Which three algorithms should be avoided due to security concerns?
Which three algorithms should be avoided due to security concerns? (Choose three.)
Which statement about IOS accounting is true?
Which statement about IOS accounting is true?
What are the initial steps to configure an ACS as a TACACS server?
What are the initial steps to configure an ACS as a TACACS server?
Which effect does the ip http secure-server command have on a Cisco ISE?
Which effect does the ip http secure-server command have on a Cisco ISE?
which ports and protocols to communicate with an ISE Policy Service Node?
The NAC Agent v4.9.x uses which ports and protocols to communicate with an ISE Policy
Service Node?
Which two are valid ISE posture conditions?
Which two are valid ISE posture conditions? (Choose two.)
Which three configuration elements are required?
A network engineer is configuring HTTP based CWA on a switch. Which three configuration
elements are required? (Choose three.)
Which three statements describe differences between TACACS+ and RADIUS?
Which three statements describe differences between TACACS+ and RADIUS? (Choose three.)
Which two identity store options allow you to authorize based on group membership?
Which two identity store options allow you to authorize based on group membership? (Choose
two).
What attribute could be obtained from the SNMP query probe?
What attribute could be obtained from the SNMP query probe?