If a user reports a device lost or stolen, which portal should be used to prevent the device from accessing the network while still providing information about why the device is blocked?
A.
Client Provisioning
B.
Guest
C.
BYOD
D.
Blacklist
Blacklist
https://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/Borderless_Networks/Unified_A ccess/BYOD_Design_Guide/Managing_Lost_or_Stolen_Device.html#90273
The Blacklist identity group is system generated and maintained by ISE to prevent access to lost or stolen devices. In this design guide, two authorization profiles are used to enforce the permissions for wireless and wired devices within the Blacklist:
✑ Blackhole WiFi Access ✑ Blackhole Wired Access
What must be configured on the Cisco ISE authentication policy for unknown MAC addresses/identities for successful authentication?
A.
pass
B.
reject
C.
drop
D.
continue
continue
How is policy services node redundancy achieved in a deployment?
A.
by enabling VIP
B.
by utilizing RADIUS server list on the NAD
C.
by creating a node group
D.
by deploying both primary and secondary node
by creating a node group
Which two events trigger a CoA for an endpoint when CoA is enabled globally for ReAuth? (Choose two.)
A.
endpoint marked as lost in My Devices Portal
B.
addition of endpoint to My Devices Portal
C.
endpoint profile transition from Apple-Device to Apple-iPhone
D.
endpoint profile transition from Unknown to Windows 10-Workstation
E.
updating of endpoint dACL.
endpoint profile transition from Apple-Device to Apple-iPhone
endpoint profile transition from Unknown to Windows 10-Workstation
What sends the redirect ACL that is configured in the authorization profile back to the Cisco WLC?
A.
Cisco-av-pair
B.
Class attribute
C.
Event
D.
State attribute
Cisco-av-pair
Page 6 out of 31 Pages |
Previous |