The information security policy of your organization requires that ports should remain administratively Up. Which selection represents the best practice for an 802.1X-enabled port that is configured to allow only one host to authenticate on the port?
Answer : B
Which three statements about hosts moving from port to port on the same switch that is configured for 802.1X are true? (Choose three.)
Answer : A,B,E
What must be configured on a Microsoft Windows 7 host to enable the Microsoft 802.1X supplicant for wired networks?
Answer : D
Which three selections are valid model numbers for Cisco ISE hardware appliances?
(Choose three)
Answer : A,B,E
What is the purpose of the ip device-tracking command on a Cisco Catalyst switch?
Answer : D
Which two choices are valid components of a Cisco TrustSec wireless infrastructure solution? (Choose two.)
Answer : C,F
Which section of the 802.1X standard cites other 802 standards needed to Wry understand the scope of 802.1X?
Answer : B
Which section of the 802.1X standard includes use cases?
Answer : B
Which two statements are true regarding communication from the authenticator to the authentication server (Cisco ISE)? (Choose two.)
Answer : A,B
Which four selections below describe valid Cisco ISE Personas? (Choose four.)
Answer : C,E,F,G
Which statement is true regarding the initiation of an 802.1X authentication exchange?
Answer : A
Which protocol used to communicate between the authenticator and authentication server?
Answer : A
Which two choices are drivers of IEEE 802.1X adoption? (Choose two.)
Answer : B,E
Which EAP method requires a digital certificate on the client?
Answer : E
Which two elements must you configure on a Cisco Wireless LAN Controller to allow Cisco
ISE to authenticate wireless users? (Choose two.)
Answer : A,E