In which two ways can users and endpoints be classified for TrustSec?
(Choose Two.)
A.
VLAN
B.
SXP
C.
dynamic
D.
QoS
E.
SGACL
VLAN
SGACL
What are two components of the posture requirement when configuring Cisco ISE posture? (Choose two)
A.
updates
B.
remediation actions
C.
Client Provisioning portal
D.
conditions
E.
access policy
remediation actions
conditions
What is a method for transporting security group tags throughout the network?
A.
by enabling 802.1AE on every network device
B.
by the Security Group Tag Exchange Protocol
C.
by embedding the security group tag in the IP header
D.
by embedding the security group tag in the 802.1Q header
by the Security Group Tag Exchange Protocol
What is a characteristic of the UDP protocol?
A.
UDP can detect when a server is down
B.
UDP offers best-effort delivery
C.
UDP can detect when a server is slow
D.
UDP offers information about a non-existent server
UDP offers best-effort delivery
Which statement about configuring certificates for BYOD is true?
A.
An Android endpoint uses EST, whereas other operating systems use SCEP for enrollment
B.
The SAN field is populated with the end user name.
C.
An endpoint certificate is mandatory for the Cisco ISE BYOD
D.
The CN field is populated with the endpoint host name
An endpoint certificate is mandatory for the Cisco ISE BYOD
Page 4 out of 31 Pages |
Previous |