Which is an access issue not covered in the guest services?
What are the four posture conditions that can be used to evaluate the state of a software component on a client endpoint? (Choose four)
Which three features need to be configured on NADs to support Central WebAuth? (Choose three)
What are the four components of an ISE Authorization Rule? (Choose four)
Which two statements regarding the Cisco NAC Web agent are true? (Choose two)
Which three statements regarding a single SSID design model are true? (Choose three)
What information is not used in conjunction with Security Group information for SGFW enforcement?
Which is not a policy function of the Cisco TrustSec architecture?
Which of the following three features does Dual SSID provide over Single SSID? (Choose three)
Which is the first step in the SGA deployment?
Which protocol can be used to control administrative access to specific commands on a Cisco network device?
What occurs when an EAPOL packet is detected on a MAB enabled port?
Which statement regarding the dual SSID design model is true when compared to the single SSID design model?
For Cisco switches, on which ports can MACsec be used? (Choose three)
Which three statements are true regarding BYOD guest access? (Choose three)
For what purposes do enterprises deploy the Cisco ISE profiler service? (Choose two)
Which Cisco ISE probe gathers data from the Cisco IOS Device Sensor feature?
Which features can be used to determine the identity of a user or endpoint? (Choose four)
Which of the following are the first four stages of the eight stage process in approaching problem solving? (Choose four)
What two commands can show you the Authentication information for any 802.1X sessions on interface GigabitEthernet0/1? (Choose two)
What are some common potential profiler problems? (Choose three)
Which three items are provided to employee endpoints after the client provisioning process? (Choose three)
What are three of the access control operational components for Cisco ISE? (Choose three)
What are some common potential WebAuth problems? (Choose three)
What are the three elements that are used to build Policies? (Choose three)
What option simplifies ACL management?
What command is used to see if a particular dynamic ACL has been applied to an interface?
Which Cisco ISE profiling probe could be implemented to gather the name of the OS and the hostname of the device for classification purposes?
Identify the functions and components of IEEE 802.1X. (Choose three)
Which is not an ACL element used by the Modular Policy Framework?
What authorization rule should be set in order to redirect traffic to the WebAuth?
What non-tunneled Extensible Authentication Protocol (EAP) would you use if you have to use PKI certificates?
Refer to the SXP connection command output. Which options correctly describe the result of this output? (Choose two)
Which 802.1X host mode allows for the use of multiple clients using MAB, web authorization, or 802.1X on the data VLAN?
What is the purpose and use of agents? (Choose three)
What are some of the features of the Network Access Manager (NAM)? (Choose three)
What features describe EAP Chaining? (Choose two)
What are the three options that can be applied in the authorization policy? (Choose three)
Which solution is used to classify packets using device and user identity to provide enhanced access control capability?
Which two components make up the Cisco ISE profiler? (Choose two)
What is the default behavior if an Identity source cannot be accessed?
Identify the six components of the Life cycle. (Choose six)
Which is a feature of the Sponsor portal?
What must each endpoint profiling policy rule have associated with it to determine if the policy is applied to an endpoint?
Identify the features of Cisco TrustSec. (Choose two)
What application security feature is used with Exchange servers?
Which Cisco ISE solution is an example of an authorization policy result?
When using 802.1X authentication, which type of VLAN will have a centralized audit trail in the AAA system?
Which web authentication redirects a user to the Cisco ISE web service to perform authentication?
Which of the following is true when creating NDGs?
What will an employee endpoint device have after successfully being provisioned? (Choose three)
In which configuration setting is the sequence of identity sources configured?
What is used to propagate SGT within the network? (Choose two)
What is the key difference between Android and Apple devices when connecting employee BYOD devices to the network using Cisco ISE?
What are some of the fields you would expect to see in a Certificate? (Choose three)