Tag Archives: guest

Which element enables communication between guest VMs within a virtualized environment?

A. hypervisor B. virtual router C. vSwitch D. pNIC Answer: Option C. Explanation:  Each VM is provided with a virtual NIC (vNIC) that is connected to the virtual switch. Multiple vNICs can connect to a single vSwitch, allowing VMs on a physical host to communicate with one another at layer 2 without having to go out to a… Read More »

What is needed to configure wireless guest access on the network?

A. endpoint already profiled in ISE B. WEBAUTH ACL for redirection C. Captive Portal Bypass turned on D. valid user account in Active Directory Answer: Option C. Explanation:  No answer description available for this question Show AnswerDiscussion The post What is needed to configure wireless guest access on the network? appeared first on Majanto.

Which two methods should a sponsor select to create bulk guest accounts from the sponsor portal? (Choose two.)

A. Known B. Monthly C. Daily D. Imported E. Random Answer: Option A, E. Explanation:  Reference: https://www.cisco.com/c/en/us/td/docs/security/ise/1-3/sponsor_guide/b_spons_SponsorPortalUserGuide_13/b_spons_SponsorPortalUserGuide_13_chapter_01.html Show AnswerDiscussion The post Which two methods should a sponsor select to create bulk guest accounts from the sponsor portal? (Choose two.) appeared first on Majanto.

An engineer is configuring a guest password policy and needs to ensure that the password complexity requirements are set to mitigate brute force attacks. Which two requirements should be included in this policy? (Choose two.)

A. active username limit B. password expiration period C. access code control D. username expiration date E. minimum password length Answer: Option B, E. Explanation:  No answer description available for this question Show AnswerDiscussion The post An engineer is configuring a guest password policy and needs to ensure that the password complexity requirements are set to mitigate brute… Read More »

A company manager is hosting a conference. Conference participants must connect to an open guest SSID and only use a preassigned code that they enter into the guest portal prior to gaining access to the network. How should the manager configure Cisco ISE to accomplish this goal?

A. Create logins for each participant to give them sponsored access. B. Create entries in the guest identity group for all participants. C. Create an access code to be entered in the AUP mode. D. Create a registration code to be entered on the portal splash page. Answer: Option C. Explanation:  Reference: https://www.cisco.com/c/en/us/td/docs/security/ise/2-6/admin_guide/ b_ISE_26_admin_guide/b_ISE_admin_26_guest.html Show AnswerDiscussion The post… Read More »

A Cisco ISE administrator needs to ensure that guest endpoint registrations are only valid for 1 day. When testing the guest policy flow, the administrator sees that the Cisco ISE does not delete the endpoint in the GuestEndpoints identity store after 1 day and allows access to the guest network after that period. Which configuration is causing this problem?

A. The Guest Account Purge Policy is set to 15 days. B. The length of access is set to 7 days in the Guest Portal Settings. C. The Endpoint Purge Policy is set to 30 days for guest devices. D. The RADIUS policy set for guest access is set to allow repeated authentication of the same device. Answer:… Read More »

A network administrator is setting up wireless guest access and has been unsuccessful in testing client access. The endpoint is able to connect to the SSID but is unable to gain access to the guest network through the guest portal. What must be done to identify the problem?

A. Use traceroute to ensure connectivity. B. Use context visibility to verify posture status. C. Use the identity group to validate the authorization rules. D. Use the endpoint ID to execute a session trace. Answer: Option D. Explanation:  Reference: https://www.cisco.com/c/en/us/td/docs/security/ise/1-3/admin_guide/b_ise_admin_guide_13/b_ise_admin_guide_sample_chapter_011001.html#concept_87916A77E87745 Show AnswerDiscussion The post A network administrator is setting up wireless guest access and has been unsuccessful in… Read More »

An organization is hosting a conference and must make guest accounts for several of the speakers attending. The conference ended two days early but the guest accounts are still being used to access the network. What must be configured to correct this?

A. Create an authorization rule denying sponsored guest access. B. Create an authorization rule denying guest access. C. Navigate to the Guest Portal and delete the guest accounts. D. Navigate to the Sponsor Portal and suspend the guest accounts. Answer: Option B. Explanation:  No answer description available for this question Show AnswerDiscussion The post An organization is hosting… Read More »

An organization is migrating its current guest network to Cisco ISE and has 1000 guest users in the current database. There are no resources to enter this information into the Cisco ISE database manually. What must be done to accomplish this task efficiently?

A. Use an XML file to change the existing format to match that of Cisco ISE. B. Use a CSV file to import the guest account. C. Use a JSON file to automate the migration of guest accounts. D. Use SQL to link the existing database to Cisco ISE. Answer: Option B. Explanation:  Reference: https://community.cisco.com/t5/network-access-control/ise-2-4-guest-user-import-csvtemplate-guest-type-and- state/td-p/3686005 Show AnswerDiscussion… Read More »