Question 6 of 49

Which two statements are true regarding Cisco ISE? (Choose two.)
Answer

Suggested Answer

The suggested answer is B, C.

Cisco ISE's log retention is determined by the available disk space. Additionally, Cisco ISE supports IPv6 downloadable ACLs, making these two statements true.

Community Votes3 votes
BCSuggested
67%
AB
33%
Question 7 of 49

Which Cisco product were incorporated into Cisco ISE between ISE releases 2.0 and 2.3?
Answer

Suggested Answer

The suggested answer is C.

Cisco ACS was integrated into Cisco ISE between the releases 2.0 and 2.3. This integration aimed to consolidate network security functions, incorporating ACS's functionality into ISE to offer a unified solution for network access control.

Community Votes

No votes yet

Join the discussion to cast yours

Question 8 of 49

Which two Cisco ISE use cases typically involve the highest level of implementation complexity? (Choose two.)
Answer

Suggested Answer

The suggested answer is B, E.

The use cases involving the highest level of implementation complexity in Cisco ISE are typically Software-defined access and Software-defined segmentation. These solutions require comprehensive planning, configurations, and often involve the integration of various technologies and policies within an organization's infrastructure.

Community Votes

No votes yet

Join the discussion to cast yours

Question 9 of 49

How would Cisco ISE handle authentication for your printer that does not have a supplicant?
Answer

Suggested Answer

The suggested answer is C.

For network devices like printers that do not support a supplicant, Cisco ISE handles authentication using MAC Authentication Bypass (MAB). MAB allows devices to be authenticated based on their MAC address rather than requiring 802.1X credentials or web-based logins, which are not feasible for such devices.

Community Votes3 votes
CSuggested
100%
Question 10 of 49

Which three ways are SD-Access and ACI Fabric similar? (Choose three.)
Answer

Suggested Answer

The suggested answer is A, B, D.

SD-Access and ACI Fabric share similarities in that they both use overlays to abstract the physical network, which simplifies network design and operation. They also both utilize Virtual Network IDs (VNIDs) to segment the network logically, allowing for isolation and multi-tenancy within the network. Finally, they both use group policies to manage and apply policies to groups of users or devices dynamically based on their attributes, enhancing security and manageability.

Community Votes8 votes
ABDSuggested
100%