What are the four posture conditions that can be used to evaluate the state of a software component on a client endpoint? (Choose four)
What option simplifies ACL management?
What considerations must you take into account when using an External Authentication solution with Cisco ISE? (Choose three)
Which is an accurate step in the WebAuth process?
Which tool enables portal authentication when accessing with HTTPS?
What needs to be done to authenticate Active Directory users with Cisco ISE?
When using 802.1X authentication, which type of VLAN will have a centralized audit trail in the AAA system?
What is the function of the CoA used in Cisco ISE posture service?
What is the most common BYOD design model?
What information is not used in conjunction with Security Group information for SGFW enforcement?
What are the two default ISE preconfigured dACLs? (Choose two)
Which is an access issue not covered in the guest services?
When connecting an Active Directory, or AD source to Cisco ISE the connection does not automatically join the AD. What must you also do to complete the connection?
Which statement about Cisco NAC web agent is true?
What command allows you to create the user certificate for EAP-TLS?
Refer to the SXP connection command output. Which options correctly describe the result of this output? (Choose two)
Which posture configuration component defines the NAC agent appropriate for each device type?
What are some of the fields you would expect to see in a Certificate? (Choose three)
Identify the six components of the Life cycle. (Choose six)
Which two statements are true regarding the client provisioning policy? (Choose two)
Which three settings are required for the configuration of NADs in a Cisco Identity Services Engine deployment? (Choose three)
Which two services can be carried out through Cisco ISE Guest Services Sponsor portal? (Choose two)
Which two Cisco ISE guest settings are affected by the use of customized portals? (Choose two)
Which is not a policy function of the Cisco TrustSec architecture?
Which Cisco ISE probe gathers data from the Cisco IOS Device Sensor feature?
What are the two steps required to validate the ISE certificate? (Choose two)
From which location in the Cisco ISE can you view endpoint profiler summary information?
What command is used to see if a particular dynamic ACL has been applied to an interface?
Which two components make up the Cisco ISE profiler? (Choose two)
With a zone-based firewall configuration, how are security groups specified?
What is the purpose and use of agents? (Choose three)
What ports must not be blocked for the NAC agents using the SWISS protocol? (Choose two)
When configuring an endpoint identity using Cisco ISE, which values are available to be configured? (Choose three)
What command configures a switch to use user-RADIUS authorization for all network related service requests?
What is the default URL that can be used by employees to access the My Devices Portal of an ISE server?
Which field is not encrypted in the frame payload?
Which command is use to verify traffic redirection to a client provisioning portal on a switch?
For Cisco switches, on which ports can MACsec be used? (Choose three)
Which of the following is true when creating NDGs?
Which functions are provided by enabling Cisco ISE guest services? (Choose two)
What application security feature is used with Exchange servers?
Which AAA authentication feature specifies a set of MAC addresses that are allowed to skip authentication?
Which of the following are the three CoA types available for configuring CoA for the ISE Profiler service? (Choose three)
Which two statements regarding the Cisco NAC Web agent are true? (Choose two)
What does the Cisco ISE use to change an endpoint authorization status after successful authentication and after confirmation of endpoint compliance?
What is used to propagate SGT within the network? (Choose two)
What can ISE apply to an endpoint through a NAC agent? (Choose three)
What command allows you to view the authentication status and the ACS ACL on interface gi0/1?
Which three statements are true regarding BYOD guest access? (Choose three)
Which MACsec policy rejects access if either the supplicant or the switch are not MACsec capable?
Which three roles are used with 802.1X port-based authentication? (Choose three)
Which 802.1X host mode provides independent authentication of an IP phone and a computer, and only allows one MAC address per VLAN?
What occurs when an EAPOL packet is detected on a MAB enabled port?
You need to verify that an endpoint is using the latest profile. Which report should you run?
Which 802.1X host mode allows for the use of multiple clients using MAB, web authorization, or 802.1X on the data VLAN?