Home
36.
Which rights and permissions are required for the account used to join Cisco ISE to the Active Directory domain?
  • A.
    Search Active Directory, Remove workstation from domain, Change passwords
  • B.
    Write to Active Directory, Add workstation to organizational unit, Read properties of computer objects
  • C.
    Search Active Directory, Add workstation to domain, Set attributes on the new machine account
  • D.
    Write to Active Directory, Add workstation to domain, Read properties of computer objects
  • Answer & Explanation
  • Report
Answer : [C]
Explanation :
The permissions needed to join ISE to AD are Search Active Directory (to see whether ISE machine account already exists), Add workstation to domain (if it does not already exist), and Set attributes on the new machine account (OS type and version—optional).
Report
Name Email  
37.
Which CLI command lists all the ISE processes and their statuses?
  • A.
    show status ise
  • B.
    show application status ise
  • C.
    show application status
  • D.
    show version
  • Answer & Explanation
  • Report
Answer : [B]
Explanation :
The show application status ise command lists all the ISE processes and their statuses.
Report
Name Email  
38.
Which two functions does a certificate fulfill when used with HTTPS and EAPoverLAN?
  • A.
    Authenticates the server to the client, and the encryption method is embedded in the transform-set field within the certificate.
  • B.
    Identifies the client to the NAD and is used as the basis for the encrypted transport between the client and the NAD.
  • C.
    Authenticates the server to the client and is used as the basis for the encrypted transport between the client and server.
  • D.
    Authenticates the client to the NAD, and the encryption method is embedded in the transformset field within the certificate.
  • Answer & Explanation
  • Report
Answer : [C]
Explanation :
In both HTTPS and TLS connections, certificates are used to authenticate the server to client and act as the basis for the encrypted transport between the client and the server.
Report
Name Email  
39.
True or False? When submitting a certificate signing request (CSR), the CSR and the private key are sent to the signing certificate authority (CA), so the CA can sign the key-pair.
  • A.
    True
  • B.
    False
  • Answer & Explanation
  • Report
Answer : [B]
Explanation :
Only the CSR is submitted to the signing CA. The private key should be backed up but never given out to a third party.
Report
Name Email  
40.
True or False? Settings such as RADIUS shared secret keys and SNMP strings can be set on a per Network Device Group (NDG) level.
  • A.
    True
  • B.
    False
  • Answer & Explanation
  • Report
Answer : [B]
Explanation :
Settings such as RADIUS shared secret keys and SNMP strings can be set only on a per-NAD basis.
Report
Name Email