300-208 SISAS v17 Nov 2018 PDF
300-208 SISAS v17 Nov 2018 PDF
300-208 SISAS v17 Nov 2018 PDF
300-208
Implementing Cisco
Secure Access Solutions
Version: 17.0
Web: www.marks4sure.com
Email: [email protected]
IMPORTANT NOTICE
Feedback
We have developed quality product and state-of-art service to ensure our customers interest. If you have any
suggestions, please feel free to contact us at [email protected]
Support
If you have any questions about our product, please provide the following items:
exam code
screenshot of the question
login id/email
please contact us at [email protected] and our technical experts will provide support within 24 hours.
Copyright
The product of each order has its own encryption code, so you should use it independently. Any unauthorized
changes will inflict legal punishment. We reserve the right of final explanation for this statement.
Practice Test Cisco - 300-208
A. Windows NAC
C. MAC NAC
Answer: A B C
Which two are technologies that secure the control plane of the Cisco router? (Choose two.)
B. uRPF
D. CPPr
E. BPDU protection
Answer: C D
The corporate security policy requires multiple elements to be matched in an authorization policy. Which
elements can be combined to meet the requirement?
C.
Answer: B
Which Cisco IOS IPS risk rating component uses a low value of 75, a medium value of 100, a high value of
150, and a mission-critical value of 200?
E. Promiscuous Delta
Answer: C
Which three statements about the Cisco wireless IPS solution are true? (Choose three.)
A. It enables stations to remain in power-save mode, except at specified intervals to receive data from the
access point.
Answer: B C D
Which three statements about the given configuration are true? (Choose three.)
Answer: B C F
Which of these allows you to add event actions globally based on the risk rating of each event, without having
to configure each signature individually?
Answer: C
A. It identifies the actions that the user can perform on the device.
D.
Answer: B
What steps must you perform to deploy a CA-signed identity certificate on an ISE device?
A. 1. Download the CA server certificate and install it on ISE.2. Generate a signing request and save it as a
file.3. Access the CA server and submit the CA request.4. Install the issued certificate on the ISE.
B. 1. Download the CA server certificate and install it on ISE.2. Generate a signing request and save it as a
file.3. Access the CA server and submit the CSR.4. Install the issued certificate on the CA server.
C. 1. Generate a signing request and save it as a file.2. Download the CA server certificate and install it on
ISE.3. Access the ISE server and submit the CA request.4. Install the issued certificate on the CA server.
D. 1. Generate a signing request and save it as a file.2. Download the CA server certificate and install it on
ISE.3. Access the CA server and submit the CSR.4. Install the issued certificate on the ISE.
Answer: D
Which two statements about administrative access to the ACS Solution Engine are true? (Choose two.)
A. The ACS Solution Engine supports command-line connections through a serial-port connection.
B. For GUI access, an administrative GUI user must be created with the add-guiadmin command.
C. The ACS Solution Engine supports command-line connections through an Ethernet interface.
Answer: A B
Explanation
who possess the proper administrative credentials.
The CLI administrator does not have access to the ACS web GUI.
To create an initial GUI administrator account that allows web access to the ACS SE GUI,
add-guiadmin :
Adds a GUI account that allows access to the SE using the ACS web GUI.
Which three statements about the Cisco ISE profiler are true? (Choose three.)
Answer: B E F
In the command 'aaa authentication default group tacacs local', how is the word 'default' defined?
A. Command set
B. Group name
C. Method list
D. Login type
Answer: C
Which three algorithms should be avoided due to security concerns? (Choose three.)
C. 1024-bit RSA
E. HMAC-SHA-1
G. 2048-bit Diffie-Hellman
Answer: A B C
A. 802.1x
B. WEP
C. TKIP
D. WPA
E. WPA2
Answer: E
What are the initial steps must you perform to add the ISE to the WLC?
A. 1. With a Web browser, establish an HTTP connection to the WLC pod.2. Navigate to Administration >
Authentication > New.3. Enter server values to begin the configuration.
B. 1. With a Web browser, establish an FTP connection to the WLC pod.2. Navigate to Security >
Administration > New.3. Add additional security features for FTP authentication.
C. 1. With a Web browser, establish an HTTP connection to the WLC pod.2. Navigate to Authentication >
New.3. Enter ACLs and Authentication methods to begin the configuration.
D. 1. With a Web browser connect, establish an HTTPS connection to the WLC pod.2. Navigate to
Security > Authentication > New.3. Enter server values to begin the configuration.
Answer: D
Which three pieces of information can be found in an authentication detail report? (Choose three.)
A. DHCP vendor ID
Answer: C D E
Which time allowance is the minimum that can be configured for posture reassessment interval?
A. 5 minutes
B. 20 minutes
C. 60 minutes
D. 90 minutes
Answer: C
Which two answers are potential results of an attacker that is performing a DHCP server spoofing attack?
(Choose two.)
A. ability to selectively change DHCP options fields of the current DHCP server, such as the giaddr field.
B. DoS
Answer: B E
When Cisco IOS IPS is configured to use SDEE for event notification, how are events managed?
A. They are stored in the router's event store and will allow authenticated remote systems to pull events
from the event store.
C. Events are sent via syslog over a secure SSUTLS communications channel.
D. When the event store reaches its maximum configured number of event notifications, the stored events
are sent via SDEE to a remote authenticated server and a new event store is created
Answer: A
You are troubleshooting reported connectivity issues from remote users who are acessing corporate
headquarters via an IPsec VPN connection. What should be your first step in troubleshooting these issues?
A. issue a show crypto isakmp policy command to verify matching policies of the tunnel endpoints
D. debug the connection process and look for any error messages in tunnel establishment
Answer: B
Which two of these are potential results of an attacker performing a DHCP server spoofing attack? (Choose
two.)
A. DHCP snooping
B. DoS
C. confidentiality breach
Answer: B C
In an 802.1X environment, which feature allows for non-802.1X-supported devices such as printers and fax
machines to authenticate?
A. multiauth
B. WebAuth
C. MAB
Answer: C
Answer: A
Cisco IOS IPS uses which alerting protocol with a pull mechanism for getting IPS alerts to the network
management application?
A. HTTPS
B. SMTP
C. SNMP
D.
D. syslog
E. SDEE
F. POP3
Answer: E
If the given configuration is applied to the object-group vpnservers, during which time period are external
users able to connect?
Answer: A
Which two EAP types require server side certificates? (Choose two.)
A. EAP-TLS
B. PEAP
C. EAP-MD5
D. LEAP
E. EAP-FAST
F. MSCHAPv2
Answer: A B
Which two profile attributes can be collected by a Cisco Wireless LAN Controller that supports Device
Sensor? (Choose two.)
B. user agent
C. DHCP options
D. open ports
F. FQDN
Answer: B C
A network administrator needs to determine the ability of existing network devices to deliver key BYOD
services. Which tool will complete a readiness assessment and outline hardware and software capable and
incapable devices?
A. Prime Infrastructure
Answer: A
C.
Answer: B
Which identity store option allows you to modify the directory services that run on TCP/IP?
C. RADIUS
D. Active Directory
Answer: A
A. authorization default|WORD
Answer: D
A. 1. Choose Network Devices and AAA Clients > Network Resources.2. Click Create.
B. 1. Choose Network Resources > Network Devices and AAA Clients.2. Click Create.
C. 1. Choose Network Resources > Network Devices and AAA Clients.2. Click Manage.
D. 1. Choose Network Devices and AAA Clients > Network Resources.2. Click Install.
Answer: B
In the command 'aaa authentication default group tacacs local', how is the word 'default' defined?
A. Command set
B. Group name
C. Method list
D. Login type
Answer: C
Which two authentication stores are supported to design a wireless network using PEAP EAP-MSCHAPv2 as
the authentication method? (Choose two.)
B. ACS
C. LDAP
D. RSA Secure-ID
E. Certificate Server
Answer: A B
B. Cisco NAC Agents that communicate with the Cisco ISE server
Answer: D
What is a required step when you deploy dynamic VLAN and ACL assignments?
Answer: C
Which option describes what can be used to determine if DHCP requests from clients are reaching Cisco ISE?
Answer: D
What are two client-side requirements of the NAC Agent and NAC Web Agent installation? (Choose two.)
Answer: A C
Answer: A
When enabling the Cisco IOS IPS feature, which step should you perform to prevent rogue signature updates
from being installed on the router?
B. install a known RSA public key that correlates to a private key used by Cisco
C. manually import signature updates from Cisco to a secure server, and then transfer files from the secure
server to the router
D. use the SDEE protocol for all signature updates from a known secure management station
Answer: B
A network administrator configured DUAL SSID, where the first SSID is used for guest provisioning and the
other SSID for Employee provisioning. Which option he can use for layer 2 security provision?
A. MAB
B. 802.1x
C. authentication open
D. shared secret
Answer: A
What is a required configuration step for an 802.1X capable switch to support dynamic VLAN and ACL
assignments?
Answer: C
Which two components are required for creating native supplicant profile? (Choose two.)
A. Operating System
C. Ios Sutten
D. BYOD
Answer: A B
What are Supplicant and Authentication server that support EAP Chaining?
B. ACS
C. ISE
D. NFL
Answer: C
A. SXP
B. inline
C. Trust
D. Inherit
Answer: D
When you add a new PSN for guest access services, which two options must be enabled under deployment
settings? (Choose two.)
A. Admin
B. Monitoring
C. Policy Service
D. Session Services
E. Profiling
Answer: C D
Which setting provides the best security for a WLAN and authenticates users against a centralized directory
store?
Answer: A
Which two options are valid for configuring IEEE 802.1AE MACSec between switches in a TrustSec
network? (Choose two.)
Answer: A D
A. EAP-FAST
B. EAP-TLS
C. MSCHAPv2
D. PEAP
Answer: A
Which three posture states can be used for authorization rules? (Choose three.)
A. unknown
B. known
C. noncompliant
D. quarantined
E. compliant
F. no access
G. limited
Answer: A C E
When 802.1X is implemented, how do the client (supplicant) and authenticator communicate?
A. RADIUS
B. TACACS+
C. MAB
D. EAPOL
Answer: D
Which two Cisco ISE administration options are available in the Default Posture Status setting? (Choose two.)
A. Unknown
B. Compliant
C. FailOpen
D. FailClose
E. Noncompliant
Answer: B E
A. EAP-FAST
B.
B. EAP-TLS
C. MSCHAPv2
D. PEAP
Answer: A
Which two Cisco Catalyst switch interface commands allow only a single voice device and a single data
device to be connected to the IEEE 802.1X-enabled interface? (Choose two.)
Answer: A B
Which three network access devices allow for static security group tag assignment? (Choose three.)
D. load balancer
E. VPN concentrator
Answer: B C E
When RADIUS NAC and AAA Override are enabled for a WLC on a Cisco ISE, which two statements about
RADIUS NAC are true? (Choose two.)
A. It returns an access-accept and sends the redirection URL for all users.
B. It establishes secure connectivity between the RADIUS server and the Cisco ISE.
C. It allows the Cisco ISE to send a CoA request that indicates when the user is authenticated.
D. It is used for posture assessment, so the Cisco ISE changes the user profile based on posture result.
Answer: C D
When you are configuring DHCP snooping, how should you classify access ports?
A. untrusted
B. trusted
C. promiscuous
D. private
Answer: A
A network administrator needs to implement a service that enables granular control of IOS commands that can
be executed. Which AAA authentication method should be selected?
A. TACACS+
B. RADIUS
D. Generic LDAP
Answer: A
An administrator is configuring an ASA firewall for to secure access on ASA firewall in the essence of
controlling configuration command executed on the Firewall. Which command will he use?
Answer: D
What is the first step that occurs when provisioning a wired device in a BYOD scenario?
A. The smart hub detects that the physically connected endpoint requires configuration and must use MAB
to authenticate.
C. Cisco ISE authenticates the user and deploys the SPW package.
Answer: A
Which three are required steps to enable SXP on a Cisco ASA? (Choose three).
B. configure password
D. configure a peer
E. configure TACACS
Answer: B D F
Which two identity databases are supported when PEAP-MSCHAPv2 is used as EAP type? (Choose two.)
B. LDAP
G. RSA SecurID
Answer: A E
C. creates two private VLANs with the designation of VLAN 100 and VLAN 200
Answer: B
In an 802.1X authorization process, a network access device provides which three functions? (Choose three.)
Answer: A B C
A. guest
B. sponsor
C. my devices
D. blacklist
E. client provisioning
F. admin
Answer: A B C D E
A network engineer is configuring HTTP based CWA on a switch. Which three configuration elements are
required? (Choose three.)
C. Redirect access-list
D. Redirect-URL
Answer: A B C
Which two services are included in the Cisco ISE posture service? (Choose two.)
A. posture administration
B. posture run-time
C. posture monitoring
D. posture policing
E. posture catalog
Answer: A B
What user rights does an account need to join ISE to a Microsoft Active Directory domain?
B. Domain Admin
Answer: A
Cisco ISE distributed deployments support which three features? (Choose three.)
F. NetFlow probes
Answer: A C D
Answer: A
Which two identity store options allow you to authorize based on group membership? (Choose two).
C. RADIUS
D. Active Directory
Answer: A D
If the user is in a non-compliant state and wants to Get out of quarantine, what must be done?
A. download posture
B. download profiling
C. download mab
Answer: A
When Cisco IOS IPS signatures are being tuned, how is the Target Value Rating assigned?
B. It is calculated from a combination of the Attack Severity Rating and Signature Fidelity Rating
Answer: C
Which two components are required to connect to a WLAN network that is secured by EAP-TLS
authentication? (Choose two.)
B. AAA/RADIUS server
C. PSKs
D. CA server
Answer: B D
What is the result of configuring the command dotlx system-auth-control on a Cisco Catalyst switch?
D. places the configuration sub-mode into dotix-auth mode, in which you can identify the authentication
server parameters
Answer: B
Which authorization method is the Cisco best practice to allow endpoints access to the Apple App store or
Google Play store with Cisco WLC software version 7.6 or newer?
A. dACL
B. DNS ACL
D. redirect ACL
Answer: B
When performing NAT, which of these is a limitation you need to account for?
B. embedded IP addresses
Answer: B
The NAC Agent uses which port and protocol to send discovery packets to an ISE Policy Service Node?
A. tcp/8905
B. udp/8905
C. http/80
D. https/443
Answer: B
Explanation
http://www.cisco.com/c/en/us/td/docs/security/ise/2-0/installation_guide/b_ise_InstallationGuide20/
Cisco_SNS_3400_Series_Appliance_Ports_Reference.html
Answer: C
A. FQDN
B. CDP
D. User agent
Answer: B
Which of these is a configurable Cisco IOS feature that triggers notifications if an attack attempts to exhaust
critical router resources and if preventative controls have been bypassed or are not working correctly?
D. SNMPv3
Answer: C
In Cisco ISE, which probe must be enabled to collect profiling data using Device Sensor?
A. RADIUS
B. SNMPQuery
C. SNMPTrap
D. Network Scan
E. Syslog
Answer: A
A. every 30 seconds
B. every 60 seconds
C. every 2 minutes
D. every 5 minutes
Answer: B
When configuring the Auto Update feature for Cisco IOS IPS, what is a recommended best practice?
C. Enable anonymous TFTP downloads from Cisco.com and specify the download frequency.
D. Create the appropriate directory on the router's flash memory to store the download signature files.
E. Download the realm-cisco.pub.key file and update the public key stored on the router.
Answer: A
Where is client traffic decrypted in a controller-based wireless network protected with WPA2 Security?
A. Access Point
B. Switch
D. Authentication Server
Answer: A
Which two conditions are valid when configuring ISE for posturing? (Choose two.)
A. Dictionary
B. member Of
C. Profile status
D. File
E. Service
Answer: D E
Which protocol provides the real time request to the service running on the CA?
A. DOS
B. FILE
C. MAB
D. OCSP
Answer: D
Which two switchport commands enable MAB and allow non-802.1X capable devices to immediately run
through the MAB process? (Choose two.)
C. no authentication timer
E. authentication open
F. mab
Answer: A F
Which term describes a software application that seeks connectivity to the network via a network access
device?
A. authenticator
B. server
C. supplicant
D. WLC
Answer: C
Which debug command on a Cisco WLC shows the reason that a client session was terminated?
Answer: C
After you connected unmanaged switch to the port dot1x failed, what is the problem ?
Answer: A
B. hardware support
Answer: B
A. every 60 seconds
B. every 90 seconds
D. never
Answer: D
In the command 'aaa authentication default group tacacs local', how is the word 'default' defined?
A. Command set
B. Group name
C. Method list
D. Login type
Answer: C
Which advanced authentication setting is needed to allow an unknown device to utilize Central WebAuth?
Answer: C
Changes were made to the ISE server while troubleshooting, and now all wireless certificate authentications
are failing. Logs indicate an EAP failure. What is the most likely cause of the problem?
Answer: A
What implementation must be added to the WLC to enable 802.1X and CoA for wireless endpoints?
A. the ISE
B. an ACL
C. a router
D. a policy server
Answer: A
When is it feasible for a port to be both a guest VLAN and a restricted VLAN?
C. when private VLANs have been configured to place each end device into different subnets
D. when you want to allow both types of users the same services
Answer: D
Which administrative role has permission to assign Security Group Access Control Lists?
A. System Admin
C. Policy Admin
D. Identity Admin
Answer: C
An administrator can leverage which attribute to assign privileges based on Microsoft Active Directory user
groups?
A. member of
B. group
C. class
D. person
Answer: A
A. Shutdown
B. Disconnect
C. Dot1x
Answer: D
Cisco 802.1X phasing enables flexible deployments through the use of open, low-impact, and closed modes.
What is a unique characteristic of the most secure mode?
A.
Answer: C
In a multi-node ISE deployment, backups are not working on the MnT node. Which ISE CLI option would
help mitigate this issue?
A. repository
B. ftp-url
C. application-bundle
D. collector
Answer: A
Which RADIUS attribute can be used to dynamically assign the inactivity active timer for MAB users from
Cisco ISE node?
A. Idle-timeout attribute
B. Session-timeout attribute
C. Radius-server timeout
D. Termination-action attribute
Answer: A
A. It enables stations to remain in power-save mode, except at specified intervals to receive data from the
Answer: D
A. Dual SSID allows EAP-TLS only when connecting to the secured SSID.
Answer: E
Which EAP method uses a modified version of the MS-CHAP authentication protocol?
A. EAP-POTP
B. EAP-TLS
C. LEAP
D. EAP-MD5
Answer: C
Which state is a Cisco IOS IPS signature in if it does not take an appropriate associated action even if it has
been successfully compiled?
A.
A. retired
B. disabled
C. unsupported
D. inactive
Answer: B
Which effect does the ip http secure-server command have on a Cisco ISE?
A. It enables the HTTP server for users to connect on the command line.
B. It enables the HTTP server for users to connect by using web-based authentication.
C. It enables the HTTPS server for users to connect by using web-based authentication.
D. It enables the HTTPS server for users to connect on the command line.
Answer: C
A. enable
B. network down
C. TCP dump
Answer: C D
Which two portals can be configured to use portal FQDN? (Choose two.)
A. admin
B. sponsor
C. guest
D. my devices
Answer: B D
Which command is useful when troubleshooting AAA Authentication between a Cisco router and the AAA
server?
Answer: C
Which three statements describe differences between TACACS+ and RADIUS? (Choose three.)
A. RADIUS encrypts the entire packet, while TACACS+ encrypts only the password.
B. TACACS+ encrypts the entire packet, while RADIUS encrypts only the password.
E. RADIUS uses ports 1812 and 1813, while TACACS+ uses port 49.
F. TACACS+ uses ports 1812 and 1813, while RADIUS uses port 49
Answer: B D E
What is the purpose of the Cisco ISE Guest Service Sponsor Portal?
A. It tracks and stores user activity while connected to the Cisco ISE.
B. It securely authenticates guest users for the Cisco ISE Guest Service.
Answer: D
In a split ACS deployment with primary and secondary servers, which three statements about AAA load
handling are true? (Choose three.)
A. During normal operations, each server processes the full workload of both servers.
B. If a AAA connectivity problem occurs, the servers split the full load of authentication requests.
C. If a AAA connectivity problem occurs, each server processes the full workload of both servers.
D. During normal operations, the servers split the full load of authentication requests.
E. During normal operations, each server is used for specific operations, such as device administration and
network admission.
F. The primary servers are used to distribute policy information to other servers in the enterprise.
Answer: C D E
A. push
B. pull
C. policy
D. security
Answer: A
A. Policy NAT rules are those that determine which addresses need to be translated per the enterprise
security policy
B. Policy NAT consists of policy rules based on outside sources attempting to communicate with inside
endpoints.
C. These rules use source addresses as the decision for translation policies.
Answer: A
When is it most appropriate to choose IPS functionality based on Cisco IOS software?
A. when traffic rates are low and a complete signature is not required
B. when accelerated, integrated performance is required using hardware ASIC-based IPS inspections
Answer: A
What are the two values Cisco recommends that you configure and test when deploying MAB 802.1x?
(Choose two.)
A. supp-timeout
B. server-timeout
C. max-req
D. max-reauth-req
E. tx-period
Answer: B D
Which command can check a AAA server authentication for server group Group1, user cisco, and password
cisco555 on a Cisco ASA device?
B. ASA# test aaa-server authentication group Group1 username cisco password cisco555
Answer: A
A security engineer has configured a switch port in x closed mode. Which protocol is allowed to pass?
A. HTTP
B. EAPOL
C. Bootps
D. ARP
E. PXE
Answer: B
A. disconnected
B. limited
C. no access
D.
D. quarantined
Answer: D
A. Dictionary
B. memberOf
C. Profile status
D. File
E. Service
Answer: D E
Which three statement about Windows Server Update Services remediation are true?
Answer: A D E
Which three of these are features of data plane security on a Cisco ISR? (Choose three.)
B. FPM
C. uRPF
D. RBAC
E. CPPr
F. Netflow export
Answer: B C F
Which two statements about Cisco NAC Agents that are installed on clients that interact with the Cisco ISE
profiler are true? (Choose two.)
C. They interact with the posture service to enforce endpoint security policies.
Answer: C F
Which option restricts guests from connecting more than one device at a time?
B. Guest Portal Policy > Set Allow only one guest session per user
Answer: B
When RADIUS NAC and AAA Override are enabled for WLC on a Cisco ISE, which two statements about
RADIUS NAC are true? (Choose two.)
A. It will return an access-accept and send the redirection URL for all users.
B. It establishes secure connectivity between the RADIUS server and the ISE.
C. It allows the ISE to send a CoA request that indicates when the user is authenticated.
D. It is used for posture assessment, so the ISE changes the user profile based on posture result.
Answer: C D
Which Cisco IOS IPS feature allows to you remove one or more actions from all active signatures based on the
attacker and/or target address criteria, as well as the event risk rating criteria?
Answer: A
In a basic ACS deployment consisting of two servers, for which three tasks is the primary server responsible?
(Choose three.)
A. configuration
B. authentication
C. sensing
D. policy requirements
E. monitoring
F. repudiation
Answer: A B D
Which three personas can a Cisco ISE assume in a deployment? (Choose three.)
A. connection
B. authentication
C. administration
D. testing
E. policy service
F. monitoring
Answer: C E F
Security Group Access requires which three syslog messages to be sent to Cisco ISE? (Choose three.)
A. IOS-7-PROXY_DROP
B. AP-1-AUTH_PROXY_DOS_ATTACK
C. MKA-2-MACDROP
D. AUTHMGR-5-MACMOVE
E. ASA-6-CONNECT_BUILT
F. AP-1-AUTH_PROXY_FALLBACK_REQ
Answer: B D F
An engineer wants to migrate 802.1x deployment phase from Open to low impact mode.
Answer: A
Which statement about system time and NTP server configuration with Cisco ISE is true?
A. The system time and NTP server settings can be configured centrally on the Cisco ISE.
B. The system time can be configured centrally on the Cisco ISE, but NTP server settings must be
configured individually on each ISE node.
C. NTP server settings can be configured centrally on the Cisco ISE, but the system time must be
configured individually on each ISE node.
D. The system time and NTP server settings must be configured individually on each ISE node.
Answer: D
A. DTP
B. VTP
C. AAA authentication
D. AAA authorization
Answer: D
Which RADIUS attribute is used primarily to differentiate an IEEE 802.1x request from a Cisco MAB
request?
Answer: B
When configuring NAT, which three protocols that are shown may have limitations or complications when
using NAT? (Choose three.)
A. Kerberos
B. HTTPS
C. NTP
D. SIP
E. FTP
F. SQL
Answer: A D E
Which Cisco ISE 1.x protocol can be used to control admin access to network access devices?
A. TACACS+
B. RADIUS
C. EAP
D. Kerberos
Answer: B
You are finding that the 802.1X-configured ports are going into the error-disable state. Which command will
show you the reason why the port is in the error-disable state, and which command will automatically be
re-enabled after a specific amount of time? (Choose two.)
Answer: B D
The NAC Agent v4.9.x uses which ports and protocols to communicate with an ISE Policy Service Node?
Answer: B
B. The IPS automatically send shuns to Cisco WLC for an active host block.
Answer: B
Which two fields are characteristics of IEEE 802.1AE frame? (Choose two.)
F. CRC/FCS
Answer: C E
Which two statements about administrative access to the Cisco Secure ACS SE are true? (Choose two.)
A. The Cisco Secure ACS SE supports command-line connections through a serial-port connection.
B. For GUI access, an administrative GUI user must be created by using the add-guiadmin command.
C. The Cisco Secure ACS SE supports command-line connections through an Ethernet interface.
Answer: B D
Wireless client supplicants attempting to authenticate to a wireless network are generating excessive log
messages. Which three WLC authentication settings should be disabled? (Choose three.)
B. RADIUS Aggressive-Failover
C. Idle Timer
D. Session Timeout
E. Client Exclusion
F. Roaming
Answer: B C D
A. It enables the HTTP server for users to connect on the command line.
B. It enables the HTTP server for users to connect using Web-based authentication.
C. It enables the HTTPS server for users to connect using Web-based authentication.
D. It enables the HTTPS server for users to connect on the command line.
Answer: C
Which two profile attributes can be collected by a Cisco Catalyst Switch that supports Device Sensor?
(Choose two.)
B. user agent
C. DHCP options
D. open ports
E. operating system
F. trunk ports
Answer: A C
The posture run-time services encapsulates which protocol services, and all the interactions that happen
between the NAC Agents?
A. SWISS
B. MAB
C. DOT1X
D. DEFAULT
Answer: A
In Cisco ISE, which two actions can be taken based on matching a profiler policy? (Choose two).
A. exception
C. delete endpoint
D. automatically remediate
Answer: A B
An organization has recently deployed ISE with Trustsec capable Cisco switches and would like to allow
differentiated network access based on user groups. Which solution is most suitable for achieving these goals?
A. Cyber Threat Defense for user group control by leveraging Netflow exported from the Cisco switches
and identity information from ISE
B. MACsec in Multiple-Host Mode in order to encrypt traffic at each hop of the network infrastructure
C. Identity-based ACLs preconfigured on the Cisco switches with user identities provided by ISE
D. Cisco Security Group Access Policies to control access based on SGTs assigned to different user groups
Answer: D
Which three components comprise the Cisco ISE profiler? (Choose three.)
A.
Answer: A B E
A. 1. Choose Network Devices and AAA Clients > Network Resources.2. Click Create.
B. 1. Choose Network Resources > Network Devices and AAA Clients.2. Click Create.
C. 1. Choose Network Resources > Network Devices and AAA Clients.2. Click Manage.
D. 1. Choose Network Devices and AAA Clients > Network Resources.2. Click Install.
Answer: B
An organization has recently deployed ISE with the latest models of Cisco switches, and it plans to deploy
Trustsec to secure its infrastructure. The company also wants to allow different network access policies for
different user groups (e.g., administrators). Which solution is needed to achieve these goals?
A. Cisco Security Group Access Policies in order to use SGACLs to control access based on SGTs
assigned to different users
B. MACsec in Multiple-Host Mode in order to open or close a port based on a single authentication
D. Cisco Threat Defense for user group control by leveraging Netflow exported from the switches and
login information from ISE
Answer: A
Answer: C
Which command in the My Devices Portal can restore a previously lost device to the network?
A. Reset
B. Found
C. Reinstate
D. Request
Answer: C
What is the SGt assignment when authentication is not available or SGT method for non authenticating
devices?
A. dynamic
B. static
C. SXP
D. Default
Answer: A
Which three features should be enabled as best practices for MAB? (Choose three.)
A. MD5
B. IP source guard
C. DHCP snooping
D. storm control
E. DAI
F. URPF
Answer: B C E
What steps must you perform to deploy a CA-signed identify certificate on an ISE device?
A. 1. Download the CA server certificate.2. Generate a signing request and save it as a file.3. Access the
CA server and submit the ISE request.4. Install the issued certificate on the ISE.
B. 1. Download the CA server certificate.2. Generate a signing request and save it as a file.3. Access the
CA server and submit the ISE request.4. Install the issued certificate on the CA server.
C. 1. Generate a signing request and save it as a file.2. Download the CA server certificate.3. Access the
ISE server and submit the CA request.4. Install the issued certificate on the CA server.
D. 1. Generate a signing request and save it as a file.2. Download the CA server certificate.3. Access the
CA server and submit the ISE request.4. Install the issued certificate on the ISE.
Answer: A
A. switch
B. endpoint
C. Admin Node
Answer: D
Which two attributes must match between two Cisco ASA devices to properly enable high availability?
(Choose two.)
Answer: A B
The Secure-X company has started to tested the 802.1X authentication deployment using the Cisco Catalyst
3560-X layer 3 switch and the Cisco ISEvl2 appliance. Each employee desktop will be connected to the
802.1X enabled switch port and will use the Cisco AnyConnect NAM 802.1X supplicant to log in and connect
to the network.
Your particular tasks in this simulation are to create a new identity source sequence named AD_internal which
will first use the Microsoft Active Directory (AD1) then use the ISE Internal User database. Once the new
identity source sequence has been configured, edit the existing DotlX authentication policy to use the new
AD_internal identity source sequence.
The Microsoft Active Directory (AD1) identity store has already been successfully configured, you just need
to reference it in your configuration.
In addition to the above, you are also tasked to edit the IT users authorization policy so IT users who
successfully authenticated will get the permission of the existing IT_Corp authorization profile.
Perform this simulation by accessing the ISE GUI to perform the following tasks:
• Create a new identity source sequence named AD_internal to first use the Microsoft Active Directory (AD1)
then use the ISE Internal User database
• Edit the existing Dot1X authentication policy to use the new AD_internal identity source sequence:
• Edit the IT users authorization policy so IT users who successfully authenticated will get the permission of
the existing IT_Corp authorization profile.
To access the ISE GUI, click the ISE icon in the topology diagram. To verify your configurations, from the
ISE GUI, you should also see the Authentication Succeeded event for the it1 user after you have successfully
defined the DotlX authentication policy to use the Microsoft Active Directory first then use the ISE Internal
User Database to authenticate the user. And in the Authentication Succeeded event, you should see the
IT_Corp authorization profile being applied to the it1 user. If your configuration is not correct and ISE can't
authenticate the user against the Microsoft Active Directory, you should see the Authentication Failed event
instead for the it1 user.
Note: If you make a mistake in the Identity Source Sequence configuration, please delete the Identity Source
Sequence then re-add a new one. The edit Identity Source Sequence function is not implemented in this
simulation.
Explanation
Step 1: create a new identity source sequence named AD_internal which will first use the Microsoft Active
Directory (AD1) then use the ISE Internal User database as shown below:
Step 2: Edit the existing Dot1x policy to use the newly created Identity Source:
Which three remediation actions are supported by the Web Agent for Windows? (Choose three.)
A. Automatic Remediation
B. Message text
C. URL Link
D. File Distribution
E. AV definition update
F. Launch Program
Answer: B C D
A. RADIUS
B. TACACS+
C. EAP-Chaining
D. PEAP
E.
E. EAP-TLS
Answer: B
Which action must an administrator take after joining a Cisco ISE deployment to an Active Directory domain?
C. Configure replication.
Answer: D
Which configuration is required in the Cisco ISE Authentication policy to allow Central Web Authentication?
Answer: B
Which two Active Directory authentication methods are supported by Cisco ISE? (Choose two.)
A. MS-CHAPv2
B. PEAP
C. PPTP
D. EAP-PEAP
E. PPP
Answer: A B
Which Cisco ISE feature can differentiate a corporate endpoint from a personal device?
A. EAP chaining
B. PAC files
D. machine authentication
Answer: A
Which option describes the purpose of configuring Native Supplicant Profile on the Cisco ISE?
A. It helps employees add and manage new devices by entering the MAC address for the device.
D. It provides posture assessments and remediation for devices that are attempting to gain access to the
corporate network.
Answer: C
You discover that the Cisco ISE is failing to connect to the Active Directory server. Which option is a possible
cause of the problem?
Answer: A
C. If MAB fails, the device is unable to fall back to another authentication method.
Answer: A E
A. NetFlow
B. DHCP
C. Network Scan
D. HTTP
Answer: D
Which two things must be verified if authentication is failing with this error message? (Choose two.)
B. CA cert chain of Cisco ISE EAP certificate is installed on the trusted certs store of the client machine.
Answer: A B
B. multihost mode
D. single-host mode
E. dual-host mode
Answer: A B D
Which redirect-URL is pushed by Cisco ISE for posture redirect for corporate users?
A. https://ise1.cisco.com:8443/portal/gateway?sessionId=0A00023D0000003A239F78CC&portal=283258a0-e96e-1
B. https://ise1.cisco.com:8443/portal/gateway?sessionId=0A00023D0000003A239F78CC&portal=283258a0-e96e-1
C. https://ise1.cisco.com:8443/portal/gateway?sessionId=0A00023D0000003A239F78CC&portal=283258a0-e96e-1
D. https://ise1.cisco.com:8443/portal/gateway?sessionId=0A00023D0000003A239F78CC&portal=283258a0-e96e-1
Answer: A
A. Help employees add and manage new devices by entering the MAC address for the device.
Answer: B
Which feature enables the Cisco ISE DHCP profiling capabilities to determine and enforce authorization
policies on mobile devices?
B. DHCP option 42
C. DHCP snooping
D. DHCP spoofing
Answer: A
Which two options can a sponsor select to create bulk guest accounts from the sponsor portal? (Choose two.)
A. Known
B. Random
C. Monthly
D. Imported
E. Daily
F. Yearly
Answer: B D
In a distributed deployment of Cisco ISE, which column in Figure 1 is used to fill in the Host
Name field in Figure 2 to collect captures on Cisco ISE while authenticating the specific endpoint?
A. Server
B. Network Device
C. Endpoint ID
D. Identity
Answer: A
Which error in a redirect ACL can cause the redirection of an endpoint to the provisioning portal to fail?
A.
Answer: A
You enabled the guest session limit feature on the Cisco ISE. However, end users report that the same guest
can log in from multiple devices simultaneously.
A. RADIUS authentication
B. RADIUS accounting
C. DHCP required
D. AAA override
Answer: B
What endpoint operating system provides native support for the SPW?
A. Apple iOS
B. Android OS
C. Windows 8
D. Mac OS X
Answer: A
Which description of the purpose of the Continue option in an authentication policy rule is true?
A. It allows Cisco ISE to check the list of rules in an authentication policy until there is a match.
B. It sends an authentication to the next subrule within the same authentication rule.
C. It allows Cisco ISE to proceed to the authorization policy regardless of authentication pass/fail.
E. It causes Cisco ISE to ignore the NAD because NAD will treat the Cisco ISE server as dead.
Answer: C
A. Cisco ISE
B. NAD
C. supplicant
D. RADIUS proxy
Answer: A
A user configured a Cisco Identity Service Engine and switch to work with downloadable access list for wired
dot1x users, though it is failing to work. Which command must be added to address the issue?
A. ip dhcp snooping
B. ip device tracking
Answer: B
In this simulation, you are task to examine the various authentication events using the ISE GUI. For example,
you should see events like Authentication succeeded. Authentication failed and etc...
Which two statements are correct regarding the event that occurred at 2014-05-07 00:22:48.175? (Choose
two.)
A. The DACL will permit http traffic from any host to 10.10.2.20
B. The DACL will permit http traffic from any host to 10.10.3.20
C. The DACL will permit icmp traffic from any host to 10.10.2.20
D. The DACL will permit icmp traffic from any host to 10.10.3.20
E. The DACL will permit https traffic from any host to 10.10.3.20
Answer: A E
Explanation
Event Details:
During client provisioning on a Mac OS X system, the client system fails to renew its IP address. Which
change can you make to the agent profile to correct the problem?
Answer: A
Which operating system type needs access to the Internet to download the application that is required for
BYOD on-boarding?
A. iOS
B. OSX
C. Android
D. Windows
Answer: C
Which default identity source is used by the MyDevices_Portal_Sequence identity source sequence?
A. internal users
B. guest users
C. Active Directory
D. internal endpoints
E. RADIUS servers
Answer: A
Which feature must you configure on a switch to allow it to redirect wired endpoints to Cisco ISE?
B.
B. RADIUS Attribute 29
Answer: A
Which configuration must you perform on a switch to deploy Cisco ISE in low-impact mode?
Answer: A
What are two possible reasons why a scheduled nightly backup of ISE to a FTP repository would fail?
(Choose two.)
A. ISE attempted to write the backup to an invalid path on the FTP server.
C. The username and password for the FTP server are invalid.
Answer: A C
If the user matches the given TACACS+ profile on Cisco ISE, which command can the user enter from shell
prompt on a Cisco switch?
A. enable
B. enable 10
C. show run
D. configure terminal
Answer: B
You configured wired 802.1X with EAP-TLS on Windows machines. The ISE authentication detail report
shows "EAP-TLS failed SSL/TLS handshake because of an unknown CA in the client certificates chain."
What is the most likely cause of this error?
Answer: A
Which URL must you enter in the External Webauth URL field to configure Cisco ISE CWA correctly?
A. https://ip_address:8443/guestportal/Login.action
B. https://ip_address:443/guestportal/Welcome.html
C. https://ip_address:443/guestportal/action=cpp
D. https://ip_address:8905/guestportal/Sponsor.action
Answer: A
Where would a Cisco ISE administrator define a named ACL to use in an authorization policy?
Answer: D
A. It provides support for native supplicants, allowing users to connect devices directly to the network.
B. It provides the My Devices portal, allowing users to add devices to the network.
C. It provides support for users to install the Cisco NAC agent on enterprise devices.
Answer: A
What is the function of the SGACL policy matrix on a Cisco TrustSec domain with SGT Assignment?
C. It determines the path the SGT of the packet takes when entering the Cisco TrustSec domain.
D. It lists all servers that are permitted to participate in the TrustSec domain.
E. It lists all hosts that are permitted to participate in the TrustSec domain.
Answer: A
A. It can support up to two monitoring Cisco ISE nodes for high availability.
D. The Active Directory servers of Cisco ISE can be configured in a load-balanced configuration.
Answer: A
Which mechanism does Cisco ISE use to force a device off the network if it is reported lost or stolen?
A. CoA
B. dynamic ACLs
C. SGACL
D. certificate revocation
Answer: A
You have configured a Cisco ISE 1.2 deployment for self-registration of guest users. What two options can
you select from to determine when the account duration timer begins? (Choose two.)
A. CreateTime
B. FirstLogin
C. BeginLogin
D. StartTime
Answer: A B
By default, how many days does Cisco ISE wait before it purges the expired guest accounts?
A. 1
B. 10
C. 15
D. 20
Answer: C
Which two EAP types require server side certificates? (Choose two.)
A. EAP-TLS
B. EAP-FAST/TLS
C. EAP-MD5
D. EAP-PEAP
E. EAP-FAST/GTC
Answer: A D
A. automatic remediation
B. administrator-initiated remediation
C. redirect remediation
Answer: A
Which two options must be used on Cisco ISE to enable the TACACS+ feature? (Choose two.)
F. TACACS Profiles
Answer: D G
Which two types of client provisioning resources are used for BYOD implementations? (Choose two.)
A. user agent
D. device sensor
Answer: C E
When you select Centralized Web Auth in the ISE Authorization Profile, which two components host the web
authentication portal? (Choose two.)
A. ISE
B. the WLC
D. the switch
E. the endpoints
Answer: B D
You are configuring SGA on a network device that is unable to perform SGT tagging. How can the device
propagate SGT information?
A. The device can use SXP to pass IP-address-to-SGT mappings to a TrustSec-capable hardware peer.
B. The device can use SXP to pass MAC-address-to-STG mappings to a TrustSec-capable hardware peer.
C. The device can use SXP to pass MAC-address-to-IP mappings to a TrustSec-capable hardware peer.
E. The device can use a GRE tunnel to pass the SGT information to a TrustSec-capable hardware peer.
Answer: A
You are configuring permissions for a new Cisco ISE standard authorization profile. If you configure the
Tunnel-Private-Group-ID attribute as shown, what does the value 123 represent?
A. the VLAN ID
B. the VRF ID
C. the tunnel ID
D. the group ID
Answer: A
Answer:
Explanation
Changes were made to the ISE server while troubleshooting, and now all wireless certificate authentications
are failing. Logs indicate an EAP failure. What are the two possible causes of the problem? (Choose two.)
D.
Answer: A E
You are installing Cisco ISE on nodes that will be used in a distributed deployment. After the initial bootstrap
process, what state will the Cisco ISE nodes be in?
A. Remote
B. Policy service
C. Administration
D. Standalone
Answer: D
Your guest-access wireless network is experiencing degraded performance and excessive latency due to user
saturation. Which type of rate limiting can you implement on your network to correct the problem?
A. per-device
B. per-policy
C. per-access point
D. per-controller
E. per-application
Answer: A
Which two options are EAP methods supported by Cisco ISE? (Choose two.)
A. EAP-FAST
B. EAP-TLS
C. EAP-MS-CHAPv2
D. EAP-GTC
Answer: A B
Which option is one method for transporting security group tags throughout the network?
Answer: B
Which option is the correct redirect-ACL for Wired-CWA, with 10.201.228.76 being the Cisco ISE IP
address?
A. ip access-l ex ACL-WEBAUTH-REDIRECT deny udp any any eq domain deny ip any host
10.201.228.76 permit tcp any any eq 80 permit tcp any any eq 443
B. ip access-l ex ACL-WEBAUTH-REDIRECT permit udp any any eq domain permit ip any host
10.201.228.76 deny tcp any any eq 80 permit tcp any any eq 443
C. ip access-l ex ACL-WEBAUTH-REDIRECT deny udp any any eq domain permit tcp any host
10.201.228.76 eq 8443 deny ip any host 10.201.228.76 permit tcp any any eq 80 permit tcp any any eq
443
D. ip access-l ex ACL-WEBAUTH-REDIRECT permit udp any any eq domain deny ip any host
10.201.228.76 permit tcp any any eq 80permit tcp any any eq 443
Answer: A
A.
A. host/LSB67.cisco.com
C. 10:41:7F:46:9F:89
D. CISCO\chris
Answer: C
Which command on the switch ensures that the Service-Type attribute is sent with all RADIUS authentication
request?
Answer: C
Which profiling capability allows you to gather and forward network packets to an analyzer?
A. collector
B. spanner
C. retriever
D. aggregator
Answer: A
What three changes require restarting the application service on an ISE node? (Choose three.)
A. Registering a node.
B.
Answer: A B C
A. EAP-TTLS
B. EAP-MSCHAP
C. EAP-TLS
D. EAP-MD5
Answer: C
Which feature of Cisco ASA allows VPN users to be postured against Cisco ISE without requiring an inline
posture node?
B. device tracking
C. DHCP snooping
D. VLAN hopping
Answer: A
Which network access device feature can you configure to gather raw endpoint data?
A.
A. Device Sensor
B. Device Classifier
D. Trust Anchor
Answer: A
A. 64
B. 8
C. 16
D. 32
Answer: C
What is the default posture status for non-agent capable devices, such as Linux and iDevices?
A. Unknown
B. Validated
C. Default
D. Compliant
Answer: D
After an endpoint has completed authentication with MAB, a security violation is triggered because a different
MAC address was detected. Which host mode must be active on the port?
A. single-host mode
B.
D. multihost mode
Answer: A
A. endpoint
B. user
C. blackhole
D. quarantine
E. denied systems
Answer: A
You are troubleshooting wired 802.1X authentications and see the following error: "Authentication failed:
22040 Wrong password or invalid shared secret." What should you inspect to determine the problem?
Answer: A
Which attribute is needed for Cisco ISE to profile a device with HTTP probe?
A.
A. user-agent
B. OUI
C. host-name
D. cdp-cache-platform
E. dhcp-class-identifier
F. sysDescr
Answer: A
Answer: A
In this simulation, you are task to examine the various authentication events using the ISE GUI. For example,
you should see events like Authentication succeeded. Authentication failed and etc...
Which four statements are correct regarding the event that occurred at 2014-05-07 00:19:07.004? (Choose
four.)
C. The it1 user supplicant used the PEAP (EAP-MSCHAPv2) authentication method.
E.
E. The it1 user was successfully authenticated against AD1 identity store.
G. The it1 user machine has passed all the posture assessement tests.
Answer: B C E F
Explanation
Here are the details shown for this event:
In this simulation, you are task to examine the various authentication events using the ISE GUI. For example,
you should see events like Authentication succeeded. Authentication failed and etc...
Which three statements are correct regarding the events with the 20 repeat count that occurred at 2014-05-07
00:22:48.748? (Choose three.)
E.
F. The device is connected to the Gi0/1 switch port and the switch IP address is 10.10.2.2.
Answer: A D E
Explanation
Event Details:
…continued:
In this simulation, you are task to examine the various authentication events using the ISE GUI. For example,
you should see events like Authentication succeeded. Authentication failed and etc...
Which two statements are correct regarding the event that occurred at 2014-05-07 00:16:55.393? (Choose
two.)
D. The user was authenticated against the Active Directory then also against the ISE interal user database
and both fails.
E. The NAS switch port where the user connected to has a MAC address of 44:03:A7:62:41:7F
Answer: C F
Explanation
Event Details:
CISENU300_208_12182015.dat
You are troubleshooting RADIUS issues on the network and the debug radius command returns the given
output. What is the most likely reason for the failure?
Answer: A
With which two appliance-based products can Cisco Prime Infrastructure integrate to perform centralized
management? (Choose two.)
E. Cisco ISE
Answer: A E
Explanation
In addition, Cisco Prime Infrastructure integrates with the Cisco® Identity Services Engine (ISE)
to extend visibility into security and policy-related problems, presenting a complete view of client access
issues with a clear path to solving them.
Cisco Prime Infrastructure when integrated with Cisco Mobility Service Engine can provide a single unified
view by extracting location and posture information of managed clients.
The links outside the TrustSec area in the given SGA architecture are unprotected. On which two links does
EAC take place? (Choose two.)
Answer: A B
Which components must be selected for a client provisioning policy to do a Posture check on the Cisco ISE?
Answer: D
D. authentication open
Answer: D
Where must periodic re-authentication be configured to allow a client to come out of the quarantine state and
become compliant?
C. on the supplicant
D. on the controller
Answer: A
Which type of access list is the most scalable that Cisco ISE can use to implement network authorization
enforcement for a large number of users?
Answer: A
When you configure an endpoint profiling policy rule, which option describes the purpose of the minimum
certainty factor?
A. It is compared to the total certainty metric of an individual endpoint to determine whether the endpoint
can be trusted.
B. It is compared to the assigned certainty value of an individual endpoint in a device database to determine
whether the endpoint can be trusted.
D. It is used to determine the likelihood that an endpoint is an active, trusted device on the network.
Answer: A
A properly configured Cisco ISE Policy Service node is not receiving any profile data from a Cisco switch that
runs Device Sensor.
Answer: B
The Secure-X company has recently successfully tested the 802.1X authentication deployment using the Cisco
Catalyst switch and the Cisco ISEv1.2 appliance. Currently, each employee desktop is connected to an 802.1X
enabled switch port and is able to use the Cisco AnyConnect NAM 802.1Xsupplicantto log in and connect to
the network.
Currently, a new testing requirement is to add a network printer to the Fa0/19 switch port and have it connect
to the network. The network printer does not support 802.1X supplicant. The Fa0/19 switch port is now
configured to use 802.1X authentication only.
To support this network printer, the Fa0/19 switch port configuration needs to be edited to enable the network
printer to authenticate using its MAC address. The network printer should also be on VLAN 9.
Another network security engineer responsible for managing the Cisco ISE has already per-configured all the
requirements on the Cisco ISE, including adding the network printer MAC address to the Cisco ISE endpoint
database and etc...
Your task in the simulation is to access the Cisco Catalyst Switch console then use the CLI to:
• Enable only the Cisco Catalyst Switch Fa0/19 switch port to authenticate the network printer using its MAC
address and:
• Ensure that MAC address authentication processing is not delayed until 802.1Xfails
• Ensure that even if MAC address authentication passes, the switch will still perform 802.1X authentication if
requested by a 802.1X supplicant
• Use the required show command to verify the MAC address authentication on the Fa0/19 is successful
For the purpose of the simulation, to test the network printer, assume the network printer will be unplugged
then plugged back into the Fa0/19 switch port after you have finished the required configurations on the
Fa0/19 switch port.
Note: For this simulation, you will not need and do not have access to the ISE GUI To access the switch CLI,
click the Switch icon in the topology diagram
Explanation
Initial configuration for fa 0/19 that is already done:
AAA configuration has already been done for us. We need to configure mac address bypass on this port to
achieve the goal stated in the question. To do this we simply need to add this command under the interface:
mab
Verification:
If a user with privilege 15 is matching this command set on Cisco ISE 2.0, which three commands can the user
execute? (Choose three.)
A. configure terminal
B. show run
C. show clock
D. ping 10.10.100.1
E. exit
Answer: A B F
Which method does Cisco prefer to securely deploy guest wireless access in a BYOD implementation?
C. configuring guest wireless users to obtain DHCP centrally from the corporate DHCP server
Answer: A
A security administrator wants to profile endpoints and gain visibility into attempted authentications. Which
802.1x mode allows these actions?
A. monitor mode
B. high-security mode
C. closed mode
D. low-impact mode
Answer: A
Explanation
Monitor ModeMonitor Mode is a process, not just a command on a switch. The process is to enable
authentication (with authentication open), see exactly which devices fail and which ones succeed, and correct
the failed authentications before they cause any problems.
Answer: C
Which two options enable security group tags to the assigned to a session?
A. Firewall
B. DHCP
C. ACL
D.
D. Source VLAN
E. ISE
Answer: A E
What two values does Cisco recommend you adjust and test to set the optimal timeout value for your
network’s specific 802.1X MAB deployment?
A. Max-reath-req
B. Supp-timeout
C. Max-req
D. Tx-period
E. Server-timeout
Answer: A D
Which error in a redirect ACL can cause the redirection of an endpoint to the provisioning portal to fail?
Answer: A
A. Accounting
B. Authorization
C. Analyzer
D. Collector
Answer: D
Which RADIUS attribute can be used to dynamically assign the Inactivity active timer for MAB users from
the Cisco ISE node?
A. radius-server timeout
B. idle-timeout attribute
C. session-timeout attribute
D. termination-action attribute
Answer: B
Explanation
Explanation/Reference:
https://www.cisco.com/c/en/us/products/collateral/ios-nx-os-software/identity-based-networking-services/
config_guide_c17-663759.html
When the inactivity timer is enabled, the switch monitors the activity from authenticated endpoints.
When the inactivity timer expires, the switch removes the authenticated session.
The inactivity timer for MAB can be statically configured on the switch port, or it can be dynamically assigned
using the RADIUS Idle-Timeout attribute (Attribute 28).
Cisco recommends setting the timer using the RADIUS attribute because this approach lets gives you control
over which endpoints are subject to this timer and the length of the timer for each class of endpoints.
For example, endpoints that are known to be quiet for long periods of time can be assigned a longer inactivity
timer value than chatty endpoints.
A company has implemented a dual SSID BYOD design. A provisioning SSID is used for user registration,
and an employee SSID is used for company network access. How is the layer 2 security of the provisioning
SSID configured?
A. 802.1X
B. Open
C. WPA2
Answer: B
Refer to Following:
Which statement about the authentication protocol used in the configuration is true?
A. Authentication request contains username, encrypted password, NAS IP address, and port.
B. Authentication and authorization requests are sent in a single open connection between the network
device and the TACACS+ server
D. Authentication and authorization request packets are grouped together in a single packet.
Answer: B
When you configure an endpoint profiling policy rule, which option describes the purpose of the minimum
certainty factor?
A. It is compared to the total certainty metric of an individual endpoint to determine whether the endpoint
can be trusted.
B. It is compared to the assigned certainty value of an individual endpoint in a device database to determine
whether the endpoint can be trusted.
D. It is used to determine the likelihood that an endpoint is an active, trusted device on the network.
Answer: A
A. dot1x system-auth-control
Answer: D
A network security engineer is considering configuring 802.1x port authentication such that a single host is
allowed to be authenticated for data and another single host for voice. Which port authentication host mode
can be used to achieve this configuration?
A. single-host
B. multihost
C. multauth
D. multidomain
Answer: D
Which two posture redirect ACLs and remediation DACLs must be pushed from Cisco ISE to a Cisco IOS
switch if the endpoint must remediate itself? The ISE IP address is 10.201.228.76 and the IP address of the
remediating server is 10.201.229.1. (Choose two.)
A. ip access-l ex ACL-POSTURE-REDIRECT deny udp any any eq domain deny ip any host
10.201.228.76 permit tcp any any eq 80 permit tcp any any eq 443
B. ip access-l ex ACL-POSTURE-REDIRECT deny udp any any eq domain deny ip any host
10.201.228.76 deny ip any host 10.201.229.1 permit tcp any any eq 80permit tcp any any eq 443
C. ip access-l ex ACL-POSTURE-REDIRECT deny udp any any eq domain permit ip any host
D. POSTURE_REMEDIATION DACL permit udp any any eq domain permit tcp any host
10.201.228.76 permit tcp any any eq 80 permit tcp any any eq 443
E. POSTURE_REMEDIATION DACL permit udp any any eq domain deny tcp any host
10.201.228.76 permit tcp any any eq 80 permit tcp any any eq 443 permit ip any host 10.210.229.1
F. POSTURE_REMEDIATION DACL permit udp any any eq domain deny tcp any host
10.201.228.76 deny ip any host 10.210.229.1 permit tcp any any eq 80 permit tcp any any eq 443
Answer: B D
Scenario:
Currently, many users are expehecing problems using their AnyConnect NAM supplicant to login to the
network. The rr desktop support staff have already examined and vehfed the AnyConnect NAM configuration
is correct.
In this simulation, you are tasked to examine the various ISE GUI screens to determine the ISE current
configurations to help isolate the problems. Based on the current ISE configurations, you will need to answer
three multiple choice questions.
To access the ISE GUI, click on the ISE icon in the topology diagram to access the ISE GUI.
Not all the ISE GUI screen are operational in this simulation and some of the ISE GUI operations have been
reduced in this simulation.
Not all the links on each of the ISE GUI screen works, if some of the links are not working on a screen, click
Home to go back to the Home page first. From the Home page, you can access all the required screens.
To view some larger GUI screens, use the simulation window scroll bars. Some of the larger GUI screens only
shows partially but will include all information required to complete this simulation.
Determine which can be two reasons why many users like the Sales and fT users are not able to authenticate
and access the network using their AnyConnect NAM client with EAP-FAST.(Choose two.)
B. The rr_Corp authorization profile has the wrong Access Type configured.
D. The order for the MAB authentication policy and the DotlX authentication policy should be reversed.
E. Many of the fT Sales and fT user machines are not passing the ISE posture accessment.
F. he PERMrr_ALL_TRAFFIC DACL is missing the permit ip any any statement it the end.
G. The Employee_FullAccess_DACL DACL is missing the permit ip any any statement in the end.
Answer: A D
A. Quarantined policy
B. Posture policy
C. Client provisioning
D. Network provisioning
Answer: B C
An engineer is investigating an issue with their Posture Run-time Services implementation. Which protocol
A. SWISS
B. IPsec
C. IKEv2
D. FIX
Answer: A
A network administration wants to set up a posture condition on Cisco ISE to check for the file name
Posture.txt in C:\ on a Windows machine. Which condition must the network administrator configuration?
A. Service condition
B. Registry condition
C. Application condition
D. File condition
Answer: D
A security engineer has configured a switch port in 802. 1X closed mode. Which protocol is allowed to pass
through before a device is authenticated?
A. Bootps
B. HTTP
C. PXE
D. EAPoL
E. ARP
Answer: D
An engineer of Company A wants to know what kind of devices are connecting to the network. Which service
can be enabled on the Cisco ISE node?
B. posture
C. MAB
D. profiling
Answer: D
Explanation
Cisco ISE Profiling Services provides dynamic detection and classification of endpoints connected to the
network.Using MAC addresses as the unique identifier, ISE collects various attributes for each network
endpoint to build an internal endpoint database.
Within a BYOD environment, when employees add devices using the My Devices Portal, which Identity
Group does Cisco ISE add the endpoints to?
A. Registered
B. Employee
C. Guest
D.
D. Profiled
Answer: D
A. Closed mode
B. Monitor mode
C. Application mode
D. Low-impact mode
Answer: B
A. Bypass
B. Dynamic
C. Static
D. Inline
Answer: C
A customer is concerned with the use of the issued laptops even when devices are not on the corporate
network. Which agent continues to be operational even when the host is not on the Cisco ISE network?
Answer: B
In a Cisco ISE deployment, which traffic is permitted by the default dynamic ACL?
A. all IP traffic
Answer: A
Which advanced option within a WLAN must be enabled to trigger central web authentication for wireless
users?
A. AAA override
B. Static IP tunnelling
C. Diagnostic channel
D. DHCP server
Answer: A
A. External root CA
B. Cisco ACS
C. Cisco ISE
D. Internal root CA
Answer: C
Scenario:
Currently, many users are expehecing problems using their AnyConnect NAM supplicant to login to the
network. The rr desktop support staff have already examined and vehfed the AnyConnect NAM configuration
is correct.
In this simulation, you are tasked to examine the various ISE GUI screens to determine the ISE current
configurations to help isolate the problems. Based on the current ISE configurations, you will need to answer
three multiple choice questions.
To access the ISE GUI, click on the ISE icon in the topology diagram to access the ISE GUI.
Not all the ISE GUI screen are operational in this simulation and some of the ISE GUI operations have been
reduced in this simulation.
Not all the links on each of the ISE GUI screen works, if some of the links are not working on a screen, click
Home to go back to the Home page first. From the Home page, you can access all the required screens.
To view some larger GUI screens, use the simulation window scroll bars. Some of the larger GUI screens only
shows partially but will include all information required to complete this simulation.
A. Currently,IT users who successfully authenticate will have their packets tagged withaSGTof3.
C. Currently, any domain administrator who successfully authenticate will be assigned to VLAN 10.
D. Computers belonging to the secure-x domain which passes machine authentication but failed user
authentication will have the Employee_Restricted_DACL applied.
E. Print Servers matching the Linksys-PrintServer identity group will have the following access
restrictions:permit icmp any host 10.10.2.20 permit tcp any host 10.10.2.20 eq 80 permit icmp any host
10.10.3.20 permit tcp any host 10.10.3.20 eq 80 deny ip any any
Answer: C
A malicious user gained network access by spoofing printer connections that were authorized using MAB on
four different switch ports at the same time. What two catalyst switch security features will prevent further
violations? (Choose two)
A. DHCP Snooping
B. 802.1AE MacSec
C. Port security
D. IP Device tracking
F. Private VLANs
Answer: A E
Explanation
https://www.cisco.com/c/en/us/products/collateral/ios-nx-os-software/identity-based-networking-services/
config_guide_c17-663759.html
DHCP snooping is fully compatible with MAB and should be enabled as a best practice.
Dynamic Address Resolution Protocol (ARP) Inspection (DAI) is fully compatible with MAB and should
be enabled as a best practice.
In general, Cisco does not recommend enabling port security when MAB is also enabled.
Since MAB enforces a single MAC address per port (or per VLAN when multidomain authentication is
configured for IP telephony), port security is largely redundant and may in some cases interfere with the
expected operation of MAB.
Which command would be used in order to maintain a single open connection between a network access
device and a tacacs server?
Answer: D
Which two are best practices to implement profiling services in a distributed environment? (Choose two)
Answer: B D
Explanation
https://www.cisco.com/en/US/docs/security/ise/1.0/user_guide/ise10_prof_pol.html#wp1340515
You can deploy the Cisco ISE profiler service either in a standalone environment (on a single node), or in a
distributed environment (on multiple nodes).
Depending on the type of your deployment and the license you have installed, the profiler service of Cisco ISE
can run on a single node or on multiple nodes.
You need to install either the base license to take advantage of the basic services or the advanced license to
take advantage of all the services of Cisco ISE.
• The Deployment Nodes page supports the infrastructure for the distributed nodes in the distributed
deployment.
• A node specific configuration of probes—The Probe Config page allows you to configure the probe per
node.
A security engineer must create an Antivirus remediation policy within Cisco ISE. Which two options can the
engineer select in the new Antivirus remediation policy? (Choose two.)
A.
D. file to upload
E. operating system
Answer: B E
A network administrator is seeing a posture status "unknown" for a single corporate machine on the Cisco ISE
authentication report, whereas the other machines are reported as "compliant". Which option is the reason for
machine being reported as "unknown"?
Answer: A
Which description of the use of low-impact mode in a Cisco ISE deployment is correct?
A. It continues to use the authentication open capabilities of the switch port, which allows traffic to enter
the switch before an authentication result.
B. Low-impact mode must be the final phase in deploying Cisco ISE into a network environment using the
phased approach.
C. The port does not allow any traffic before the authentication (except for EAP, Cisco Discovery Protocol,
and LLDP), and then the port is assigned to specific authorization results after the authentication.
D. It enables authentication (with authentication open), sees exactly which devices fail and which succeed,
and corrects the failed authentications before they cause any problems.
Answer: A
A network administrator has just added a front desk receptionist account to the Cisco ISE Guest Service
sponsor group. Using the Cisco ISE Guest Sponsor Portal, which guest services can the receptionist provide?
Answer: C
A. It is the master key that generates the other keys that MACsec requires.
C. It is the key that is used to discover MACsec peers and perform key negotiation between the peers.
Answer: A
During BYOD flow, where does a Microsoft Windows 8.1 PC download the Network Setup Assistant from?
Answer: B
Which two component are required for creating native supplicant profile ?
A. Operative System
C. Ios Sutten
D. BYOD
Answer: A B
You have configured a Cisco ISE1.2 deployment for self registration of guest users. What two options can you
select from to determine when the account duration timer begins(Choose two)?
A. Createtime
B. Firstlogin
C. Approvaltime
D. Custom
E. Starttime
Answer: A B
RARP,LLDP
A. Monitoring
B. Troubleshooting
C. Sponsor
D. Guest
E. My devices
F. Admin
Answer: C D E
If the host sends a packet across the Cisco TrustSec domain, where is the SGACL enforced?
Answer: A
D. password-policy
Answer: C
Which two profile attributes can be collected by a Cisco Catalyst Switch that supports Device Sensor?
(Choose two.)
B. user agent
C. DHCP options
D. open ports
E. operating system
F. trunk ports
Answer: A C
When you select Centralized Web Auth in the ISE Authorization Profile, which component hosts the web
authentication portal?
A. the endpoints
B. the WLC
D. the switch
E. ISE
Answer: E
Answer: A
A company wants to allow employees to register and manage their own devices that do not support NSP.
Which portals enable this ability?
A. MDM portals
C. My devices portals
D. BYOD Portals
Answer: A
Answer: A
A. PEAP-MSCHAP
B. EAP-GTC
C. EAP-TLS
D. PEAP-TLS
Answer: A
Explanation
These authentication methods are supported with LDAP:
An engineer must ensure that all client operating systems have the AnyConnect Agent for an upcoming
posture implementation. Which two versions of OS does the AnyConnect posture agent support? (Choose
two.)
A. Google Android
B. Ubuntu
C. Apple Mac OS X
D. Microsoft Windows
Answer: C D
Your guest-access wireless network is experiencing degraded performance and excessive latency due to user
saturation. Which type of rate limiting can you implement on your network to correct the problem?
A. per-device
B. per-policy
C. per-access point
D. per-controller
E. per-application
Answer: A
A security engineer has a new TrustSec project and must create a few static security group tag classifications
as a proof of concept. Which two classifications can the tags be mapped to? (Choose two.)
A. VLAN
B. user ID
C. interface
D. switch ID
E. MAC address
Answer: A C
Explanation
In static classification the tag maps to some thing (an IP, subnet, VLAN, or interface) rather than relying on
an authorization from the Cisco ISE.
This process of assigning the SGT is defined as “classification.” These classifications are then transported
deeper into the network for policy enforcement
Which valid external identity source can be used with Cisco ISE?
B. smart card
D. TACACS+ token
Answer: B
A. 802.1x is disabled on the switch port and all traffic is allowed as normal without restriction.
B. The switch port begins in the unauthorized state and does not allow EAPOL, Cisco Discovery Protocol,
and
STP traffic.
C. The switch port begins in the unauthorized state and allows only EAPOL, Cisco Discovery Protocol, and
STP traffic.
D. 802.1x is enabled on the switch port and the switch port ignores all traffic.
Answer: C
cts role-based-enforcement
if user want to use his corporate laptop in another network ,what is only agent can work with this environment
?
A. SG-ACLs on switches.
B. SG-ACLs on routers.
C. SG-Firewalls.
D. SG-Appliances.
Answer: A C
When using endpoint access control, which two access methods are valid for authentication and authorization?
(Choose two.)
E. Web authentication
Answer: C E
A user reports that a switch's RADIUS accounting packets are not being seen on the Cisco ISE server. Which
command is the user missing in the switch's configuration?
Answer: A
When using a DHCP probe in a Cisco ISE deployment, which type of request triggers an endpoint to be
reprofiled?
A. DHCP Inform
B. REBINDING
C. RENEWING
D. INIT-REBOOT
Answer: D
Which feature must you configure on a switch to allow it to redirect wired endpoints to Cisco ISE?
B. RADIUS Attribute 29
Answer: A
A. SXP
B. SGT
C. SGT inline
D. SGT Reflector
Answer: A
SGt assignment when authentication is not available or SGT method for non authenticating devices ?
dynamic
A. Cisco ISE
B. NAD
C. supplicant
D. RADIUS proxy
Answer: A
An engineer wants to migrate 802. 1X deployment phase from Open to Low-Impact mode. Which option must
be configured on the switch port?
Answer: B
D. dot1x system-auth-control
Answer: C
Explanation
A network administrator wants to use dynamic VLAN assignment from Cisco ISE. Which option must be
configured on the switch to support this?
A. AAA authentication
B. VTP
C. DTP
D. AAA authorization
Answer: D
An engineer is designing a BYOD environment utilizing Cisco ISE for devices that do not support native
supplicants. Which portals must the security engineer configure to accomplish this task?
B. BYOD Portals
C. My Devices Portals
D. MDM Portals
Answer: C
Answer: D
A. ICV
B. MKA
Answer: B
Which two profile attributes can be collected by a Cisco Wireless LAN Controller that supports Device
Sensor? (Choose two.)
B. user agent
C. DHCP options
D. open ports
F. FQDN
Answer: B C
C. BYOD portal
D. guest portal
Answer: D
An engineer of company A will be sending guest credentials through SMS to conference participants. Which
portal must be used to create them?
A. SMS
B. Sponsor
C. Guest
D. User
Answer: A
Which remediation type ensures that Automatic Updates configuration is turned on Windows clients per
security policy to remediate Windows clients for posture compliance?
A. AS Remediation
B. File Remediation
Answer: C
Which two options can be pushed from Cisco ISE server as part of successful 802.1x authentication?
A. Reauthentication timer
B. DACL
C. Vlan
D. Authentication order
E. Posture status
F. Authentication priority
Answer: B C
Which two Active Directory authentication methods are supported by Cisco ISE? (Choose two.)
A. MS-CHAPv2
B. PEAP
C. PPTP
D. EAP-PEAP
E. PPP
Answer: A B
Which two additional fields are added to an Ethernet frame when implementing MACsec? (Choose two.)
B. authentication header
E. security tag
Answer: C E
Scenario:
Currently, many users are expehecing problems using their AnyConnect NAM supplicant to login to the
network. The rr desktop support staff have already examined and vehfed the AnyConnect NAM configuration
is correct.
In this simulation, you are tasked to examine the various ISE GUI screens to determine the ISE current
configurations to help isolate the problems. Based on the current ISE configurations, you will need to answer
three multiple choice questions.
To access the ISE GUI, click on the ISE icon in the topology diagram to access the ISE GUI.
Not all the ISE GUI screen are operational in this simulation and some of the ISE GUI operations have been
reduced in this simulation.
Not all the links on each of the ISE GUI screen works, if some of the links are not working on a screen, click
Home to go back to the Home page first. From the Home page, you can access all the required screens.
To view some larger GUI screens, use the simulation window scroll bars. Some of the larger GUI screens only
shows partially but will include all information required to complete this simulation.
A. The ISE is not able to successfully connect to the hq-srv.secure-x. local AD server.
B. The ISE internal endpoints database is used authenticate any users not in the Active Directory domain.
C. The ISE internal user database has two accounts enabled: student and test that maps to the Employee
user identity group.
Answer: B D
An engineer must limit the configuration parameters that can be executed on the Cisco ASAs deployed
throughout the network. Which command allows the engineer to complete this task?
$3cr37 timeout2
$3cr37 timeout2
$3cr37 timeout2
$3cr37 timeout2
Answer: A
A. It provides support for native supplicants, allowing users to connect devices directly to the network.
B. It provides the My Devices portal, allowing users to add devices to the network.
C. It provides support for users to install the Cisco NAC agent on enterprise devices.
Answer: A
Which three options can be pushed from Cisco ISE server as part of a successful 802.1x authentication.
(Choose three)
A. authentication order
B. posture status
C. authentication priority
D. vlan
E. DACL
F. re-authentication timer
Answer: D E F
Which three events immediately occur when a user clicks “Register” on their device in a single-SSID BYOD
onboarding registration process (Choose three).
Answer: A B F
A. Service
B. Antispyware
C. Firewall
D. File
E. Antivirus
Answer: A D
download posture
Answer: B E
Which packets are allowed on a dot1x port with no authentication open before the port goes to an authorized
state?
Answer: A
Which two protocols does Cisco Prime Infrastructure use for device discovery? (Choose two.)
A. SNAP
B. LLDP
C. RARP
D. DNS
E. LACP
Answer: B D
An engineer must enable SGACL policy globally for a Cisco TrustSec –enabled routed interface. Which
Answer: B
What are the four code fields which identify the type of an EAP packet?
Answer: C
Which devices support download of environmental data and IP from Cisco ISE to SGT bindings in their
SGFW implementation?
A.
Answer: C
An engineer has discovered that a NAD is already configured to send packets to the cisco ISE node running
session services, which probe profile requires the simplest configuration?
A. RADIUS
B. DHCP
C. SPAN
D. NMAP
E. HTTP
Answer: A
A company has implemented a dual SSID BYOD design. A provisioning SSID is used for user registration,
and an employee SSID is used for company network access. Which controller option must be enabled to allow
a user to switch immediately from the provisioning SSID to the employee SSID after registration has been
completed?
A. AAA override
D. AP Fallback
Answer: C
What are two actions that can occur when an 802.1X-enabled port enters violation mode? (Choose two.)
B. The port drops packets from any new device that sends traffic to the port.
Answer: A B
What are three ways that an SGT can be assigned to network traffic?
Answer: A B D
A. 1. Choose Network Devices and AAA Clients > Network Resources.2. Click Create.
B. 1. Choose Network Resources > Network Devices and AAA Clients.2. Click Create.
C. 1. Choose Network Resources > Network Devices and AAA Clients.2. Click Manage.
D. 1. Choose Network Devices and AAA Clients > Network Resources.2. Click Install.
Answer: B
A network is seeing a posture status “unknown” for a single corporate machine on the Cisco ISE
authentication
report, whereas the other machines and reported as “complaint”. Which option is the reason for machine being
reported as “unknown”?
Answer: B
Which two accounting types are used to implement accounting with RADIUS? (Choose two.)
A. Network
B. User
C. Attribute
D. Device
E. Resource
Answer: A E
Which port does Cisco ISE use for native supplicant provisioning of a Windows computer?
A. TCP 8443
B. TCP/UDP 8905
C. TCP/UDP 8909
D. TCP 443
Answer: C
Explanation
8909 : web, cisco nac agent, supplicant provisioning wizard installation
When using CA for identity source, which method can be used to provide real-time certificate validation?
A. X.509
B. PKI
C. OCSP
D. CRL
Answer: D
What is the function of the SGACL policy matrix on a Cisco TrustSec domain with SGT Assignment?
C. It determines the path the SGT of the packet takes when entering the Cisco TrustSec domain.
D. It lists all servers that are permitted to participate in the TrustSec domain.
E. It lists all hosts that are permitted to participate in the TrustSec domain.
Answer: A
Which two attributes are delivered by the DHCP probe to the Cisco ISE? (Choose two.)
A. dhcp-client-identifier
B. framed-IP-address
C. host-name
D. calling-station-ID
E. MAC address
Answer: A C
Which statement about the authentication protocol used in the configuration is true?
Answer: B
Which ISE deployment mode is similar to the industry standard 802.1X behavior?
A. Monitor mode
B. Low-impact mode
C. Policy mode
D. Closed mode
Answer: D
A. admin-1
B. anon-1
C. isesch-1
D. Ciscotac-1
Answer: D
A security engineer is deploying Cisco ISE for a company's guest user services. Drag and drop the Cisco ISE
persona on the left onto its function on the right.
Answer:
Explanation
Which definition of “posturing” as it relates to a general network infrastructure and access into the internal
network is true?
A. The process by which an operating system or application running on an endpoint provides critical
information about internet activity being used by the endpoint.
B.
B. The process by which an endpoint device can be monitored while connected to the network to determine
if it could contain viruses or potential harmful programs running.
C. The process by which an operating system or application running on an endpoint provides critical
information about the software that is actively running on the device.
D. The process when software is uploaded to an end device before it is allowed to gain access to a secure
network.
Answer: D
Which CoA type does a Cisco ISE PSN send to a network access device when a NAG agent reports the OS
patch status of a noncompliant endpoint?
A. CoA-Terminate
B. CoA-PortBounce
C. CoA-Reauth
D. CoA-Remediate
Answer: C
Explanation
If an endpoint is marked noncompliant during that download, a CoA is sent and the device is forced to
reauthenticate, providing a different result (such as quarantine).
A. quarantine
B. exit
C. default
D. end
Answer: A
How many days does Cisco ISE wait before it purges a session from the active session list if no RADIUS
Accounting STOP message is received?
A. 1
B. 5
C.
C. 10
D. 15
Answer: B
Which protocol is EAP encapsulated in for communications between the authenticator and the authentication
server ?
A. EAP-MD5
B. IPSec
C. EAPOL
D. Radius
Answer: D
An engineer is troubleshooting an issue between the switch and the Cisco ISE where the 802.1X and MAB
authentication and authorization are successful. Which command does the network engineer enter in the switch
to troubleshoot this issue and look for active sessions?
Answer: B
In Cisco ISE 1.3 and above, which two operations are allowed on Endpoint Certificates pages for issued
endpoint certificates on the admin portal? (Choose two.)
A. unrevoke
B. delete
C. view
D. export
E. revoke
Answer: C E
Why does Cisco recommend assigning dynamic classification security group tag assignment at the access
layer?
Answer: B
Which two statements about administrative access to the ACS Solution Engine are true? (Choose two.)
A. The ACS Solution Engine supports command-line connections through a serial-port connection.
B. For GUI access, an administrative GUI user must be created with the add-guiadmin command.
C. The ACS Solution Engine supports command-line connections through an Ethernet interface.
Answer: B D
We help you pass any IT / Business Certification Exams with 100% Pass Guaranteed or Full Refund. Especially
Cisco, CompTIA, Citrix, EMC, HP, Oracle, VMware, Juniper, Check Point, LPI, Nortel, EXIN and so on.
We prepare state-of-the art practice tests for certification exams. You can reach us at any of the email addresses listed
below.
Sales: [email protected]
Feedback: [email protected]
Support: [email protected]
Any problems about IT certification or our products, You can write us back and we will get back to you within 24
hours.