Topic 3: Exam Pool C
Refer to the exhibit.
Refer to the exhibit. A Cisco ISE administrator adds a new switch to an 802.1X deployment and has difficulty with some endpoints gaining access.
Most PCs and IP phones can connect and authenticate using their machine certificate
credentials. However printer and video cameras cannot base d on the interface
configuration provided, what must be to get these devices on to the network using Cisco
ISE for authentication and authorization while maintaining security controls?
A.
Change the default policy in Cisco ISE to allow all devices not using machine
authentication
B.
Enable insecure protocols within Cisco ISE in the allowed protocols configuration.
C.
Configure authentication event fail retry 2 action authorize vlan 41 on the interface
D.
Add mab to the interface configuration
Add mab to the interface configuration
Which two activities can be done using Cisco DNA Center? (Choose two)
A.
DHCP
B.
Design
C.
Accounting
D.
DNS
E.
Provision
Design
Provision
https://www.cisco.com/c/en/us/products/collateral/cloud-systemsmanagement/
dna-center/nb-06- dna-center-so-cte-en.html
An administrator configures new authorization policies within Cisco ISE and has difficulty
profiling the devices. Attributes for the new Cisco IP phones that are profiled based on the
RADIUS authentication are seen however the attributes for CDP or DHCP are not. What
should the administrator do to address this issue?
A.
Configure the ip dhcp snooping trust command on the DHCP interfaces to get the
information to Cisco ISE
B.
Configure the authentication port-control auto feature within Cisco ISE to identify the
devices that are trying to connect
C.
Configure a service template within the switch to standardize the port configurations so
that the correct
information is sent to Cisco ISE
D.
Configure the device sensor feature within the switch to send the appropriate protocol
information
Configure the device sensor feature within the switch to send the appropriate protocol
information
An administrator is adding a new switch onto the network and has configured AAA for
network access control. When testing the configuration, the RADIUS authenticates to Cisco
ISE but is being rejected. Why is the ip radius source-interface command needed for this configuration?
A.
Only requests that originate from a configured NAS IP are accepted by a RADIUS
server
B.
The RADIUS authentication key is transmitted only from the defined RADIUS source
interface
C.
RADIUS requests are generated only by a router if a RADIUS source interface is
defined.
D.
Encrypted RADIUS authentication requires the RADIUS source interface be defined
Only requests that originate from a configured NAS IP are accepted by a RADIUS
server
Which technology enables integration between Cisco ISE and other platforms to gather and
share network and vulnerability data and SIEM and location information?
A.
pxGrid
B.
NetFlow
C.
SNMP
D.
Cisco Talos
pxGrid
What is a commonality between DMVPN and FlexVPN technologies?
A.
FlexVPN and DMVPN use IS-IS routing protocol to communicate with spokes
B.
FlexVPN and DMVPN use the new key management protocol
C.
FlexVPN and DMVPN use the same hashing algorithms
D.
IOS routers run the same NHRP code for DMVPN and FlexVPN
IOS routers run the same NHRP code for DMVPN and FlexVPN
https://packetpushers.net/cisco-flexvpn-dmvpn-high-level-design/
What is the difference between EPP and EDR?
A.
EPP focuses primarily on threats that have evaded front-line defenses that entered the
environment
B.
Having an EPP solution allows an engineer to detect, investigate, and remediate
modern threats.
C.
EDR focuses solely on prevention at the perimeter
D.
Having an EDR solution gives an engineer the capability to flag offending files at the first
sign of malicious behavior
Having an EPP solution allows an engineer to detect, investigate, and remediate
modern threats.
Which Cisco security solution stops exfiltration using HTTPS?
A.
Cisco FTD
B.
Cisco AnyConnect
C.
Cisco CTA
D.
Cisco ASA
Cisco CTA
Which feature is configured for managed devices in the device platform settings of the Firepower Management Center?
A.
quality of service
B.
time synchronization
C.
network address translations
D.
intrusion policy
time synchronization
Which API method and required attribute are used to add a device into DNAC with the
native API?
A.
lastSyncTime and pid
B.
POST and name
C.
userSudiSerialNos and devicelnfo
D.
GET and serialNumber
POST and name
What is a feature of NetFlow Secure Event Logging?
A.
It exports only records that indicate significant events in a flow.
B.
It filters NSEL events based on the traffic and event type through RSVP.
C.
It delivers data records to NSEL collectors through NetFlow over TCP only.
D.
It supports v5 and v8 templates.
It exports only records that indicate significant events in a flow.
What is an advantage of network telemetry over SNMP pulls?
A.
accuracy
B.
encapsulation
C.
security
D.
scalability
scalability
Page 22 out of 53 Pages |
Previous |