Which port does Cisco ISE use for native supplicant provisioning of a Windows laptop?
A. TCP 8909
B. TCP 8905
C. CUDP 1812
D. TCP 443
Which portal is used to customize the settings for a user to log in and download the compliance module?
A. Client Profiling
B. Client Endpoint
C. Client Provisioning
D. Client Guest
Which radius attribute can be used to dynamically assign the inactivity active timer for MAB users from the Cisco ISE node?
A. radius-server timeout
B. idle-timeout attribute
C. termination-action attribute
D. session-timeout attribute
A security engineer must create an Antivirus remediation policy within Cisco ISE. Which two options can the engineer select in the new Antivirus remediation policy? (Choose two.)
A. program installation path
B. Antivirus vendor name
C. uniform resource locator
D. file to upload
E. operating system
The default Cisco ISE node configuration has which role or roles enabled by default?
A. Administration only
B. Inline Posture only
C. Administration and Pokey Service
D. Policy Service Monitoring, and Administration
An engineer is configuring web authentication and needs to allow specific protocol to permit DNS traffic. Which type of access list should be used for this configuration?
A. Numbered ACL
B. Standard ACL
C. Reflexive ACL
D. Extended ACL
Guest users report repeated prompts to authenticate with the portal when connecting to a wireless network. An administrator must configure Cisco ISE to reduce the number of prompts. The solution must meet the requirements:
1.
Users must be authenticated once.
2.
When reconnecting to the visitor network, users do not need to be redirected to the login page.
Which action completes the configuration?
A. Configure an authorization profile to send a redirection access control list only for unauthenticated users.
B. Configure the Wi-Fi Guest Access policy to allow the GuestEndpoint group.
C. Configure an authorization rule for guest flow to bypass authenticated MAC address.
D. Configure an authentication rule for MAC Authentication Bypass users to add an authenticated MAC address in an identity group.
Which Cisco ISE deployment model provides redundancy by having every node in the deployment configured with the Administration. Policy Service, and Monitoring personas to protect from a complete node failure?
A. distributed
B. dispersed
C. two-node
D. hybrid
An engineer is configuring posture assessment for their network access control and needs to use an agent that supports using service conditions as conditions for the assessment. The agent should be run as a background process to avoid user interruption but when it is run. the user can see it. What is the problem?
A. The engineer is using the "Anyconnect" posture agent but should be using the "Stealth Anyconnect posture agent
B. The posture module was deployed using the headend instead of installing it with SCCM
C. The user was in need of remediation so the agent appeared m the notifications
D. The proper permissions were no! given to the temporal agent to conduct the assessment
An engineer is configuring a new switch to deploy in the campus network. The task is to configure TACACS+ and RADIUS authentication using the new switch and Cisco ISE. What is the procedure for adding this new switch on the network resources page?
A. network devices profiles > add
B. default device > add
C. network devices > add
D. network devices groups > add