350-701 Exam QuestionsBrowse all questions from this exam

350-701 Exam - Question 250


In which two ways does Easy Connect help control network access when used with Cisco TrustSec? (Choose two.)

Show Answer
Correct Answer: BD

Easy Connect aids in controlling network access with Cisco TrustSec by allowing for the assignment of Security Group Tags without the need for 802.1x configuration on the switch or endpoint. This simplifies network access control and segmentation. Additionally, it allows managed endpoints that authenticate to Active Directory to be mapped to Security Groups through PassiveID, which enables granular access policies based on identity and role rather than just IP or MAC addresses.

Discussion

11 comments
Sign in to comment
Sarbi
Aug 27, 2021

Easy Connect simplifies network access control and segmentation by allowing the assignment of Security Group Tags to endpoints without requiring 802.1X on those endpoints, whether using wired or wireless connectivity. Active Directory logins are used to map user information onto network connections, which are then used for authorizing users on the network even when the Identity Services Engine (ISE) is not involved in the authentication process. Consequently, this authorization method only supports devices that authenticate with a Domain Controller. Easy Connect can also be used as a backup authentication method to 802.1X, to ensure that managed assets are classified even when an 802.1X supplicant is not correctly configured. This can dramatically reduce help desk calls

sull3y
Feb 9, 2023

B. It allows for the assignment of Security Group Tags and does not require 802.1x to be configured on the switch or the endpoint. D. It allows for managed endpoints that authenticate to AD to be mapped to Security Groups (PassiveID). Easy Connect helps control network access by allowing for the assignment of Security Group Tags (SGTs) and mapping managed endpoints that authenticate to AD to Security Groups (PassiveID). This enables organizations to enforce granular access policies based on the endpoint's identity and role, rather than just its IP address or MAC address. The use of SGTs and PassiveID helps simplify the deployment of TrustSec and reduces the complexity of network access control, as it does not require the configuration of 802.1x on the switch or endpoint.

madboy2Options: BD
Mar 23, 2025

Cisco Easy Connect is a feature in Cisco TrustSec that simplifies network access control by automatically assigning Security Group Tags (SGTs) without requiring 802.1X authentication on switches or endpoints. Why these answers? B. Easy Connect allows for the assignment of Security Group Tags and does not require 802.1X to be configured on the switch or the endpoint. Removes the need for complex 802.1X configurations while still enforcing TrustSec policies. Uses PassiveID (Passive Identity Mapping) to automatically assign SGTs based on Active Directory authentication without requiring endpoint authentication via 802.1X. D. Easy Connect allows for managed endpoints that authenticate to AD to be mapped to Security Groups (PassiveID). When a user logs into a domain-joined device, Easy Connect captures login events from Active Directory and assigns an SGT to the endpoint dynamically. This simplifies access control while ensuring TrustSec policies are still enforced.

XvidalXOptions: AD
Mar 10, 2024

A CORRECT - EASYconenct integrate with AD to gaing visibility B- incorrect - SWITCHES NEED 802.1x configuration , Endpoints DOES not C- Does not create dashboards D - its correct - it is the main purpose E - incorrect - it is not about posture needs

Demon_Queen_Velverosa
Sep 25, 2024

No it’s for when 802.1x is not available as AD don’t need 802.1x as it can be used as an alternate.

iluvmicrosoft
Mar 26, 2024

https://community.cisco.com/t5/security-knowledge-base/ise-easy-connect/ta-p/3638861 MAB or 802.1X (required for ISE to stitch RADIUS session with PassiveID info) You can configure NAD w MAB, so technically 802.1x is not a requirement??

Rododendron2Options: AD
May 13, 2024

switch needs to have dot1x setup, end point does not

Rododendron2
Jun 19, 2024

After I again reviewed documentation, BD is right, Easyconnect does not required dot1x on switch and integrates with TrustSec on ISE as Passive ID

Demon_Queen_Velverosa
Sep 25, 2024

Yes the answer is B and D

Demon_Queen_Velverosa
Sep 25, 2024

Yes the answer is B and D

Jamesy
Sep 23, 2022

D & E in my opinion. Cheers

Emlia1Options: BD
Jan 9, 2023

I prefer B, D asy Connect simplifies network access control and segmentation by allowing the assignment of Security Group Tags to endpoints without requiring 802.1X on those endpoints, whether using wired or wireless connectivity. Reference: https://www.cisco.com/c/dam/en/us/solutions/collateral/enterprise-networks/trustsec/trustsecwith-easy- connect-configuration-guide.p

haiderzaid
Apr 4, 2023

why not B C since PassiveID can be used independently without easy connect feature??

haiderzaid
Apr 4, 2023

im wrong C does not describe the way in which Easy Connect helps control network access so I will go for BD

Demon_Queen_Velverosa
Sep 25, 2024

802.1x may not be avalible and can be used as an alternate as it uses Active Directory instead and f 802.1x We don’t care about a dashboard Answer BD

Demon_Queen_VelverosaOptions: BD
Oct 12, 2024

BD as i made a comment as 802.1x may not be avalible

ITVIOptions: BD
Apr 9, 2025

B & D is my choice based on the links folks here have provided, do your research.