During BYOD flow, from where does a Microsoft Windows PC download the Network Setup Assistant?
A.
Cisco App Store
B.
Microsoft App Store
C.
Cisco ISE directly
D.
Native OTA functionality
Cisco ISE directly
Which portal is used to customize the settings for a user to log in and download the compliance module?
A.
Client Profiling
B.
Client Endpoint
C.
Client Provisioning
D.
Client Guest
Client Provisioning
Which two fields are available when creating an endpoint on the context visibility page of Cisco IS? (Choose two )
A.
Policy Assignment
B.
Endpoint Family
C.
Identity Group Assignment
D.
Security Group Tag
E.
IP Address
Policy Assignment
Identity Group Assignment
Which term refers to an endpoint agent that tries to join an 802 1X-enabled network?
A.
EAP server
B.
supplicant
C.
client
D.
authenticator
authenticator
Which permission is common to the Active Directory Join and Leave operations?
A.
Create a Cisco ISE machine account in the domain if the machine account does not already exist
B.
Remove the Cisco ISE machine account from the domain.
C.
Set attributes on the Cisco ISE machine account
D.
Search Active Directory to see if a Cisco ISE machine account already ex.sts.
Search Active Directory to see if a Cisco ISE machine account already ex.sts.
In which two ways can users and endpoints be classified for TrustSec?
(Choose Two.)
A.
VLAN
B.
SXP
C.
dynamic
D.
QoS
E.
SGACL
VLAN
SGACL
What are two components of the posture requirement when configuring Cisco ISE posture? (Choose two)
A.
updates
B.
remediation actions
C.
Client Provisioning portal
D.
conditions
E.
access policy
remediation actions
conditions
What is a method for transporting security group tags throughout the network?
A.
by enabling 802.1AE on every network device
B.
by the Security Group Tag Exchange Protocol
C.
by embedding the security group tag in the IP header
D.
by embedding the security group tag in the 802.1Q header
by the Security Group Tag Exchange Protocol
What is a characteristic of the UDP protocol?
A.
UDP can detect when a server is down
B.
UDP offers best-effort delivery
C.
UDP can detect when a server is slow
D.
UDP offers information about a non-existent server
UDP offers best-effort delivery
Which statement about configuring certificates for BYOD is true?
A.
An Android endpoint uses EST, whereas other operating systems use SCEP for enrollment
B.
The SAN field is populated with the end user name.
C.
An endpoint certificate is mandatory for the Cisco ISE BYOD
D.
The CN field is populated with the endpoint host name
An endpoint certificate is mandatory for the Cisco ISE BYOD
Page 2 out of 16 Pages |
Previous |