If a user reports a device lost or stolen, which portal should be used to prevent the device from accessing the network while still providing information about why the device is blocked?
Correct Answer:D
Reference: https://www.cisco.com/c/en/us/td/docs/security/ise/1-3/admin_guide/b_ise_admin_guide_13/b_ise_admin_guide_sample_chapter_010000.html
What is the purpose of the ip http server
command on a switch?
Correct Answer:C
What is needed to configure wireless guest access on the network?
Correct Answer:C
Which configuration is required in the Cisco ISE authentication policy to allow Central Web Authentication?
Correct Answer:A
In which two ways can users and endpoints be classified for TrustSec? (Choose two.)
Correct Answer:AD