Tag Archives: organization

You are working on a functional bug in a tool used by your development organization. In your investigation,

You are working on a functional bug in a tool used by your development organization. In your investigation, you find that the tool is executed with a security policy file containing this grant.What action should you take? A. File a security bug against the tool referencing the excessive permission granted. B. Nothing, because it is an internal tool… Read More »

Your organization makes mlib.jar available to your cloud customers. While working on a code cleanup project

Your organization makes mlib.jar available to your cloud customers. While working on a code cleanup project for mlib.jar, you see this method by customers:What security measures should be added to this method so that it meets the requirements for a customer accessible method? A. Make enableService private. B. Create a method that validates the hostName and portNumber parameters… Read More »

Your organization makes mlib.jar available to your cloud customers. While working on a code cleanup project

Your organization makes mlib.jar available to your cloud customers. While working on a code cleanup project for mlib.jar, you see this method by customers:What security measures should be added to this method so that it meets the requirements for a customer accessible method? A. Create a method that validates the hostName and portNumber parameters before opening the socket.… Read More »

A Business Analyst joined in your organization and wanted to explore the database tools. Which statement

A Business Analyst joined in your organization and wanted to explore the database tools. Which statement provides access to data tools page for business analyst.When restoring/cloning the ADB, you must select a backup which is atleast___ hours/minutes old. A. 24 hrs B. 2 hrs C. 5 min D. 1 day Correct Answer: A

An organization s network recently experienced several significant outages due to device failures. The network administrator just moved the network devices to a new central data center, and packets are switched using labels. The administrator Is now implementing NSF on the network to reduce potential risk factors in the event of another outage. Which task must the administrator perform on each router as part of the process?

Refer to the exhibit. An organization s network recently experienced several significant outages due to device failures. The network administrator just moved the network devices to a new central data center, and packets are switched using labels. The administrator Is now implementing NSF on the network to reduce potential risk factors in the event of another outage. Which… Read More »

An organization wants to split their Cisco ISE deployment to separate the device administration functionalities from the main deployment. For this to work, the administrator must deregister any nodes that will become a part of the new deployment, but the button for this option is grayed out.Which configuration is causing this behavior?

A. All of the nodes are actively being synched. B. All of the nodes participate in the PAN auto failover. C. One of the nodes is an active PSN. D. One of the nodes is the Primary PAN. Answer: Option D. Explanation:  Reference: https://www.cisco.eom/c/en/us/td/docs/security/ise/2-4/admin_guide/Workflow/PDF/ b_ISE_admin_24_pdf.pdf Show AnswerDiscussion The post An organization wants to split their Cisco ISE deployment… Read More »

An organization wants to standardize the 802.1X configuration on their switches and remove static ACLs on the switch ports while allowing Cisco ISE to communicate to the switch what access to provide. What must be configured to accomplish this task?

A. dynamic access list within the authorization profile B. extended access-list on the switch for the client C. security group tag within the authorization policy D. port security on the switch based on the client’s information Answer: Option C. Explanation:  No answer description available for this question Show AnswerDiscussion The post An organization wants to standardize the 802.1X… Read More »

An organization is hosting a conference and must make guest accounts for several of the speakers attending. The conference ended two days early but the guest accounts are still being used to access the network. What must be configured to correct this?

A. Create an authorization rule denying sponsored guest access. B. Create an authorization rule denying guest access. C. Navigate to the Guest Portal and delete the guest accounts. D. Navigate to the Sponsor Portal and suspend the guest accounts. Answer: Option B. Explanation:  No answer description available for this question Show AnswerDiscussion The post An organization is hosting… Read More »

An organization is migrating its current guest network to Cisco ISE and has 1000 guest users in the current database. There are no resources to enter this information into the Cisco ISE database manually. What must be done to accomplish this task efficiently?

A. Use an XML file to change the existing format to match that of Cisco ISE. B. Use a CSV file to import the guest account. C. Use a JSON file to automate the migration of guest accounts. D. Use SQL to link the existing database to Cisco ISE. Answer: Option B. Explanation:  Reference: https://community.cisco.com/t5/network-access-control/ise-2-4-guest-user-import-csvtemplate-guest-type-and- state/td-p/3686005 Show AnswerDiscussion… Read More »