Q1. Which two components are required to connect to a WLAN network that is secured by EAP-TLS authentication? (Choose two.)
A. Kerberos authentication server
B. AAA/RADIUS server
C. PSKs
D. CA server
Answer: B,D
Q2. The corporate security policy requires multiple elements to be matched in an authorization policy. Which elements can be combined to meet the requirement?
A. Device registration status and device activation status
B. Network access device and time condition
C. User credentials and server certificate
D. Built-in profile and custom profile
Answer: B
Q3. You enabled the guest session limit feature on the Cisco ISE. However, end users report that the same guest can log in from multiple devices simultaneously.
Which configuration is missing on the network access device?
A. RADIUS authentication
B. RADIUS accounting
C. DHCP required
D. AAA override
Answer: B
Q4. Which error in a redirect ACL can cause the redirection of an endpoint to the provisioning portal to fail?
A. The redirect ACL is blocking access to ports 80 and 443.
B. The redirect ACL is applied to an incorrect SVI.
C. The redirect ACL is blocking access to the client provisioning portal.
D. The redirect ACL is blocking access to Cisco ISE port 8905.
Answer: A
Q5. Which two statements about administrative access to the Cisco Secure ACS SE are true? (Choose two.)
A. The Cisco Secure ACS SE supports command-line connections through a serial-port connection.
B. For GUI access, an administrative GUI user must be created by using the add-guiadmin command.
C. The Cisco Secure ACS SE supports command-line connections through an Ethernet interface.
D. An ACL-based policy must be configured to allow administrative-user access.
E. GUI access to the Cisco Secure ASC SE is not supported.
Answer: B,D
Q6. In a split ACS deployment with primary and secondary servers, which three statements about AAA load handling are true? (Choose three.)
A. During normal operations, each server processes the full workload of both servers.
B. If a AAA connectivity problem occurs, the servers split the full load of authentication requests.
C. If a AAA connectivity problem occurs, each server processes the full workload of both servers.
D. During normal operations, the servers split the full load of authentication requests.
E. During normal operations, each server is used for specific operations, such as device administration and network admission.
F. The primary servers are used to distribute policy information to other servers in the enterprise.
Answer: C,D,E
Q7. What endpoint operating system provides native support for the SPW?
A. Apple iOS
B. Android OS
C. Windows 8
D. Mac OS X
Answer: A
Q8. Which two options are EAP methods supported by Cisco ISE? (Choose two.)
A. EAP-FAST
B. EAP-TLS
C. EAP-MS-CHAPv2
D. EAP-GTC
Answer: A,B
Q9. Which two Active Directory authentication methods are supported by Cisco ISE? (Choose two.)
A. MS-CHAPv2
B. PEAP
C. PPTP
D. EAP-PEAP
E. PPP
Answer: A,B
Q10. What implementation must be added to the WLC to enable 802.1X and CoA for wireless endpoints?
A. the ISE
B. an ACL
C. a router
D. a policy server
Answer: A
Q11. Which effect does the ip http secure-server command have on a Cisco ISE?
A. It enables the HTTP server for users to connect on the command line.
B. It enables the HTTP server for users to connect by using web-based authentication.
C. It enables the HTTPS server for users to connect by using web-based authentication.
D. It enables the HTTPS server for users to connect on the command line.
Answer: C
Q12. Which action must an administrator take after joining a Cisco ISE deployment to an Active Directory domain?
A. Choose an Active Directory user.
B. Configure the management IP address.
C. Configure replication.
D. Choose an Active Directory group.
Answer: D
Q13. Which network access device feature can you configure to gather raw endpoint data?
A. Device Sensor
B. Device Classifier
C. Switched Port Analyzer
D. Trust Anchor
Answer: A
Q14. In the command 'aaa authentication default group tacacs local', how is the word 'default' defined?
A. Command set
B. Group name
C. Method list
D. Login type
Answer: C
Q15. When RADIUS NAC and AAA Override are enabled for WLC on a Cisco ISE, which two statements about RADIUS NAC are true? (Choose two.)
A. It will return an access-accept and send the redirection URL for all users.
B. It establishes secure connectivity between the RADIUS server and the ISE.
C. It allows the ISE to send a CoA request that indicates when the user is authenticated.
D. It is used for posture assessment, so the ISE changes the user profile based on posture result.
E. It allows multiple users to authenticate at the same time.
Answer: C,D
Q16. A network administrator needs to determine the ability of existing network devices to deliver key BYOD services. Which tool will complete a readiness assessment and outline hardware and software capable and incapable devices?
A. Prime Infrastructure
B. Network Control System
C. Cisco Security Manager
D. Identity Services Engine
Answer: A
Q17. Which two are valid ISE posture conditions? (Choose two.)
A. Dictionary
B. memberOf
C. Profile status
D. File
E. Service
Answer: D,E