Tag Archives: identity

Which OCI Identity and access management capability helps you to organize multiple users into teams?

Which OCI Identity and access management capability helps you to organize multiple users into teams? A. Policies B. Groups C. Dynamic Groups D. Users Correct Answer: B IAM Group is A collection of users who all need the same type of access to a particular set of resources or compartment.IAM DYNAMIC GROUP is A special type of group… Read More »

Which of the following is INVALID regarding the Oracle Cloud Infrastructure (OCI) Identity Domains?

Which of the following is INVALID regarding the Oracle Cloud Infrastructure (OCI) Identity Domains? A. Identity domains are created inside of a compartment. B. An identity domain represents users and groups in OCI. C. Each OCI account includes a default identity domain. D. Customers cannot create additional identity domains. Correct Answer: B

Which component of the Oracle Cloud Infrastructure (OCI) Identity and Access Management (IAM) service

Which component of the Oracle Cloud Infrastructure (OCI) Identity and Access Management (IAM) service can be used for controlling access to resources for authenticated principals? A. Compartment B. Policy C. Network Source D. Group Correct Answer: B

A service binding provides communication over a private overlay network within your Identity domain between

A service binding provides communication over a private overlay network within your Identity domain between Oracle Application Container Cloud Service and the other Oracle Cloud service. In which metadata file/files can you configure Service Bindings?Response: A. config.yml B. deployment.json C. app.yml D. manifest.json Correct Answer: D

A service binding provides communication over a private overlay network within your Identity domain between

A service binding provides communication over a private overlay network within your Identity domain between Oracle Application Container Cloud Service and the other Oracle Cloud service. In which metadata file/files can you configure Service Bindings?Response: A. app.yml B. deployment.json C. config.yml D. manifest.json Correct Answer: D

In a Cisco SD-Access solution, what is the role of the Identity Services Engine?

A. It is leveraged for dynamic endpoint to group mapping and policy definition. B. It provides GUI management and abstraction via apps that share context. C. It is used to analyze endpoint to app flows and monitor fabric status. D. It manages the LISP EID database. Answer: Option A. Explanation:  No answer description available for this question Show… Read More »

A network administrator must configure endpoints using an 802.1X authentication method with EAP identity certificates that are provided by the Cisco ISE. When the endpoint presents the identity certificate to Cisco ISE to validate the certificate, endpoints must be authorized to connect to the network. Which EAP type must be configured by the network administrator to complete this task?

A. EAP-TTLS B. EAP-TLS C. EAP-FAST D. EAP-PEAP-MSCHAPv2 Answer: Option B. Explanation:  Reference: https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/214975configure-eap-tls- authentication-with-is.html Show AnswerDiscussion The post A network administrator must configure endpoints using an 802.1X authentication method with EAP identity certificates that are provided by the Cisco ISE. When the endpoint presents the identity certificate to Cisco ISE to validate the certificate, endpoints must be… Read More »

A Cisco ISE administrator needs to ensure that guest endpoint registrations are only valid for 1 day. When testing the guest policy flow, the administrator sees that the Cisco ISE does not delete the endpoint in the GuestEndpoints identity store after 1 day and allows access to the guest network after that period. Which configuration is causing this problem?

A. The Guest Account Purge Policy is set to 15 days. B. The length of access is set to 7 days in the Guest Portal Settings. C. The Endpoint Purge Policy is set to 30 days for guest devices. D. The RADIUS policy set for guest access is set to allow repeated authentication of the same device. Answer:… Read More »