What allows an endpoint to obtain a digital certificate from Cisco ISE during a BYOD flow?
A.
Network Access Control
B.
My Devices Portal
C.
Application Visibility and Control
D.
Supplicant Provisioning Wizard
My Devices Portal
Which use case validates a change of authorization?
A.
An authenticated, wired EAP-capable endpoint is discovered
B.
An endpoint profiling policy is changed for authorization policy
C.
An endpoint that is disconnected from the network is discovered
D.
Endpoints are created through device registration for the guests
An endpoint profiling policy is changed for authorization policy
When configuring Active Directory groups, what does the Cisco ISE use to resolve ambiguous group names?
A.
MIB
B.
TGT
C.
OMAB
D.
SID
SID
What is the minimum certainty factor when creating a profiler policy?
A.
the minimum number that a predefined condition provides
B.
the maximum number that a predefined condition provides
C.
the minimum number that a device certainty factor must reach to become a member of the profile
D.
the maximum number that a device certainty factor must reach to become a member of the profile
the minimum number that a device certainty factor must reach to become a member of the profile
What gives Cisco ISE an option to scan endpoints for vulnerabilities?
A.
authorization policy
B.
authentication policy
C.
authentication profile
D.
authorization profile
authorization policy
Page 9 out of 31 Pages |
Previous |