Question No : 3 When you configure an endpoint profiling policy rule, which option describes the purpose of the minimum certainty factor?

Similar documents
On-boarding and Provisioning with Cisco Identity Services Engine

TrustSec How-To Guide: On-boarding and Provisioning

Implementing and Configuring Cisco Identity Services Engine SISE v1.3; 5 Days; Instructor-led

MDM Integration with Cisco Identity Service Engine. Secure Access How -To Guides Series

Good MDM Integration with Cisco Identity Service Engine. Secure Access How -To Guides Series

Cisco TrustSec How-To Guide: Guest Services

Passguide q

Cisco EXAM Enterprise Network Unified Access Essentials. Buy Full Product.

Cisco TrustSec How-To Guide: Planning and Predeployment Checklists

XenMobile Integration with Cisco Identity Service Engine. Secure Access How -To Guides Series

Cisco Secure ACS. By Igor Koudashev, Systems Engineer, Cisco Systems Australia 2006 Cisco Systems, Inc. All rights reserved.

Cisco Secure Access Control Server 4.2 for Windows

BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2. Administration Guide

Configuration of Cisco Autonomous Access Point with 802.1x Authentication for Avaya 3631 Wireless Telephone

Clientless SSL VPN Users

Security. AAA Identity Management. Premdeep Banga, CCIE # Cisco Press. Vivek Santuka, CCIE # Brandon J. Carroll, CCIE #23837

Authentication. Authentication in FortiOS. Single Sign-On (SSO)

Securing Networks with Cisco Routers and Switches ( )

Securing Wireless LANs with LDAP

Symantec VIP Integration with ISE

Configure ISE Version 1.4 Posture with Microsoft WSUS

Phone: Fax: Box: 230

CompTIA Security+ Cert Guide

Managing the BYOD Evolution

How to integrate RSA ACE Server SecurID Authentication with Juniper Networks Secure Access SSL VPN (SA) with Single Node or Cluster (A/A or A/P)

Step-by-step Guide for Configuring Cisco ACS server as the Radius with an External Windows Database

Deployment Guide: Cisco Guest Access Using the Cisco Wireless LAN Controller

Integrating Cisco ISE with GO!Enterprise MDM Quick Start

Management, Logging and Troubleshooting

Securing Cisco Network Devices (SND)

Integrating a Hitachi IP5000 Wireless IP Phone

Configuring WPA-Enterprise/WPA2 with Microsoft RADIUS Authentication

Deploying iphone and ipad Virtual Private Networks

Cisco Virtual Office Express

Managing Users and Identity Stores

Eduroam wireless network Windows Vista

Securing Networks with PIX and ASA

This chapter describes how to set up and manage VPN service in Mac OS X Server.

The BYOD Wave: Policy, Security, and Wireless Infrastructure

Switch Configuration Required to Support Cisco ISE Functions

Credit Card Secure Architecture for Interactive Voice Response (IVR) Applications

PassTest. Bessere Qualität, bessere Dienstleistungen!

Cisco ISE 1.2 BYOD Lab Guide

Configuring Settings on the Cisco Unified Wireless IP Phone 7925G

Web Authentication Proxy on a Wireless LAN Controller Configuration Example

BYOD: BRING YOUR OWN DEVICE.

Chapter 3 Authenticating Users

Workplace-as-a-Service BYOD Management

Workspot Configuration Guide for the Cisco Adaptive Security Appliance

Advanced Administration

Gaining Visibility by Using the Network

Mobile Admin Security

802.1x in the Enterprise Network

Security Threats VPNs and IPSec AAA and Security Servers PIX and IOS Router Firewalls. Intrusion Detection Systems

Implementing Cisco IOS Network Security

VMware Identity Manager Connector Installation and Configuration

(d-5273) CCIE Security v3.0 Written Exam Topics

DeployStudio Server Quick Install

NETASQ ACTIVE DIRECTORY INTEGRATION

Cox Managed CPE Services. RADIUS Authentication for AnyConnect VPN Version 1.3 [Draft]

Cisco Trust and Identity Management Solutions

Configure Cisco Unified Customer Voice Portal

iphone in Business How-To Setup Guide for Users

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

Network Security 1 Module 4 Trust and Identity Technology

CONFIGURING ACTIVE DIRECTORY IN LIFELINE

WiNG5 CAPTIVE PORTAL DESIGN GUIDE

Chapter 1 Network Security

Pulse Policy Secure. RADIUS Server Management Guide. Product Release 5.1. Document Revision 1.0. Published:

UNDERSTANDING IDENTITY-BASED NETWORKING SERVICES AUTHENTICATION AND POLICY ENFORCEMENT

Cisco ISE and Certificates. How to Implement Cisco ISE and Server Side Certificates

Summer Webinar Series

Cisco IT Validates Rigorous Identity and Policy Enforcement in Its Own Wired and Wireless Networks

VMware Identity Manager Administration

SOSPG2. Implementing Network Access Controls. Nate Isaacson Security Solution Architect

How To Use Cisco Identity Based Networking Services (Ibns)

Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure

iphone in Business How-To Setup Guide for Users

Product Summary RADIUS Servers

STEP III: Enable the Wireless Network Card

1Y0-250 Implementing Citrix NetScaler 10 for App and Desktop Solutions Practice Exam

Configuring Sponsor Authentication

VMware Identity Manager Administration

Wireless Network Configuration Guide

Scenario: Remote-Access VPN Configuration

Cisco Certified Security Professional (CCSP)

Avaya Identity Engines Ignition Server

Quick Start Guide. WRV210 Wireless-G VPN Router with RangeBooster. Cisco Small Business

Extending Collaboration to BYOD Devices

Remote Application Server Version 14. Last updated:

RSC-Secure-Wireless provides...

ipad in Business Security

1. Installation Overview

CISCO IOS NETWORK SECURITY (IINS)

BlackBerry Enterprise Service 10. Universal Device Service Version: Administration Guide

How to connect to NAU s WPA2 Enterprise implementation in a Residence Hall:

Mobile Configuration Profiles for ios Devices Technical Note

Connecting an Android to a FortiGate with SSL VPN

Configuring Wireless Security on ProSafe wireless routers (WEP/WPA/Access list)

Setting up SJUMobile (Wireless Internet Access for personal devices)

Transcription:

Volume: 224 Questions Question No : 1 You enabled the guest session limit feature on the Cisco ISE. However, end users report that the same guest can log in from multiple devices simultaneously. Which configuration is missing on the network access device? A. RADIUS authentication B. RADIUS accounting C. DHCP required D. AAA override Answer: B Question No : 2 You are installing Cisco ISE on nodes that will be used in a distributed deployment. After the initial bootstrap process, what state will the Cisco ISE nodes be in? A. Remote B. Policy service C. Administration D. Standalone Answer: D Question No : 3 When you configure an endpoint profiling policy rule, which option describes the purpose of the minimum certainty factor? A. It is compared to the total certainty metric of an individual endpoint to determine whether the endpoint can be trusted. B. It is compared to the assigned certainty value of an individual endpoint in a device database to determine whether the endpoint can be trusted.

C. It is used to compare the policy condition to other active policies. D. It is used to determine the likelihood that an endpoint is an active, trusted device on the network. Question No : 4 Which term describes a software application that seeks connectivity to the network via a network access device? A. authenticator B. server C. supplicant D. WLC Answer: C Question No : 5 What is another term for 802.11i wireless network security? A. 802.1x B. WEP C. TKIP D. WPA E. WPA2 Answer: E Question No : 6 Which model does Cisco support in a RADIUS change of authorization implementation? A. push

B. pull C. policy D. security Question No : 7 Which devices support download of environmental data and IP from Cisco ISE to SGT bindings in their SGFW implementation? A. Cisco ASA devices B. Cisco ISR G2 and later devices with ZBFW C. Cisco ISR G3 devices with ZBFW D. Cisco ASR devices with ZBFW Question No : 8 Which command can check a AAA server authentication for server group Group1, user cisco, and password cisco555 on a Cisco ASA device? A. ASA# test aaa-server authentication Group1 username cisco password cisco555 B. ASA# test aaa-server authentication group Group1 username cisco password cisco555 C. ASA# aaa-server authorization Group1 username cisco password cisco555 D. ASA# aaa-server authentication Group1 roger cisco555 Question No : 9 Which two Active Directory authentication methods are supported by Cisco ISE? (Choose two.) A. MS-CHAPv2

B. PEAP C. PPTP D. EAP-PEAP E. PPP,B Question No : 10 Which identity store option allows you to modify the directory services that run on TCP/IP? A. Lightweight Directory Access Protocol B. RSA SecurID server C. RADIUS D. Active Directory Question No : 11 Which time allowance is the minimum that can be configured for posture reassessment interval? A. 5 minutes B. 20 minutes C. 60 minutes D. 90 minutes Answer: C Question No : 12 Which two services are included in the Cisco ISE posture service? (Choose two.) A. posture administration

B. posture run-time C. posture monitoring D. posture policing E. posture catalog,b Question No : 13 Refer to the exhibit. If the given configuration is applied to the object-group vpn servers, during which time period are external users able to connect? A. From Friday at 6:00 p.m. until Monday at 8:00 a.m. B. From Monday at 8:00 a.m. until Friday at 6:00 p.m. C. From Friday at 6:01 p.m. until Monday at 8:01 a.m. D. From Monday at 8:01 a.m. until Friday at 5:59 p.m. Question No : 14 In Cisco ISE 1.3, where is BYOD enabled with dual-ssid onboarding? A. client provisioning policy B. client provisioning resources C. BYOD portal D. guest portal Answer: D

Question No : 15 What user rights does an account need to join ISE to a Microsoft Active Directory domain? A. Create and Delete Computer Objects B. Domain Admin C. Join and Leave Domain D. Create and Delete User Objects Question No : 16 Which advanced authentication setting is needed to allow an unknown device to utilize Central WebAuth? A. If Authentication failed > Continue B. If Authentication failed > Drop C. If user not found > Continue D. If user not found > Reject Answer: C Question No : 17 Which two profile attributes can be collected by a Cisco Catalyst Switch that supports Device Sensor? (Choose two.) A. LLDP agent information B. user agent C. DHCP options D. open ports E. operating system F. trunk ports

,C Question No : 18 Which error in a redirect ACL can cause the redirection of an endpoint to the provisioning portal to fail? A. The redirect ACL is blocking access to ports 80 and 443. B. The redirect ACL is applied to an incorrect SVI. C. The redirect ACL is blocking access to the client provisioning portal. D. The redirect ACL is blocking access to Cisco ISE port 8905. Question No : 19 Refer to the exhibit. Which three statements about the given configuration are true? (Choose three.) A. TACACS+ authentication configuration is complete. B. TACACS+ authentication configuration is incomplete. C. TACACS+ server hosts are configured correctly. D. TACACS+ server hosts are misconfigured. E. The TACACS+ server key is encrypted. F. The TACACS+ server key is unencrypted. Answer: B,C,F Question No : 20 In the command 'aaa authentication default group tacacs local', how is the word 'default' defined?

A. Command set B. Group name C. Method list D. Login type Answer: C Question No : 21 Which action must an administrator take after joining a Cisco ISE deployment to an Active Directory domain? A. Choose an Active Directory user. B. Configure the management IP address. C. Configure replication. D. Choose an Active Directory group. Answer: D Question No : 22 A properly configured Cisco ISE Policy Service node is not receiving any profile data from a Cisco switch that runs Device Sensor. Which option is the most likely reason for the failure? A. Syslog is configured for the Policy Administration Node. B. RADIUS Accounting is disabled. C. The SNMP community strings are mismatched. D. RADIUS Authentication is misconfigured. E. The connected endpoints support CDP but not DHCP. Answer: B

Question No : 23 Which three personas can a Cisco ISE assume in a deployment? (Choose three.) A. connection B. authentication C. administration D. testing E. policy service F. monitoring Answer: C,E,F Question No : 24 What endpoint operating system provides native support for the SPW? A. Apple ios B. Android OS C. Windows 8 D. Mac OS X Question No : 25 Which two components are required to connect to a WLAN network that is secured by EAP-TLS authentication? (Choose two.) A. Kerberos authentication server B. AAA/RADIUS server C. PSKs D. CA server

Answer: B,D Question No : 26 Refer to the exhibit. Which URL must you enter in the External Web auth URL field to configure Cisco ISE CWA correctly? A. https://ip_address:8443/guestportal/login.action B. https://ip_address:443/guestportal/welcome.html C. https://ip_address:443/guestportal/action=cpp D. https://ip_address:8905/guestportal/sponsor.action Question No : 27 Which administrative role has permission to assign Security Group Access Control Lists? A. System Admin B. Network Device Admin C. Policy Admin D. Identity Admin Answer: C Question No : 28 In a basic ACS deployment consisting of two servers, for which three tasks is the primary server responsible? (Choose three.) A. configuration