An engineer is configuring 802.1X and is testing out their policy sets. After authentication, some endpoints are given an access-reject message but are still allowed onto the network. What is causing this issue to occur?
d
Which profiling probe collects the user-agent string?
b
A network security administrator needs a web authentication configuration when a guest user connects to the network with a wireless connection using these steps:
An initial MAB request is sent to the Cisco ISE node.
Cisco ISE responds with a URL redirection authorization profile if the user's MAC address is unknown in the endpoint identity store.
The URL redirection presents the user with an AUP acceptance page when the user attempts to go to any URL.
Which authentication must the administrator configure on Cisco ISE?
c
An administrator is configuring RADIUS on a Cisco switch with a key set to Cisc407294634 but is receiving the error `Authentication failed: 22040 Wrong password or invalid shared secret.`
What must be done to address this issue?
a
Reference:
https://community.cisco.com/t5/network-access-control/authentication-failed/td-p/2224342
An administrator has added a new Cisco ISE PSN to their distributed deployment. Which two features must the administrator enable to accept authentication requests and profile the endpoints correctly, and add them to their respective endpoint identity groups? (Choose two.)
bc
Which file setup method is supported by ZTP on physical appliances?
c
An administrator needs to give the same level of access to the network devices when users are logging into them using TACACS+. However, the administrator must restrict certain commands based on one of three user roles that require different commands.
How is this accomplished without creating too many objects using Cisco ISE?
c
Reference:
https://www.cisco.com/c/en/us/td/docs/security/ise/2-1/admin_guide/b_ise_admin_guide_21/b_ise_admin_guide_20_chapter_0100010.html
An engineer is testing low-impact mode for a phased deployment of Cisco ISE. Which type of traffic is denied when a host tries to connect to the network prior to authentication?
d
Which deployment mode allows for one or more policy service nodes to be used for session failover?
d
What is an advantage of using EAP-TLS over EAP-MS-CHAPv2 for client authentication?
c
Reference:
https://www.securew2.com/blog/eap-tls-vs-peap-mschapv2-which-authentication-protocol-is-superior