Which use case validates a change of authorization?
C
Reference:
https://www.cisco.com/c/en/us/td/docs/security/ise/1-2/user_guide/ise_user_guide/ise_prof_pol.html
Which default endpoint identity group does an endpoint that does not match any profile in Cisco ISE become a member of?
B
Reference:
https://www.cisco.com/en/US/docs/security/ise/1.0/user_guide/ise10_man_identities.html
What service can be enabled on the Cisco ISE node to identify the types of devices connecting to a network?
A
Reference:
https://www.cisco.com/c/en/us/td/docs/security/ise/2-1/admin_guide/b_ise_admin_guide_21/b_ise_admin_guide_20_chapter_010100.html
Which two probes must be enabled for the ARP cache to function in the Cisco ISE profiling service so that a user can reliably bind the IP addresses and MAC addresses of endpoints? (Choose two.)
CD
Reference:
https://www.cisco.com/c/en/us/td/docs/security/ise/2-1/admin_guide/b_ise_admin_guide_21/b_ise_admin_guide_20_chapter_010100.html
Which two events trigger a CoA for an endpoint when CoA is enabled globally for ReAuth? (Choose two.)
DE
What is a requirement for Feed Service to work?
B
What is a method for transporting security group tags throughout the network?
B
An engineer is configuring a virtual Cisco ISE deployment and needs each persona to be on a different node.
Which persona should be configured with the largest amount of storage in this environment?
A
In a standalone Cisco ISE deployment, which two personas are configured on a node? (Choose two.)
CE
A network engineer must enforce access control using special tags, without re-engineering the network design.
Which feature should be configured to achieve this in a scalable manner?
C
Reference:
https://www.cisco.com/c/dam/en/us/solutions/collateral/enterprise-networks/trustsec/branch-segmentation.pdf