Q1. Which command in the My Devices Portal can restore a previously lost device to the network?
A. Reset
B. Found
C. Reinstate
D. Request
Answer: C
Q2. Which three algorithms should be avoided due to security concerns? (Choose three.)
A. DES for encryption
B. SHA-1 for hashing
C. 1024-bit RSA
D. AES GCM mode for encryption
E. HMAC-SHA-1
F. 256-bit Elliptic Curve Diffie-Hellman
G. 2048-bit Diffie-Hellman
Answer: A,B,C
Q3. Refer to the exhibit.
You are troubleshooting RADIUS issues on the network and the debug radius command returns the given output. What is the most likely reason for the failure?
A. An invalid username or password was entered.
B. The RADIUS port is incorrect.
C. The NAD is untrusted by the RADIUS server.
D. The RADIUS server is unreachable.
E. RADIUS shared secret does not match
Answer: A
Q4. Which time allowance is the minimum that can be configured for posture reassessment interval?
A. 5 minutes
B. 20 minutes
C. 60 minutes
D. 90 minutes
Answer: C
Q5. You configured wired 802.1X with EAP-TLS on Windows machines. The ISE authentication detail report shows "EAP-TLS failed SSL/TLS handshake because of an unknown CA in the client certificates chain." What is the most likely cause of this error?
A. The ISE certificate store is missing a CA certificate.
B. The Wireless LAN Controller is missing a CA certificate.
C. The switch is missing a CA certificate.
D. The Windows Active Directory server is missing a CA certificate.
Answer: A
Q6. A network administrator must enable which protocol extension to utilize EAP-Chaining?
A. EAP-FAST
B. EAP-TLS
C. MSCHAPv2
D. PEAP
Answer: A
Q7. Which Cisco ISE feature can differentiate a corporate endpoint from a personal device?
A. EAP chaining
B. PAC files
C. authenticated in-band provisioning
D. machine authentication
Answer: A
Q8. Certain endpoints are missing DHCP profiling data.
Which option describes what can be used to determine if DHCP requests from clients are reaching Cisco ISE?
A. output of show interface gigabitEthernet 0 from the CLI
B. output of debug logging all 7 from the CLI
C. output of show logging application profiler.log from the CLI
D. the TCP dump diagnostic tool through the GUI
E. the posture troubleshooting diagnostic tool through the GUI
Answer: D
Q9. Wireless client supplicants attempting to authenticate to a wireless network are generating excessive log messages. Which three WLC authentication settings should be disabled? (Choose three.)
A. RADIUS Server Timeout
B. RADIUS Aggressive-Failover
C. Idle Timer
D. Session Timeout
E. Client Exclusion
F. Roaming
Answer: B,C,D
Q10. Which three posture states can be used for authorization rules? (Choose three.)
A. unknown
B. known
C. noncompliant
D. quarantined
E. compliant
F. no access
G. limited
Answer: A,C,E
Q11. What is the function of the SGACL policy matrix on a Cisco TrustSec domain with SGT Assignment?
A. It determines which access policy to apply to the endpoint.
B. It determines which switches are trusted within the TrustSec domain.
C. It determines the path the SGT of the packet takes when entering the Cisco TrustSec domain.
D. It lists all servers that are permitted to participate in the TrustSec domain.
E. It lists all hosts that are permitted to participate in the TrustSec domain.
Answer: A
Q12. Refer to the exhibit.
The links outside the TrustSec area in the given SGA architecture are unprotected. On which two links does EAC take place? (Choose two.)
A. between switch 2 and switch 3
B. between switch 5 and host 2
C. between host 1 and switch 1
D. between the authentication server and switch 4
E. between switch 1 and switch 2
F. between switch 1 and switch 5
Answer: A,B
Q13. Which statement about IOS accounting is true?
A. A named list of AAA methods must be defined.
B. A named list of accounting methods must be defined.
C. Authorization must be configured before accounting.
D. A named list of tracking methods must be defined.
Answer: C
Q14. What attribute could be obtained from the SNMP query probe?
A. FQDN
B. CDP
C. DHCP class identifier
D. User agent
Answer: B
Q15. Which five portals are provided by PSN? (Choose five.)
A. guest
B. sponsor
C. my devices
D. blacklist
E. client provisioning
F. admin
G. monitoring and troubleshooting
Answer: A,B,C,D,E
Q16. In this simulation, you are task to examine the various authentication events using the ISE GUI. For example, you should see events like Authentication succeeded. Authentication failed and etc...
Which three statements are correct regarding the events with the 20 repeat count that occurred at 2014-05-07 00:22:48.748? (Choose three.)
A. The device was successfully authenticated using MAB.
B. The device matched the Machine_Corp authorization policy.
C. The Print Servers authorization profile were applied.
D. The device was profiled as a Linksys-PrintServer.
E. The device MAC address is 00:14:BF:70:B5:FB.
F. The device is connected to the Gi0/1 switch port and the switch IP address is 10.10.2.2.
Answer: A,D,E
Explanation:
Event Details:
Screen Shot 2015-06-23 at 5.32.43 PM …continued:
Screen Shot 2015-06-23 at 5.33.24 PM
Q17. In this simulation, you are task to examine the various authentication events using the ISE GUI. For example, you should see events like Authentication succeeded. Authentication failed and etc...
Which four statements are correct regarding the event that occurred at 2014-05-07 00:19:07.004? (Choose four.)
A. The IT_Corp authorization profile were applied.
B. The it1 user was matched to the IT_Corp authorization policy.
C. The it1 user supplicant used the PEAP (EAP-MSCHAPv2) authentication method.
D. The it1 user was authenticated using MAB.
E. The it1 user was successfully authenticated against AD1 identity store.
F. The it1 user machine has been profiled as a Microsoft-Workstation.
G. The it1 user machine has passed all the posture assessement tests.
Answer: B,C,E,F
Explanation:
Here are the details shown for this event:
Screen Shot 2015-06-23 at 5.27.37 PM