ExamTopics Flashcards
Which personas can a Cisco ISE node assume?
A. policy service, gatekeeping, and monitoring
B. administration, monitoring, and gatekeeping
C. administration, policy service, and monitoring
D. administration, policy service, gatekeeping
C. administration, policy service, and monitoring
Verified correct
The persona or personas of a node determine the services provided by a node. An ISE node can assume any or all of the following personas: Administration, Policy Service, and Monitoring. The menu options that are available through the administrative user interface are dependent on the role and personas that an ISE node assumes. See Cisco ISE Nodes and Available Menu Options for more information.
https://www.cisco.com/en/US/docs/security/ise/1.0/user_guide/ise10_dis_deploy.html
What occurs when a Cisco ISE distributed deployment has two nodes and the secondary node is deregistered?
A. The secondary node restarts
B. The primary node restarts
C. Both nodes restart
D. The primary node becomes standalone
A. The secondary node restarts
Verified
DRAG DROP -
Drag the steps to configure a Cisco ISE node as a primary administration node from the left into the correct order on the right.
Select and Place:
Verified
Which two features are available when the primary admin node is down and the secondary admin node has not been promoted? (Choose two.)
A. new AD user 802.1X authentication
B. hotspot
C. posture
D. guest AUP
E. BYOD
A. new AD user 802.1X authentication
C. posture
Verified
https://www.cisco.com/c/en/us/td/docs/security/ise/2-3/admin_guide/b_ise_admin_guide_23/b_ise_admin_guide_23_chapter_011.html#ID57
Which supplicant(s) and server(s) are capable of supporting EAP-CHAINING?
A. Cisco Secure Services Client and Cisco Access Control Server
B. Cisco AnyConnect NAM and Cisco Identity Service Engine
C. Cisco AnyConnect NAM and Cisco Access Control Server
D. Windows Native Supplicant and Cisco Identity Service Engine
B. Cisco AnyConnect NAM and Cisco Identity Service Engine
Verified
https://www.cisco.com/c/en/us/support/docs/wireless-mobility/eap-fast/200322-Understanding-EAP-FAST-and-Chaining-imp.html
What is a requirement for Feed Service to work?
A. TCP port 8080 must be opened between Cisco ISE and the feed server.
B. Cisco ISE has access to an internal server to download feed update.
C. Cisco ISE has a base license.
D. Cisco ISE has Internet access to download feed update.
D. Cisco ISE has Internet access to download feed update.
Verified
What is a method for transporting security group tags throughout the network?
A. by embedding the security group tag in the 802.1Q header
B. by the Security Group Tag Exchange Protocol
C. by enabling 802.1AE on every network device
D. by embedding the security group tag in the IP header
B. by the Security Group Tag Exchange Protocol
Verified
Cisco Identity Services Engine Administrator Guide, Release 2.1 - Cisco TrustSec Policies Configuration [Cisco Identity Services Engine] - Cisco
An engineer is configuring a virtual Cisco ISE deployment and needs each persona to be on a different node.
Which persona should be configured with the largest amount of storage in this environment?
A. Monitoring and Troubleshooting
B. Policy Services
C. Primary Administration
D. Platform Exchange Grid
A. Monitoring and Troubleshooting
Verified
https://www.cisco.com/c/en/us/td/docs/security/ise/2-1/install_guide/b_ise_InstallationGuide21/b_ise_InstallationGuide21_chapter_011.html
In a standalone Cisco ISE deployment, which two personas are configured on a node? (Choose two.)
A. subscriber
B. primary
C. administration
D. publisher
E. policy service
C. administration
E. policy service
Verified
The Administration, Policy Service, and Monitoring personas will be enabled by default in a standalone ISE node. You must first configure a primary Administration ISE node and then register secondary nodes to set up a distributed deployment.
A network engineer must enforce access control using special tags, without re-engineering the network design. Which feature should be configured to achieve this in a scalable manner?
A. RBAC
B. dACL
C. SGT
D. VLAN
C. SGT
Verified
Security Group Tags allow an organization to create policies based on a user’s, device’s, or server’s role in the network providing a layer of abstraction in security policies based on an SGT as opposed to IP Addresses in ACLs.
Enforcement – Is the process where a TrustSec or role-based policy which can be either locally defined or more commonly defined within Cisco ISE, is acted upon and traffic between a Source SGT and Destination SGT is either permitted or denied. Enforcement is carried out through the use of a Security Group ACL or SGACL on switches or through security policies on an ASA or IOS firewall commonly referenced as a Security Group Firewall or SG-FW
A network engineer is configuring a network device that needs to filter traffic based on security group tags using a security policy on a routed interface. Which command should be used to accomplish this task?
A. cts role-based policy priority-static
B. cts cache enable
C. cts authorization list
D. cts role-based enforcement
D. cts role-based enforcement
Verified
- Switch(config-if)# cts role-based enforcement
-
Enables Cisco TrustSec SGACL policy enforcement on routed interfaces
- https://www.cisco.com/c/en/us/td/docs/switches/lan/trustsec/configuration/guide/trustsec/sgacl_config.html
-
Enables Cisco TrustSec SGACL policy enforcement on routed interfaces
In a Cisco ISE split deployment model, which load is split between the nodes?
A. log collection
B. device admission
C. AAA
D. network admission
C. AAA
Verified
Split Deployments in Cisco ISE deployments, you continue to maintain primary and secondary nodes as described in a small Cisco ISE deployment. However, the AAA load is split between the two Cisco ISE nodes to optimize the AAA workflow. Each Cisco ISE appliance (primary or secondary) needs to be able to handle the full workload if there are any problems with AAA connectivity. Neither the primary node nor the secondary nodes handle all AAA requests during normal network operations because this workload is distributed between the two nodes.
The ability to split the load in this way directly reduces the stress on each Cisco ISE node in the system. In addition, splitting the load provides better loading while the functional status of the secondary node is maintained during the course of normal network operations. In split Cisco ISE deployments, each node can perform its own specific operations, such as network admission or device administration, and still perform all the AAA functions in the event of a failure. If you have two Cisco ISE nodes that process authentication requests and collect accounting data from AAA clients, we recommend that you set up one of the Cisco ISE nodes to act as a log collector
How is policy services node redundancy achieved in a deployment?
A. by creating a node group
B. by deploying both primary and secondary node
C. by enabling VIP
D. by utilizing RADIUS server list on the NAD
A. by creating a node group
Verified
High Availability in Policy Service Nodes
To detect node failure and to reset all URL-redirected sessions on the failed node, two or more PSNs can be placed in the same node group. When a node that belongs to a node group fails, another node in the same node group issues a Change of Authorization (CoA) for all URL-redirected sessions on the failed node.
All the nodes within the same node group should be configured on the network access device (NAD) as RADIUS clients and authorized for CoA, because any one of them can issue a CoA request for the sessions that are established through any node in the node group. If you are not using a load balancer, the nodes in a node group should be the same as, or a subset of, the RADIUS servers and clients configured on the NAD. These nodes should also be configured as RADIUS servers.
https://www.cisco.com/c/en/us/td/docs/security/ise/2-4/admin_guide/b_ISE_admin_guide_24/m_setup_cisco_ise.html#ID64
Which two fields are available when creating an endpoint on the context visibility page of Cisco ISE? (Choose two.)
A. Security Group Tag
B. Endpoint Family
C. Policy Assignment
D. Identity Group Assignment
E. IP Address
C. Policy Assignment
D. Identity Group Assignment
Verified
Looked at our ISE server
https://www.cisco.com/c/en/us/td/docs/security/ise/2-2/admin_guide/b_ise_admin_guide_22/b_ise_admin_guide_22_chapter_010101.html
In which two ways can users and endpoints be classified for TrustSec? (Choose two.)
A. VLAN
B. dynamic
C. QoS
D. SGACL
E. SXP
A. VLAN
B. dynamic
Verified
Because “Static” and “Dynamic” are the two ways
VLAN = STATIC
802.1x, MAB, or web authentication = DYNAMIC
Classification
In order to use SGTs within your infrastructure, your devices must support SGTs. All Cisco switches and wireless controllers embedded with Cisco TrustSec technology support the assignment of SGTs. An SGT can be assigned dynamically or statically. Dynamic classification occurs via an authentication sequence, via 802.1x, MAB, or web authentication. When authentication isn’t available, static classification methods are necessary. In static classification the tag maps to some thing (an IP, subnet, VLAN, or interface) rather than relying on an authorization from the Cisco ISE. This process of assigning the SGT is defined as “classification.” These classifications are then transported deeper into the network for policy enforcement.
https://www.cisco.com/c/dam/en/us/solutions/collateral/borderless-networks/trustsec/C07-730151-00_overview_of_trustSec_og.pdf
When configuring Active Directory groups, what does the Cisco ISE use to resolve ambiguous group names?
A. MIB
B. SID
C. MAB
D. TGT
B. SID
Verified
Ambiguous Identity Resolution
If the user or machine name received by Cisco ISE is ambiguous, that is, it is not unique, it can cause problems for users when they try to authenticate. Identity clashes occur in cases when the user does not have a domain markup, or when there are multiple identities with the same username in more than one domain. For example, userA exists on domain1 and another userA exists on domain2. You can use the identity resolution setting to define the scope for the resolution for such users. Cisco highly recommends you to use qualified names such as UPN or NetBIOS. Qualified name reduces chances of ambiguity and increases performance by reducing delays.
https://www.cisco.com/c/en/us/td/docs/security/ise/2-0/ise_active_directory_integration/b_ISE_AD_integration_2x.html
Which permission is common to the Active Directory Join and Leave operations?
A. Remove the Cisco ISE machine account from the domain.
B. Search Active Directory to see if a Cisco ISE machine account already exists.
C. Set attributes on the Cisco ISE machine account.
D. Create a Cisco ISE machine account in the domain if the machine account does not already exist.
B. Search Active Directory to see if a Cisco ISE machine account already exists.
Verified
https://www.cisco.com/c/en/us/td/docs/security/ise/2-3/ise_active_directory_integration/b_ISE_AD_integration_2x.html
tab -> Active Directory Account Permissions Required to Perform Various Operations
Which interface-level command is needed to turn on 802.1X authentication?
A. dot1x system-auth-control
B. dot1x pae authenticator
C. aaa server radius dynamic-author
D. authentication host-mode single-host
B. dot1x pae authenticator
Verified
https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst4500/12-2/31sg/configuration/guide/conf/dot1x.html
Which RADIUS attribute is used to dynamically assign the Inactivity active timer for MAB users from the Cisco ISE node?
A. session-timeout
B. termination-action
C. radius-server timeout
D. idle-timeout
D. idle-timeout
Verified
https://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/Security/TrustSec_1-99/MAB/MAB_Dep_Guide.html#wp392385
Inactivity Timer
When the inactivity timer is enabled, the switch monitors the activity from authenticated endpoints. When the inactivity timer expires, the switch removes the authenticated session.
The inactivity timer for MAB can be statically configured on the switch port, or it can be dynamically assigned using the RADIUS idle-timeout attribute (Attribute 28). Cisco recommends setting the timer using the RADIUS attribute because this approach lets gives you control over which endpoints are subject to this timer and the length of the timer for each class of endpoints. For example, endpoints that are known to be quiet for long periods of time can be assigned a longer inactivity timer value than chatty endpoints.
The inactivity timer is an indirect mechanism that the switch uses to infer that a endpoint has disconnected. An expired inactivity timer cannot guarantee that a endpoint has disconnected. Therefore, a quiet endpoint that does not send traffic for long periods of time, such as a network printer that services occasional requests but is otherwise silent, may have its session cleared even though it is still connected. That endpoint must then send traffic before it can be authenticated again and have access to the network.
What does the dot1x system-auth-control command do?
A. globally enables 802.1x
B. causes a network access switch not to track 802.1x sessions
C. enables 802.1x on a network access device interface
D. causes a network access switch to track 802.1x sessions
A. globally enables 802.1x
Verified
https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst4500/XE3-8-0E/15-24E/configuration/guide/xe-380-configuration/dot1x.html
What should be configured on the Cisco ISE authentication policy for unknown MAC addresses/identities for a successful authentication?
A. continue
B. pass
C. drop
D. reject
A. continue
Which command displays all 802.1X/MAB sessions that are active on the switch ports of a Cisco Catalyst switch?
A. show authentication sessions interface Gi1/0/x output
B. show authentication sessions
C. show authentication sessions output
D. show authentication sessions interface Gi 1/0/x
B. show authentication sessions
Verified
ET community
What are two requirements of generating a single certificate in Cisco ISE by using a certificate provisioning portal, without generating a certificate signing request?
A. Enter the IP address of the device.
B. Enter the common name.
C. Choose the hashing method.
D. Locate the CSV file for the device MAC.
E. Select the certificate template.
(Choose two.)
B. Enter the common name
E. Select the certificate template.
Verified
https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/200534-ISE-2-0-Certificate-Provisioning-Portal.html
Refer to the exhibit. Which command is typed within the CLI of a switch to view the troubleshooting output?
A. show authentication sessions mac 000e.84af.59af details
B. show authentication registrations
C. show authentication interface gigabitethernet2/0/36
D. show authentication sessions method
A. show authentication sessions mac 000e.84af.59af details
Verified
show authentication sessions [handle handle-number | interface type number | mac mac-address | method method-name interface type number | session-id session-id]
https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/security/s1/sec-s1-xe-3se-3850-cr-book/sec-s1-xe-3se-3850-cr-book_chapter_01.html#wp3404908137
What gives Cisco ISE an option to scan endpoints for vulnerabilities?
A. authentication policy
B. authorization profile
C. authentication profile
D. authorization policy
B. authorization profile
Verified
Configure Authorization Profile The authorization profile in Cisco ISE now includes an option to scan endpoints for vulnerabilities. You can choose to run the scan periodically and also specify the time interval for these scans. After you define the authorization profile, you can apply it to an existing authorization policy rule or create a new authorization policy rule.
https://www.cisco.com/c/en/us/td/docs/security/ise/2-2/admin_guide/b_ise_admin_guide_22/b_ise_admin_guide_22_chapter_010100.html
Which two values are compared by the binary comparison function in authentication that is based on Active Directory?
A. user-presented certificate and a certificate stored in Active Directory
B. MS-CHAPv2 provided machine credentials and credentials stored in Active Directory
C. user-presented password hash and a hash stored in Active Directory
D. subject alternative name and the common name
D. subject alternative name and the common name
Verified
A is the correct answer. Always perform binary comparison—This option always performs the binary comparison of the client certificate to the certificate on account in the identity store (Active Directory or LDAP).
https://www.cisco.com/c/en/us/td/docs/security/ise/1-3/ISE-ADIntegrationDoc/b_ISE-ADIntegration.html
What happens when an internal user is configured with an external identity store for authentication, but an engineer uses the Cisco ISE admin portal to select an internal identity store as the identity source?
A. Authentication is redirected to the internal identity source.
B. Authentication is granted.
C. Authentication fails.
D. Authentication is redirected to the external identity source.
C. Authentication fails.
Verified
If an internal user is configured with an external identity store for authentication, while logging in to the ISE Admin portal, the internal user must select the external identity store as the Identity Source. Authentication will fail if Internal Identity Source is selected.
https://www.cisco.com/c/en/us/td/docs/security/ise/2-7/admin_guide/b_ise_27_admin_guide/b_ISE_admin_27_overview.html
Which two actions occur when a Cisco ISE server device administrator logs in to a device? (Choose two.)
A. The Cisco ISE server queries the internal identity store.
B. The device queries the external identity store.
C. The device queries the Cisco ISE authorization server.
D. The device queries the internal identity store.
E. The Cisco ISE server queries the external identity store.
C. The device queries the Cisco ISE authorization server.
E. The Cisco ISE server queries the external identity store.
C seems correct but not sure about E as it could be internal or external
ambiguous and needs further research
When a device administrator logs on to a device, the device queries the Cisco ISE server, which in turn queries an internal or external identity store, to validate the details of the device administrator. When the validation is done by the Cisco ISE server, the device informs the Cisco ISE server of the final outcome of each session or command authorization operation for accounting and auditing purposes.
https://www.cisco.com/c/en/us/td/docs/security/ise/2-7/admin_guide/b_ise_27_admin_guide/b_ISE_admin_27_device_admin.html#concept_9B1DD5A7AD9C445AAC764722E6E7D32A
An engineer is configuring a guest password policy and needs to ensure that the password complexity requirements are set to mitigate brute force attacks. Which two requirements should be included in this policy? (Choose two.)
A. active username limit
B. password expiration period
C. access code control
D. username expiration date
E. minimum password length
B. password expiration period
E. minimum password length
Verified
An engineer is using the low-impact mode for a phased deployment of Cisco ISE and is trying to connect to the network prior to authentication. Which access will be denied in this deployment?
A. DNS
B. DHCP
C. EAP
D. HTTP
D. HTTP
Not verified
An administrator needs to connect ISE to Active Directory as an external authentication source and allow the proper ports through the firewall. Which two ports should be opened to accomplish this task? (Choose two.)
A. TELNET: 23
B. HTTPS: 443
C. HTTP: 80
D. LDAP: 389
E. MSRPC:445
D. LDAP: 389
E. MSRPC:445
Verified
https://www.cisco.com/c/en/us/td/docs/security/ise/2-0/ise_active_directory_integration/b_ISE_AD_integration_2x.html
An engineer is implementing Cisco ISE and needs to configure 802.1X. The port settings are configured for port-based authentication. Which command should be used to complete this configuration?
A. aaa authentication dot1x default group radius
B. dot1x system-auth-control
C. authentication port-control auto
D. dot1x pae authenticator
B. dot1x system-auth-control
Verified
https://www.cisco.com/c/en/us/td/docs/routers/nfvis/switch_command/b-nfvis-switch-command-reference/802_1x_commands.html#wp6241455730