Cisco 650-472 - Introduction to 802.1X Operations for Cisco Security Professionals Exam Exam

Page:    1 / 14   
Total 69 questions

Which two statements represent good use cases for Wake on LAN? (Choose two.)

  • A. WoL can be used to power-up hosts for on-demand PXE booting.
  • B. WoL can be used to power-up hosts for after-hours operating system updates and application patching.
  • C. WoL can be used to power-up hosts to access the IPMI.
  • D. WoL can be used to save electricity by powering down underused servers and desktops.


Answer : A,B

Which two choices are valid methods of authorizing a wired supplicant? (Choose two.)

  • A. EAP-FAST
  • B. VLAN assignment
  • C. dACL
  • D. EAPOL
  • E. RADIUS


Answer : B,C

Which two statements about MACsec security are true? (Choose two.)

  • A. MACsec is an IEEE standard that is defined by 802.3AE.
  • B. MACsec leverages an 802.1X EAP framework to negotiate the MACsec Key Agreement.
  • C. MACsec is an IETF standard that is defined by RFC 4501.
  • D. MACsec can negotiate a MACsec Key Agreement without 802.1X.
  • E. MACsec is an IETF standard that is defined by RFC 4505.
  • F. MACsec is an IEEE standard that is defined by 802.1AE.


Answer : B,F

Which statement correctly defines a persona?

  • A. A Cisco ISE node can be configured as a primary or backup persona.
  • B. Persona refers to collections of services running on a Cisco ISE node.
  • C. A Cisco ISE node can be configured as a wired or wireless persona.
  • D. Persona relates to the collection of 802.1X services configured on a Cisco Catalyst switch.
  • E. Persona refers to the collection of EAP methods available to a supplicant.
  • F. A Cisco ISE node can be configured as a standalone or distributed persona.


Answer : B

Which two EAP methods are examples of challenge-response methods? (Choose two.)

  • A. EAP-TLS
  • B. PEAP
  • C. EAP-FAST
  • D. LEAP
  • E. EAP-MD5


Answer : D,E

Page:    1 / 14   
Total 69 questions