...
Question 203: Which three features should be enabled as best practices for...
Question 204: In Cisco ISE 1.3, where is BYOD enabled with dual-SSID onboa...
Question 205: The posture run-time services encapsulates which protocol se...
Question 206: Which two statements about Cisco NAC Agents that are install...
Question 207: Which type of access list is the most scalable that Cisco IS...
Question 208: Refer to the exhibit. (Exhibit) Which URL must you enter in ...
Question 209: In an 802.1X environment, which feature allows for non-802.1...
Question 210: Cisco ISE distributed deployments support which three featur...
Question 211: Which functionality does the Cisco ISE self-provisioning flo...
Question 212: What is the default posture status for non-agent capable dev...
1 commentQuestion 213: (Exhibit) Which ISE flow mode does this diagram represent?...
Question 214: You are installing Cisco ISE on nodes that will be used in a...
Question 215: When using a DHCP probe in a Cisco ISE deployment, which typ...
Question 216: Which supplicants(s) and server(s) are capable of supporting...
Question 217: Which three personas can a Cisco ISE assume in a deployment?...
Question 218: Which advantage is provided by using Active Directory as an ...
Question 219: Which statement best describes inside policy based NAT?...
Question 220: What EAP method supports mutual certificate-based authentica...
Question 221: A network administrator is seeing a posture status "unknown'...
Question 222: A network administration wants to set up a posture condition...
Question 223: Which two profile attributes can be collected by a Cisco Wir...
Question 224: In Cisco ISE, which two actions can be taken based on matchi...
Question 225: Which characteristic of an SGT enforcement policy is true?...
Question 226: Which command in the My Devices Portal can restore a previou...
Question 227: In the redirect URL authorization attribute, which Cisco ISE...
Question 228: Which action must an administrator take after joining a Cisc...
Question 229: A company has implemented a dual SSID BYOD design. A provisi...
Question 230: When you configure an endpoint profiling policy rule, which ...
Question 231: Which network component would issue the CoA?...
Question 232: A network administrator must enable which protocol extension...
Question 233: Which Cisco ISE 1.x protocol can be used to control admin ac...
Question 234: A malicious user gained network access by spoofing printer c...
Question 235: What is the first step for configuring Cisco ISE for the onb...