Cisco 650-472 - Introduction to 802.1X Operations for Cisco Security Professionals Exam Exam
Page: 1 / 14
Total 69 questions
Question #1 (Topic: )
Which two statements represent good use cases for Wake on LAN? (Choose two.)
A. WoL can be used to power-up hosts for on-demand PXE booting.
B. WoL can be used to power-up hosts for after-hours operating system updates and application patching.
C. WoL can be used to power-up hosts to access the IPMI.
D. WoL can be used to save electricity by powering down underused servers and desktops.
Answer: A,B
Question #2 (Topic: )
Which two choices are valid methods of authorizing a wired supplicant? (Choose two.)
A. EAP-FAST
B. VLAN assignment
C. dACL
D. EAPOL
E. RADIUS
Answer: B,C
Question #3 (Topic: )
Which two statements about MACsec security are true? (Choose two.)
A. MACsec is an IEEE standard that is defined by 802.3AE.
B. MACsec leverages an 802.1X EAP framework to negotiate the MACsec Key Agreement.
C. MACsec is an IETF standard that is defined by RFC 4501.
D. MACsec can negotiate a MACsec Key Agreement without 802.1X.
E. MACsec is an IETF standard that is defined by RFC 4505.
F. MACsec is an IEEE standard that is defined by 802.1AE.
Answer: B,F
Question #4 (Topic: )
Which statement correctly defines a persona?
A. A Cisco ISE node can be configured as a primary or backup persona.
B. Persona refers to collections of services running on a Cisco ISE node.
C. A Cisco ISE node can be configured as a wired or wireless persona.
D. Persona relates to the collection of 802.1X services configured on a Cisco Catalyst switch.
E. Persona refers to the collection of EAP methods available to a supplicant.
F. A Cisco ISE node can be configured as a standalone or distributed persona.
Answer: B
Question #5 (Topic: )
Which two EAP methods are examples of challenge-response methods? (Choose two.)
A. EAP-TLS
B. PEAP
C. EAP-FAST
D. LEAP
E. EAP-MD5
Answer: D,E