Tag Archives: portal

A leading insurancefirm is hosting its customer portal in Oracle Cloud Infrastructure (OCI) Container

A leading insurancefirm is hosting its customer portal in Oracle Cloud Infrastructure (OCI) Container Engine for Kubernetes with an OCI Autonomous Database. Their support team discovered a lot of SQL injection attempts and cross-site scripting attacks to the portal, which isstarting to affect the production environment.What should they implement to mitigate this attack? A. Network Security Lists B.… Read More »

Which two methods should a sponsor select to create bulk guest accounts from the sponsor portal? (Choose two.)

A. Known B. Monthly C. Daily D. Imported E. Random Answer: Option A, E. Explanation:  Reference: https://www.cisco.com/c/en/us/td/docs/security/ise/1-3/sponsor_guide/b_spons_SponsorPortalUserGuide_13/b_spons_SponsorPortalUserGuide_13_chapter_01.html Show AnswerDiscussion The post Which two methods should a sponsor select to create bulk guest accounts from the sponsor portal? (Choose two.) appeared first on Majanto.

A company manager is hosting a conference. Conference participants must connect to an open guest SSID and only use a preassigned code that they enter into the guest portal prior to gaining access to the network. How should the manager configure Cisco ISE to accomplish this goal?

A. Create logins for each participant to give them sponsored access. B. Create entries in the guest identity group for all participants. C. Create an access code to be entered in the AUP mode. D. Create a registration code to be entered on the portal splash page. Answer: Option C. Explanation:  Reference: https://www.cisco.com/c/en/us/td/docs/security/ise/2-6/admin_guide/ b_ISE_26_admin_guide/b_ISE_admin_26_guest.html Show AnswerDiscussion The post… Read More »

A network administrator is setting up wireless guest access and has been unsuccessful in testing client access. The endpoint is able to connect to the SSID but is unable to gain access to the guest network through the guest portal. What must be done to identify the problem?

A. Use traceroute to ensure connectivity. B. Use context visibility to verify posture status. C. Use the identity group to validate the authorization rules. D. Use the endpoint ID to execute a session trace. Answer: Option D. Explanation:  Reference: https://www.cisco.com/c/en/us/td/docs/security/ise/1-3/admin_guide/b_ise_admin_guide_13/b_ise_admin_guide_sample_chapter_011001.html#concept_87916A77E87745 Show AnswerDiscussion The post A network administrator is setting up wireless guest access and has been unsuccessful in… Read More »

A customer wants to set up the Sponsor portal and delegate the authentication flow to a third party for added security while using Kerberos. Which database should be used to accomplish this goal?

A. local database B. LDAP C. RSA Token Server D. Active Directory Answer: Option D. Explanation:  No answer description available for this question Show AnswerDiscussion The post A customer wants to set up the Sponsor portal and delegate the authentication flow to a third party for added security while using Kerberos.<br> Which database should be used to accomplish… Read More »

An employee logs on to the My Devices portal and marks a currently on-boarded device as “Lost”. Which two actions occur within Cisco ISE as a result of this action? (Choose two.)

A. BYOD Registration status is updated to No. B. BYOD Registration status is updated to Unknown. C. The device access has been denied. D. Certificates provisioned to the device are not revoked. E. The device status is updated to Stolen. Answer: Option A, D. Explanation:  Reference: https://www.cisco.com/c/en/us/td/docs/security/ise/1-3/admin_guide/b_ise_admin_guide_13/ b_ise_admin_guide_sample_chapter_010000.html Show AnswerDiscussion The post An employee logs on to the… Read More »

What are two requirements of generating a single certificate in Cisco ISE by using a certificate provisioning portal, without generating a certificate signing request? (Choose two.)

A. Enter the IP address of the device. B. Enter the common name. C. Choose the hashing method. D. Locate the CSV file for the device MAC. E. Select the certificate template. Answer: Option B, E. Explanation:  Reference: https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/200534-ISE-2-0-Certificate-Provisioning-Portal.html Show AnswerDiscussion The post What are two requirements of generating a single certificate in Cisco ISE by using a… Read More »

What happens when an internal user is configured with an external identity store for authentication, but an engineer uses the Cisco ISE admin portal to select an internal identity store as the identity source?

A. Authentication is redirected to the internal identity source. B. Authentication is granted. C. Authentication fails. D. Authentication is redirected to the external identity source. Answer: Option D. Explanation:  No answer description available for this question Show AnswerDiscussion The post What happens when an internal user is configured with an external identity store for authentication, but an engineer… Read More »