Which EAP type requires the use of device certificates?
Which EAP type requires the use of device certificates? A. EAP-TLS B. EAP-FAST C. EAP-SSL D. PEAP E. LEAP
Which EAP type requires the use of device certificates? A. EAP-TLS B. EAP-FAST C. EAP-SSL D. PEAP E. LEAP
An engineer is deploying EAP-TLS as the authentication mechanism for an 802.1X-enabled wireless network. Which network device is responsible for applying the digital signature to a certificate to ensure that the certificate is trusted and valid? A. supplicant B. CA…
A customer wants to allow employees to easily onboard their devices to the wireless network. Which process can be configured on Cisco ISE to support this requirement? A. self-registration guest portal B. client provisioning C. native supplicant provisioning D. local…
An engineer is considering an MDM integration with Cisco ISE to assist with security for lost devices. Which two functions of MDM increase security for lost devices that access data from the network? (Choose two.) A. PIN enforcement B. jailbreak/root…
An engineer must change the wireless authentication from WPA2-Personal to WPA2-Enterprise. Which three requirements are necessary? (Choose three.) A. EAP B. 802.1X C. RADIUS D. pre-shared key E. 802.11u F. fast secure roaming G. 802.11i
A network engineer is implementing a wireless network and is considering deploying a single SSID for device onboarding. Which option is a benefit of using dual SSIDs with a captive portal on the onboard SSID compared to a single SSID…
How many mobility peers can a Cisco Catalyst 3850-MC node have? A. 8 B. 2 C. 6 D. 16 E. 4
Which client roam is considered the fastest in a wireless deployment using Cisco IOS XE mobility controllers and mobility agents? A. Roam within stack members B. Inter-SPG roam C. Interdomain roam D. Intermobility roam E. Intra-SPG roam
During the EAP process and specifically related to the logon session, which encrypted key is sent from the RADIUS server to the access point? A. WPA key B. encryption key C. session key D. shared-secret key
A customer is concerned about DOS attacks from a neighboring facility. Which feature can be enabled to help alleviate these concerns and mitigate DOS attacks on a WLAN? A. PMF B. peer-to-peer blocking C. Cisco Centralized Key Management D. split…