Which three types of security?
ClearPass Onboard can be configured for which three types of security? (Choose three.) A. SSL-VPN B. EAP-RADIUS C. EAP-TLS D. EAP-PEAP E. Personal PSK
ClearPass Onboard can be configured for which three types of security? (Choose three.) A. SSL-VPN B. EAP-RADIUS C. EAP-TLS D. EAP-PEAP E. Personal PSK
What is the primary use of the ClearPass Onboard Application? A. Connect company-issued devices. B. Configure network profiles for BYOD Devices. C. Enforce endpoint device profiling. D. Provide for system validation of client posture.
What is the purpose of ClearPass Onboarding? A. to remotely control devices B. to provision and revoke device credentials C. to control IoT device access D. to manage firmware and patches
What must be configured when a network administrator wants to configure RADIUS authentication with a network access device (NAD)? (Choose two.) A. The NAD and ClearPass must be configured for NTP time synchronization. B. The NAD must be configured for…
When using an Active Directory authentication source, you must configure a Bind DN. Which two statements are true about Bind DN? (Choose two.) A. The Bind DN needs to be a Service Account Type. B. The Bind DN must be…
An administrator wants to specify the ClearPass role named “BYOD” for phones and tablets and the “CORP” role for laptops. How should the administrator configure ClearPass to specify the roles by device type? (Choose two.) A. Create the roles and…
Refer to the exhibit. Based on the self-registration customization, which statements are true? (Choose two.) A. The client’s browser will submit the credentials in plain text to the controllers. B. The user will automatically be logged in when they submit…
An organization wants to ensure a client’s antivirus is installed and up-to-date prior to allowing guest network access. Which ClearPass feature can be used to meet the organization’s requirement? A. OnGuard with Persistent Agent B. ClearPass Onboard with sponsorship C.…
Which enforcement actions are used in ClearPass to bounce a client? (Choose two.) A. Filter-ID Based B. Agent Enforcement C. VLAN Enforcement D. RADIUS CoA E. Session Notification
Which three items can be obtained from device profiling? (Choose three.) A. Device Location B. Device Type C. Device Family D. Device Category E. Device Health