Home
6.
What are two types of identities used in Cisco Identity Service Engine?
  • A.
    SSID
  • B.
    MAC address
  • C.
    Username
  • D.
    IP address
  • Answer & Explanation
  • Report
Answer : [B, C]
Explanation :
An identity is a representation of who a user or device is. Cisco ISE uses an endpoint’s MAC address to uniquely identify that endpoint. A username is one method of uniquely identifying an end user. Although SSIDs and IP addresses can be used as conditions or attributes in ISE policies, they are not identities.
Report
Name Email  
7.
What are the two general types of identity stores used by Cisco ISE?
  • A.
    Temporary
  • B.
    External
  • C.
    Internal
  • D.
    Permanent
  • Answer & Explanation
  • Report
Answer : [B][C]
Explanation :
Cisco ISE can use identities stored in a database that resides as part of the ISE application itself; these are known as internal identity stores. Examples are the GUEST user identity store and the endpoints identity store. Identities can live outside of ISE, such as Active Directory, and these are known as external identity stores.
Report
Name Email  
8.
Cisco ISE internal identity stores are used to authentication which two of the following?
  • A.
    Endpoints
  • B.
    AD security groups
  • C.
    RADIUS
  • D.
    Users
  • Answer & Explanation
  • Report
Answer : [A, D]
Explanation :
ISE has two different types of internal identity stores: users and endpoints. The user identity stores hold identities for interactive users, such as guests or employees. These have attributes such as passwords for the authentication of the user. Endpoints have a different kind of identity. Because they don’t interact with an authentication in most cases, their identities can often just be their MAC addresses.
Report
Name Email  
9.
Which identity store attributes can be used in an ISE authorization policy? (Choose two.)
  • A.
    User
  • B.
    Time
  • C.
    Accounting
  • D.
    Machine
  • Answer & Explanation
  • Report
Answer : [A, D]
Explanation :
Either a user or a machine (endpoint) can be authorized for network access. Sometimes it is possible to authorize based on the identity or attributes of both the user and the machine.
Report
Name Email  
10.
What is an individual identity store called?
  • A.
    Authentication source
  • B.
    Identity database
  • C.
    Identity source
  • D.
    Authentication database
  • Answer & Explanation
  • Report
Answer : [C]
Explanation :
The identity store is known as an identity source or an information source. The data contained in the identity store is used for authentication and authorization purposes.
Report
Name Email