Q1. Which term describes a software application that seeks connectivity to the network via a network access device?
A. authenticator
B. server
C. supplicant
D. WLC
Answer: C
Q2. Refer to the exhibit.
Which three statements about the given configuration are true? (Choose three.)
A. TACACS+ authentication configuration is complete.
B. TACACS+ authentication configuration is incomplete.
C. TACACS+ server hosts are configured correctly.
D. TACACS+ server hosts are misconfigured.
E. The TACACS+ server key is encrypted.
F. The TACACS+ server key is unencrypted.
Answer: B,C,F
Q3. You configured wired 802.1X with EAP-TLS on Windows machines. The ISE authentication detail report shows "EAP-TLS failed SSL/TLS handshake because of an unknown CA in the client certificates chain." What is the most likely cause of this error?
A. The ISE certificate store is missing a CA certificate.
B. The Wireless LAN Controller is missing a CA certificate.
C. The switch is missing a CA certificate.
D. The Windows Active Directory server is missing a CA certificate.
Answer: A
Q4. Which two components are required to connect to a WLAN network that is secured by EAP-TLS authentication? (Choose two.)
A. Kerberos authentication server
B. AAA/RADIUS server
C. PSKs
D. CA server
Answer: B,D
Q5. Where would a Cisco ISE administrator define a named ACL to use in an authorization policy?
A. In the conditions of an authorization rule.
B. In the attributes of an authorization rule.
C. In the permissions of an authorization rule.
D. In an authorization profile associated with an authorization rule.
Answer: D
Q6. Which feature enables the Cisco ISE DHCP profiling capabilities to determine and enforce authorization policies on mobile devices?
A. disabling the DHCP proxy option
B. DHCP option 42
C. DHCP snooping
D. DHCP spoofing
Answer: A
Q7. Which type of access list is the most scalable that Cisco ISE can use to implement network authorization enforcement for a large number of users?
A. downloadable access lists
B. named access lists
C. VLAN access lists
D. MAC address access lists
Answer: A
Q8. Which two types of client provisioning resources are used for BYOD implementations? (Choose two.)
A. user agent
B. Cisco NAC agent
C. native supplicant profiles
D. device sensor
E. software provisioning wizards
Answer: C,E
Q9. Which network component would issue the CoA?
A. switch
B. endpoint
C. Admin Node
D. Policy Service Node
Answer: D
Q10. Which two services are included in the Cisco ISE posture service? (Choose two.)
A. posture administration
B. posture run-time
C. posture monitoring
D. posture policing
E. posture catalog
Answer: A,B
Q11. What steps must you perform to deploy a CA-signed identify certificate on an ISE device?
A. 1. Download the CA server certificate.
2. Generate a signing request and save it as a file.
3. Access the CA server and submit the ISE request.
4. Install the issued certificate on the ISE.
B. 1. Download the CA server certificate.
2. Generate a signing request and save it as a file.
3. Access the CA server and submit the ISE request.
4. Install the issued certificate on the CA server.
C. 1. Generate a signing request and save it as a file.
2. Download the CA server certificate.
3. Access the ISE server and submit the CA request.
4. Install the issued certificate on the CA server.
D. 1. Generate a signing request and save it as a file.
2. Download the CA server certificate.
3. Access the CA server and submit the ISE request.
4. Install the issued certificate on the ISE.
Answer: D
Q12. Which statement about Cisco ISE BYOD is true?
A. Dual SSID allows EAP-TLS only when connecting to the secured SSID.
B. Single SSID does not require endpoints to be registered.
C. Dual SSID allows BYOD for guest users.
D. Single SSID utilizes open SSID to accommodate different types of users.
E. Single SSID allows PEAP-MSCHAPv2 for native supplicant provisioning.
Answer: E
Q13. Which three host modes support MACsec? (Choose three.)
A. multidomain authentication host mode
B. multihost mode
C. multi-MAC host mode
D. single-host mode
E. dual-host mode
F. multi-auth host mode
Answer: A,B,D
Q14. Which three components comprise the Cisco ISE profiler? (Choose three.)
A. the sensor, which contains one or more probes
B. the probe manager
C. a monitoring tool that connects to the Cisco ISE
D. the trigger, which activates ACLs
E. an analyzer, which uses configured policies to evaluate endpoints
F. a remitter tool, which fails over to redundant profilers
Answer: A,B,E
Q15. What is the first step that occurs when provisioning a wired device in a BYOD scenario?
A. The smart hub detects that the physically connected endpoint requires configuration and must use MAB to authenticate.
B. The URL redirects to the Cisco ISE Guest Provisioning portal.
C. Cisco ISE authenticates the user and deploys the SPW package.
D. The device user attempts to access a network URL.
Answer: A
Q16. Which command is useful when troubleshooting AAA Authentication between a Cisco router and the AAA server?
A. test aaa-server test cisco cisco123 all new-code
B. test aaa group7 tacacs+ auth cisco123 new-code
C. test aaa group tacacs+ cisco cisco123 new-code
D. test aaa-server tacacs+ group7 cisco cisco123 new-code
Answer: C
Q17. Which two are valid ISE posture conditions? (Choose two.)
A. Dictionary
B. memberOf
C. Profile status
D. File
E. Service
Answer: D,E