What command allows you to create the user certificate for EAP-TLS?
What are the two separate, independent EAP procedures that can be used for authentication? (Choose two)
Where do you activate EAP Chaining on the ISE server?
What is the name of the built-in default protocol set used as the default authentication policy?
What type of frame is sent by the supplicant during the initial stage of 802.1X message flow?
Which is a benefit of the Cisco TrustSec solution?
What option must be "checked" when importing a CA root certificate into ISEs Certificate Store from the Administration->System->Certificates->Certificate Store interface?
What are some of the fields you would expect to see in a Certificate? (Choose three)
Identify the functions and components of IEEE 802.1X. (Choose three)
Identify the features of the accounting service. (Choose three)
What application security feature is used with Exchange servers?
What are the three elements that are used to build Policies? (Choose three)
Select the features that apply to the TACACS protocol. (Choose two)
What are the four components of an ISE Authorization Rule? (Choose four)
What feature is used to ensure authorized clients continue to meet security compliance standards?
Identify the modes available in an 802.1X phased deployment. (Choose three)
What command configures a switch to use user-RADIUS authorization for all network related service requests?
What two commands can show you the Authentication information for any 802.1X sessions on interface GigabitEthernet0/1? (Choose two)
What command is used to see if a particular dynamic ACL has been applied to an interface?
What must you do to define a new rule-based authentication policy? (Choose three)
What features describe EAP Chaining? (Choose two)
Identify the features of the 802.1X Closed Mode deployment option. (Choose two)
What are the two steps required to validate the ISE certificate? (Choose two)
What are some of the features of the Network Access Manager (NAM)? (Choose three)
What command allows you to view the authentication status and the ACS ACL on interface gi0/1?
What event would you expect to see in the details for an EAP-TLS connection if the user authentication was successful on the ISE server?
What is the default behavior if an Identity source cannot be accessed?
Select the menu item that allow you to add an identity certificate from a CA server onto an ISE server from the Administration Local Certificates web interface.
What are features of the Network Access Manager, or NAM? (Choose three)
What three statements apply to building compound conditions? (Choose three)
What features are available to the Rule-based Policy type versus the Simple Policy type for the ISE Authentication Policies? (Choose three)
When is Transport Layer Security, or TLS, used in the Cisco ISE environment? (Choose three)
Which features can be used to determine the identity of a user or endpoint? (Choose four)
What 802.1X Host Mode distinguishes between multiple authenticated 802.1X, MAB, or web authorization clients on the data VLAN?
Which is not a policy function of the Cisco TrustSec architecture?
Which is characteristic of a Static mapping?
Select the two descriptions that apply to the Policy Services Persona in Cisco ISE. (Choose two)
Which are features of the MAC Authentication Bypass? (Choose two)
What Cisco command shows you the status of an 802.1X connection on interface gi0/1?
What are the three parties involved in 802.1X authentication? (Choose three)
What type of VLAN is assigned if the authentication server is unavailable?
What non-tunneled Extensible Authentication Protocol (EAP) would you use if you have to use PKI certificates?
What option simplifies ACL management?
What 802.1X Host Mode authenticates every MAC address?
What are three of the access control operational components for Cisco ISE? (Choose three)
Identify the features of Cisco TrustSec. (Choose two)
What are the two types of authentication policies you can configure in ISE? (Choose two)
What is a definition of a failed-closed methodology?
When connecting an Active Directory, or AD source to Cisco ISE the connection does not automatically join the AD. What must you also do to complete the connection?
What tool is used for policy administration?
Identify the features of identity sources. (Choose two)
Identify the six components of the Life cycle. (Choose six)
What are the two default ISE preconfigured dACLs? (Choose two)
What are the four items you must provide for your own Rule-Based policy? (Choose four)
What considerations must you take into account when using an External Authentication solution with Cisco ISE? (Choose three)