Tag Archives: authorization

Consider this method declaration: (Exhibit) A) "SET SESSION AUTHORIZATION " + user B) "SET SESSION AUTHORIZATION

Consider this method declaration:A) “SET SESSION AUTHORIZATION ” + userB) “SET SESSION AUTHORIZATION ” + stmt.enquoteIdentifier(user)Is A or B the correct replacement for <EXPRESSION> and why? A. B, because all values provided by the calling code should be enquoted. B. A, because it is unnecessary to enclose identifiers in quotes. C. A, because it sends exactly the value… Read More »

Which use case validates a change of authorization?

A. An endpoint that is disconnected from the network is discovered. B. Endpoints are created through device registration for the guests. C. An endpoint profiling policy is changed for authorization policy. D. An authenticated, wired EAP-capable endpoint is discovered. Answer: Option C. Explanation:  Reference: https://www.cisco.com/c/en/us/td/docs/security/ise/1-2/user_guide/ise_user_guide/ise_prof_pol.html Show AnswerDiscussion The post Which use case validates a change of authorization? appeared… Read More »

What sends the redirect ACL that is configured in the authorization profile back to the Cisco WLC?

A. State attribute B. Class attribute C. Event D. Cisco-av-pair Answer: Option D. Explanation:  Reference: https://community.cisco.com/t5/network-access-control/ise-airespace-acl-wlc-problem/td-p/2110491 Show AnswerDiscussion The post What sends the redirect ACL that is configured in the authorization profile back to the Cisco WLC? appeared first on Majanto.

When configuring an authorization policy, an administrator cannot see specific Active Directory groups present in their domain to be used as a policy condition. However, other groups that are in the same domain are seen. What is causing this issue?

A. Cisco ISE’s connection to the AD join point is failing. B. Cisco ISE only sees the built-in groups, not user created ones. C. The groups are not added to Cisco ISE under the AD join point. D. The groups are present but need to be manually typed as conditions. Answer: Option C. Explanation:  Reference: https://www.cisco.Com/c/en/us/td/docs/security/ise/2-3/ise_active_directory_integration/ b_ISE_AD_integration_2x.html Show… Read More »

An engineer is creating a new TACACS+ command set and cannot use any show commands after logging into the device with this command set authorization. Which configuration is causing this issue?

Refer to the exhibit. An engineer is creating a new TACACS+ command set and cannot use any show commands after logging into the device with this command set authorization. Which configuration is causing this issue? A. The command set is allowing all commands that are not in the command list. B. The wildcard command listed is in the… Read More »

Drag and drop the description from the left onto the protocol on the right that is used to carry out system authentication, authorization, and accounting.

Drag and drop the description from the left onto the protocol on the right that is used to carry out system authentication, authorization, and accounting. Select and Place: Answer: Explanation:  No answer description available for this question Show AnswerDiscussion The post Drag and drop the description from the left onto the protocol on the right that is used… Read More »

An administrator is manually adding a device to a Cisco ISE identity group to ensure that it is able to access the network when needed without authentication Upon testing, the administrator notices that the device never hits the correct authorization policy line using the condition EndPoints LogicalProfile EQUALS static_list Why is this occurring?

A. The dynamic logical profile is overriding the statically assigned profile B. The device is changing identity groups after profiling instead ot remaining static C. The logical profile is being statically assigned instead of the identity group D. The identity group is being assigned instead of the logical profile Answer: Option C. Explanation:  No answer description available for… Read More »

A developer wants to create a room named cisco through Webex API. The developer prepares the request by putting an API token inside the authorization header; however, the given HTTP call returns error code 400. How must the call parameters be changed to ensure a valid response?

Refer to the exhibit. A developer wants to create a room named cisco through Webex API. The developer prepares the request by putting an API token inside the authorization header; however, the given HTTP call returns error code 400. How must the call parameters be changed to ensure a valid response? A. Replace the team body parameter with… Read More »

What is the primary difference between AAA authentication and authorization?

A. Authentication identifies and verifies a user who is attempting to access a system, and authorization controls the tasks the user can perform. B. Authentication controls the system processes a user can access, and authorization logs the activities the user initiates. C. Authentication verifies a username and password, and authorization handles the communication between the authentication agent and… Read More »