Tag Archives: authenticate

An administrator is adding a switch to a network that is running Cisco ISE and is only for IP Phones. The phones do not have the ability to authenticate via 802.1X. Which command is needed on each switch port for authentication?

A. dot1x system-auth-control B. enable bypass-MAC C. enable network-authentication D. mab Answer: Option D. Explanation:  No answer description available for this question Show AnswerDiscussion The post An administrator is adding a switch to a network that is running Cisco ISE and is only for IP Phones. The phones do not have the ability to authenticate via 802.1X. <br>Which… Read More »

An administrator is configuring Cisco ISE to authenticate users logging into network devices using TACACS+. The administrator is not seeing any of the authentication in the TACACS+ live logs. Which action ensures the users are able to log into the network devices?

A. Enable the device administration service in the PSN persona. B. Enable the device administration service in the Administration persona. C. Enable the session services in the Administration persona. D. Enable the service sessions in the PSN persona. Answer: Option B. Explanation:  Reference: https://www.cisco.eom/c/en/us/td/docs/security/ise/2-4/admin_guide/ b_ISE_admin_guide_24/m_ise_tacacs_device_admin.html Show AnswerDiscussion The post An administrator is configuring Cisco ISE to authenticate users… Read More »

What must be configured on the Global Configuration page of the WLC for an access point to use 802.1x to authenticate to the wired infrastructure?

A. local access point credentials B. RADIUS shared secret C. TACACS server IP address D. supplicant credentials Answer: Option B. Explanation:  No answer description available for this question. Show AnswerDiscussion The post What must be configured on the Global Configuration page of the WLC for an access point to use 802.1x to authenticate to the wired infrastructure? appeared… Read More »

An IT team is growing quickly and needs a solution for management device access. The solution must authenticate users from an external repository instead of the current local on the WLC, and it must also identify the user and determine what level of access users should have. Which protocol do you recommend to achieve these goals?

A. network policy server B. RADIUS C. TACACS+ D. LDAP Answer: Option C. Explanation:  No answer description available for this question. Show AnswerDiscussion The post An IT team is growing quickly and needs a solution for management device access. The solution must authenticate users from an external repository instead of the current local on the WLC, and it… Read More »

An engineer booted a new switch and applied this configuration via the console port. Which additional configuration must be applied to allow administrators to authenticate directly to enable privilege mode via Telnet using a local username and password?

Refer to the exhibit. An engineer booted a new switch and applied this configuration via the console port. Which additional configuration must be applied to allow administrators to authenticate directly to enable privilege mode via Telnet using a local username and password? Answer: Option B. Explanation:  No answer description available for this question. Show AnswerDiscussion The post An… Read More »