59 Practice Questions & Answers
Which authentication method is considered the most secure for identity verification in SISE Identity Services?
-
A
Multi-factor authentication with biometric and hardware token
✓ Correct
-
B
Single sign-on with email verification
-
C
Username and password combination
-
D
Security questions and PIN
Explanation
Multi-factor authentication combining multiple factors, especially biometric and hardware tokens, provides the strongest security posture for identity verification in enterprise environments.
What is the primary purpose of identity proofing in SISE Identity Services?
-
A
To monitor user activity and generate audit logs
-
B
To encrypt user credentials in the database
-
C
To verify that a person is who they claim to be before establishing an identity record
✓ Correct
-
D
To assign user roles and permissions
Explanation
Identity proofing is the foundational process of verifying an individual's claimed identity through appropriate evidence and documentation before creating an identity account.
In SISE Identity Services, which standard defines the security requirements for authentication protocols?
-
A
NIST SP 800-63 Digital Identity Guidelines
✓ Correct
-
B
PCI DSS Payment Card Industry Data Security Standard
-
C
HIPAA Health Insurance Portability and Accountability Act
-
D
ISO 27001 Information Security Management
Explanation
NIST SP 800-63 provides the authoritative guidelines for digital identity, authentication, and lifecycle management used in federal and enterprise identity services.
What is the main difference between authentication and authorization in identity management?
-
A
Authentication verifies identity while authorization determines access rights to resources
✓ Correct
-
B
They are interchangeable terms referring to the same process
-
C
Authentication applies to users while authorization applies only to administrators
-
D
Authorization is performed first, then authentication validates the authorization
Explanation
Authentication confirms who a user is (identity verification), while authorization determines what that authenticated user is permitted to do or access (permission-based access control).
Which of the following best describes attribute-based access control (ABAC) in SISE Identity Services?
-
A
Access decisions determined by the user's manager approval
-
B
Access decisions based on attributes of users, resources, environment, and actions
✓ Correct
-
C
Access decisions stored in a static permission matrix that never changes
-
D
Access decisions based on user roles only
Explanation
ABAC uses multiple attributes (user properties, resource characteristics, environmental conditions, and requested actions) to make fine-grained access control decisions, providing more flexibility than role-based access control.
In federated identity management, what is the primary role of the identity provider (IdP)?
-
A
To authenticate users and provide identity assertions to service providers
✓ Correct
-
B
To encrypt all data transmitted between systems
-
C
To store and manage user passwords for all connected systems
-
D
To block unauthorized login attempts across the network
Explanation
The identity provider authenticates users and issues identity assertions (such as SAML tokens) that service providers trust to grant access without directly authenticating the user.
What is the primary security advantage of using SAML 2.0 for federated authentication?
-
A
It prevents password interception by using specialized hardware
-
B
It allows users to maintain separate passwords across all systems
-
C
It eliminates the need for passwords entirely
-
D
It provides encrypted identity assertions between identity providers and service providers
✓ Correct
Explanation
SAML 2.0 uses digitally signed and optionally encrypted assertions to securely communicate authentication and authorization information between trusted parties, reducing password exposure.
Which component of SISE Identity Services is responsible for managing the lifecycle of user identities from creation to deprovisioning?
-
A
Network Access Control (NAC)
-
B
Identity Governance and Administration (IGA)
✓ Correct
-
C
Data Loss Prevention (DLP)
-
D
Public Key Infrastructure (PKI)
Explanation
Identity Governance and Administration manages the complete identity lifecycle including provisioning, entitlement management, attestation, and deprovisioning across enterprise systems.
In SISE, what is the primary purpose of identity reconciliation?
-
A
To reassign user passwords on a quarterly basis
-
B
To identify and resolve discrepancies between identity records across different systems
✓ Correct
-
C
To verify that user account balances match corporate budgets
-
D
To generate financial reports about user accounts
Explanation
Identity reconciliation compares identity data across multiple source systems and applications to identify duplicates, orphaned accounts, and inconsistencies that need remediation.
What is the primary function of a credential store in SISE Identity Services?
-
A
To encrypt data at rest on all connected servers
-
B
To securely store and manage user credentials while enabling authentication and provisioning
✓ Correct
-
C
To audit user access to the identity management system
-
D
To display user profile information on login screens
Explanation
A credential store securely manages cryptographic material and authentication credentials, providing secure storage and controlled access for authentication and automated provisioning processes.
In the context of SISE Identity Services, what does 'principle of least privilege' mean?
-
A
Administrators should have all permissions by default
-
B
Users should be granted only the minimum access necessary to perform their job functions
✓ Correct
-
C
Privileges should be assigned once and never reviewed
-
D
Users should have minimal access to view any system logs
Explanation
The principle of least privilege ensures users receive only the specific permissions required for their role, minimizing the risk of unauthorized access or system compromise.
Which of the following best describes the concept of identity lifecycle management in SISE?
-
A
Storing backup copies of user identity information
-
B
Managing identities from initial creation through modification and eventual removal
✓ Correct
-
C
Assigning permanent administrative roles to all new users
-
D
The process of deleting all user accounts after retirement
Explanation
Identity lifecycle management encompasses all phases: provisioning (creating accounts), maintenance (updating attributes and entitlements), and deprovisioning (removing access when appropriate).
What is the primary security concern when implementing single sign-on (SSO) across multiple applications?
-
A
It requires users to authenticate separately for each application
-
B
Compromise of a single credential can grant access to all integrated applications
✓ Correct
-
C
SSO systems cannot support multi-factor authentication
-
D
Users will forget their passwords more easily
Explanation
SSO consolidates authentication, meaning a compromised credential or session could provide access to all connected applications, making strong authentication and session management critical.
In SISE Identity Services, what is the primary purpose of an access certification or attestation process?
-
A
To encrypt user credentials in transit
-
B
To measure how quickly users can complete their tasks
-
C
To train users on password best practices
-
D
To verify that users' current access rights are still appropriate and necessary for their roles
✓ Correct
Explanation
Access certification requires managers or stakeholders to periodically review and validate that assigned permissions remain appropriate, helping detect and remediate inappropriate access.
Which authentication mechanism is most resistant to phishing attacks?
-
A
Passwordless authentication using hardware keys and biometric confirmation
✓ Correct
-
B
Username and strong password combination
-
C
Password with security questions
-
D
Single-factor authentication with email verification
Explanation
Hardware-based passwordless authentication eliminates credentials that can be phished, and biometric factors cannot be intercepted or replayed, providing strong anti-phishing protection.
In SISE, what is the primary difference between provisioning and deprovisioning?
-
A
Provisioning applies to employees while deprovisioning applies to contractors
-
B
Provisioning creates accounts and grants access while deprovisioning removes accounts and revokes access
✓ Correct
-
C
Both terms refer to the same process and are used interchangeably
-
D
Provisioning manages user passwords while deprovisioning manages user roles
Explanation
Provisioning is the creation of user accounts and assignment of access rights, while deprovisioning is the removal of accounts and revocation of all access when users leave or change roles.
What is the primary objective of implementing risk-based authentication in SISE Identity Services?
-
A
To require hardware tokens for all remote access attempts
-
B
To adjust authentication requirements based on detected risk factors and context
✓ Correct
-
C
To eliminate the need for passwords in all scenarios
-
D
To ensure every user authenticates with biometrics
Explanation
Risk-based authentication analyzes contextual factors (location, device, time, behavior) and dynamically increases authentication requirements when higher risk is detected, balancing security and usability.
In federated identity environments, what is the purpose of a metadata exchange in SAML?
-
A
To synchronize user account information automatically
-
B
To share configuration information including certificates and endpoints between providers
✓ Correct
-
C
To transfer user passwords between identity providers
-
D
To encrypt user data during transmission
Explanation
SAML metadata contains configuration details such as certificate information, endpoints, and supported bindings that allow identity providers and service providers to establish trust and communicate securely.
What is the primary security benefit of implementing passwordless authentication in SISE Identity Services?
-
A
It guarantees that no unauthorized access will ever occur
-
B
It allows users to access systems without any authentication
-
C
It eliminates the need for any form of user identification
-
D
It removes the reliance on passwords, which are vulnerable to phishing, brute force, and credential reuse
✓ Correct
Explanation
Passwordless authentication eliminates common password vulnerabilities including phishing, weak password choices, and credential reuse attacks by using alternative factors like biometrics or hardware keys.
In SISE Identity Services, what is meant by 'entitlement management'?
-
A
The allocation of computing resources like storage and memory
-
B
The process of paying employee salaries
-
C
The administration of access rights, permissions, and role assignments throughout a user's lifecycle
✓ Correct
-
D
The verification that users have read company policies
Explanation
Entitlement management controls what access rights, permissions, and roles users are granted, including their provisioning, review, modification, and revocation based on job functions and policies.
Which of the following is the primary purpose of identity analytics in SISE?
-
A
To detect anomalous user behavior and access patterns that may indicate compromise or insider threats
✓ Correct
-
B
To measure the speed of user authentication
-
C
To determine which users have the best productivity metrics
-
D
To calculate the cost of maintaining identity systems
Explanation
Identity analytics uses behavioral analysis and machine learning to identify unusual access patterns, suspicious login activities, and potential security incidents that warrant investigation.
What is the primary advantage of implementing decentralized identity verification in SISE?
-
A
It simplifies the authentication process by removing all verification steps
-
B
It reduces dependency on a single point of failure and enables distributed trust models
✓ Correct
-
C
It guarantees complete anonymity for all users
-
D
It eliminates the need for any central authority or trusted third party
Explanation
Decentralized identity reduces reliance on centralized authorities, improving resilience and enabling users to control their identity credentials across multiple platforms without single points of failure.
In SISE Identity Services, what is the primary function of directory services like LDAP?
-
A
To assign administrative privileges to users automatically
-
B
To encrypt user passwords using asymmetric cryptography
-
C
To monitor network traffic for security threats
-
D
To centrally store and manage user identity attributes and credentials for authentication and authorization
✓ Correct
Explanation
Directory services like LDAP provide a centralized repository for storing user identity information, credentials, and attributes that applications query for authentication and authorization decisions.
What does 'identity verification' specifically mean in the context of SISE Identity Services?
-
A
Confirming that a person's claimed identity matches their actual identity through evidence examination
✓ Correct
-
B
Monitoring user accounts for suspicious activity
-
C
Storing multiple copies of user identity information
-
D
Assigning security classifications to user accounts
Explanation
Identity verification is the process of confirming that an individual is who they claim to be through examination and validation of identity evidence and documentation.
Which of the following best describes the purpose of identity and access management (IAM) policies in SISE?
-
A
To increase the number of user accounts in the system
-
B
To establish guidelines and standards for managing identities, authentication, authorization, and accountability
✓ Correct
-
C
To eliminate the need for security audits
-
D
To automatically delete inactive accounts without notification
Explanation
IAM policies provide organizational guidelines that define how identities are created, managed, authenticated, authorized, and audited to ensure consistent security practices across the enterprise.
What is the primary purpose of identity services in a Secure Internet Services Edge (SISE) deployment?
-
A
To monitor bandwidth consumption across the organization
-
B
To authenticate users and devices before granting access to network resources
✓ Correct
-
C
To encrypt all traffic flowing through the network
-
D
To replace traditional firewall functionality entirely
Explanation
Identity services in SISE authenticate users and devices to ensure only authorized entities access resources. This is foundational to zero-trust security principles.
Which authentication method provides the highest security level for remote workers accessing corporate applications through SISE?
-
A
Multi-factor authentication (MFA) with hardware security keys
✓ Correct
-
B
Single Sign-On (SSO) without additional verification
-
C
IP address whitelisting
-
D
Username and password only
Explanation
Hardware security keys provide phishing-resistant MFA, which is superior to software-based MFA and offers the strongest protection for remote access scenarios in SISE deployments.
In SISE Identity Services, what does the term 'device posture' refer to?
-
A
The user's job title and organizational hierarchy
-
B
The physical location of a user's device
-
C
The security health and compliance status of a device before granting network access
✓ Correct
-
D
The network bandwidth consumed by a particular device
Explanation
Device posture assessment evaluates whether a device meets security requirements such as antivirus status, patch level, and encryption before allowing access—a key component of zero-trust models.
Which of the following best describes the relationship between SISE Identity Services and conditional access policies?
-
A
Conditional access policies are only used for on-premises infrastructure and not SISE
-
B
Identity Services gathers user and device context that conditional access policies use to make real-time access decisions
✓ Correct
-
C
Conditional access is the same as identity authentication and requires no additional configuration
-
D
SISE Identity Services automatically overrides all conditional access policies for cloud applications
Explanation
SISE Identity Services collects contextual data about users and devices, which conditional access policies evaluate to dynamically grant, deny, or require additional verification for access requests.
What is a primary advantage of integrating Active Directory (AD) with SISE Identity Services?
-
A
It eliminates the need for any cloud-based identity solutions
-
B
It allows organizations to maintain on-premises identity management while extending it to cloud and remote access scenarios
✓ Correct
-
C
It provides real-time malware scanning of all connected devices
-
D
It automatically encrypts all user credentials stored in the cloud
Explanation
AD integration enables hybrid identity management, allowing organizations to leverage existing on-premises directory investments while supporting modern cloud and remote access requirements through SISE.
In the context of SISE, what does 'identity federation' enable?
-
A
Bandwidth throttling based on user identity
-
B
Automatic device encryption across multiple operating systems
-
C
Real-time threat intelligence sharing between network segments
-
D
Users to authenticate once and access resources across multiple independent identity providers and organizations
✓ Correct
Explanation
Identity federation allows users to use credentials from one identity provider to access resources at another provider, enabling seamless cross-organizational access in SISE environments.
Which attribute is LEAST important when configuring risk-based authentication in SISE Identity Services?
-
A
The color scheme of the user's workstation background
✓ Correct
-
B
User's geographic location and login patterns
-
C
Device compliance status and security posture
-
D
Real-time threat intelligence regarding the user's network
Explanation
Risk-based authentication evaluates location, device health, threat intelligence, and behavioral patterns—not aesthetic properties like wallpaper, which have no security relevance.
How does SISE Identity Services typically handle guest access to corporate resources?
-
A
Guests receive permanent identity credentials equivalent to employees
-
B
Guests must use company-owned devices exclusively and cannot bring personal devices
-
C
Through temporary identities with limited scope, device requirements, and time-based access restrictions
✓ Correct
-
D
Guest access is completely prohibited in SISE deployments
Explanation
SISE enables secure guest access via temporary credentials with reduced privileges, device restrictions, and expiration policies, balancing business needs with security requirements.
What is the primary benefit of implementing passwordless authentication in SISE Identity Services?
-
A
It eliminates the need for MFA and risk-based conditional access
-
B
It allows users to share authentication tokens with colleagues for convenience
-
C
It significantly reduces the attack surface by removing credentials that can be phished or compromised
✓ Correct
-
D
It reduces IT support costs by eliminating password reset requests
Explanation
Passwordless authentication (using Windows Hello, FIDO2 keys, or biometrics) removes the weakest link in the authentication chain, making phishing and credential theft substantially less effective.
In SISE deployments, what does 'certificate-based authentication' primarily protect against?
-
A
Excessive bandwidth consumption by specific users
-
B
Man-in-the-middle attacks and unauthorized device impersonation
✓ Correct
-
C
Distributed denial-of-service attacks targeting DNS servers
-
D
Ransomware execution on user workstations
Explanation
Certificate-based authentication uses digital certificates to cryptographically verify device and user identity, preventing attackers from impersonating legitimate entities even if they intercept network traffic.
Which scenario would MOST likely trigger a step-up authentication challenge in SISE Identity Services?
-
A
A user opening a routine email message
-
B
A user logging in from their usual office location during normal business hours using their assigned device
-
C
A user updating their local profile picture in a productivity application
-
D
A user attempting to access highly sensitive financial data from an unfamiliar geographic location using a device not seen before
✓ Correct
Explanation
SISE's risk-based authentication triggers additional verification (step-up) when multiple high-risk signals combine, such as unusual location, unfamiliar device, and access to sensitive resources.
What role does the Azure AD Connect tool play in SISE Identity Services architectures?
-
A
It replaces the need for any cloud identity providers
-
B
It exclusively manages on-premises domain controllers
-
C
It encrypts all user passwords before transmission to the cloud
-
D
It synchronizes on-premises Active Directory identities with Azure AD, enabling hybrid identity management for SISE
✓ Correct
Explanation
Azure AD Connect synchronizes on-premises AD objects to Azure AD, allowing organizations to maintain a single identity system that supports both on-premises and cloud-based SISE scenarios.
In SISE, how should organizations handle identity verification for contractors with temporary access needs?
-
A
Provide contractors with permanent employee credentials and access levels
-
B
Implement just-in-time (JIT) access with temporary credentials, device compliance requirements, and automatic expiration
✓ Correct
-
C
Exempt contractors from MFA requirements to reduce friction
-
D
Create a separate contractor-only network segment with minimal security controls
Explanation
JIT access for contractors provides temporary identity credentials with defined expiration dates, device requirements, and limited scope, balancing operational needs with security and compliance requirements.
What is the primary security advantage of implementing microsegmentation based on identity in SISE?
-
A
It allows all users on the same network segment to access any resource freely
-
B
It automatically prevents all external user access to the network
-
C
It restricts lateral movement by enforcing identity-based access controls at a granular level, limiting breach impact
✓ Correct
-
D
It eliminates the need for firewalls in the data center
Explanation
Identity-based microsegmentation enforces zero-trust principles by restricting lateral movement—even if an attacker compromises one identity, they cannot easily move to other resources without valid credentials.
Which identity attribute would be MOST relevant for implementing least-privilege access in SISE?
-
A
User's tenure in the organization
-
B
User's department and specific job role within that department
✓ Correct
-
C
User's favorite break room location
-
D
User's preferred email signature
Explanation
Department and job role are critical attributes for determining which resources a user legitimately needs, enabling least-privilege assignment where users receive only access required for their specific responsibilities.
How does SISE Identity Services typically address the challenge of authenticating users across multiple cloud applications from different vendors?
-
A
By using the same password across all applications regardless of vendor
-
B
By requiring users to maintain separate credentials for each application
-
C
By implementing single sign-on (SSO) that integrates with a centralized identity provider supporting SAML or OAuth protocols
✓ Correct
-
D
By eliminating cloud applications entirely from the organization
Explanation
SISE enables SSO through centralized identity providers using standard protocols (SAML, OAuth) that work across multiple SaaS applications, reducing credential management and improving user experience.
What does 'identity intelligence' in SISE refer to?
-
A
Eliminating behavioral monitoring to protect user privacy
-
B
Analyzing patterns of user behavior, access attempts, and device activity to detect anomalies and potential security threats
✓ Correct
-
C
Storing all user credentials in a centralized database for easy access
-
D
Using AI to automatically grant access to all users without verification
Explanation
Identity intelligence uses machine learning and analytics to establish baselines of normal behavior and detect deviations that may indicate compromised accounts or unauthorized access attempts.
In SISE, what is the purpose of implementing identity-based quarantine or restricted access tiers?
-
A
To allow security teams to isolate potentially compromised identities while investigating, providing limited access to reduce risk without complete denial
✓ Correct
-
B
To permanently block all suspicious user accounts from the network
-
C
To automatically delete all user data when anomalies are detected
-
D
To eliminate the need for incident response procedures
Explanation
Restricted access tiers allow organizations to limit an at-risk identity's capabilities (reduced resources, increased monitoring) while investigation occurs, balancing security and business continuity.
Which approach BEST represents identity governance in SISE deployments?
-
A
Allowing users to self-provision access to any application they request
-
B
Using a formal process to ensure users have appropriate access, receive timely updates, and have access revoked when roles change
✓ Correct
-
C
Implementing identity controls only for external users and contractors
-
D
Granting all employees full administrative access to all systems
Explanation
Identity governance encompasses the policies, processes, and controls that ensure users have appropriate access aligned with their roles, with regular reviews and timely removal when circumstances change.
What is a critical consideration when implementing identity services in a highly regulated industry such as healthcare or finance?
-
A
Regulatory requirements can be ignored if user convenience is prioritized
-
B
Identity management is less important in regulated industries than in others
-
C
All users should have equally elevated privileges to ensure fairness
-
D
Compliance mandates like HIPAA and PCI-DSS require specific audit logging, access controls, and identity governance practices that must be built into SISE deployments
✓ Correct
Explanation
Regulated industries have stringent identity and access requirements—SISE deployments must enforce specific audit trails, multi-factor authentication, and governance practices to maintain compliance.
How does SISE Identity Services support the principle of 'defense in depth'?
-
A
By eliminating network firewalls in favor of identity controls alone
-
B
By implementing multiple identity and access control layers (MFA, device posture, risk assessment, conditional access) to protect against various attack vectors
✓ Correct
-
C
By relying exclusively on password authentication as the sole security layer
-
D
By requiring all traffic to pass through a single security checkpoint
Explanation
Defense in depth in SISE combines multiple overlapping security controls—authentication, device verification, risk analysis, and conditional policies—so compromise of one layer doesn't grant complete access.
What is the relationship between identity services and application-level access control in SISE?
-
A
Identity services provides the verified user context that applications use to enforce their own fine-grained authorization policies
✓ Correct
-
B
Identity services handle all access control; applications need no internal controls
-
C
Applications and identity services operate independently with no interaction
-
D
Only identity services should make access decisions, not individual applications
Explanation
SISE Identity Services establishes who the user is and what their device status is; applications then use this context to make application-specific authorization decisions based on their own business logic.
In a SISE environment, what security challenge does the use of shared or generic accounts create?
-
A
Shared accounts prevent accountability since multiple people use the same identity, making audit trails unclear and unauthorized access harder to trace
✓ Correct
-
B
Shared accounts simplify management and improve security
-
C
Shared accounts are required by all compliance regulations
-
D
Shared accounts eliminate the need for MFA
Explanation
Shared accounts violate zero-trust principles and compliance requirements by preventing individual accountability; SISE implementations should enforce unique identities for all users to maintain auditability.
What does 'identity synchronization' ensure in a hybrid SISE deployment?
-
A
Identity attributes remain consistent across on-premises and cloud systems, preventing access conflicts and ensuring policy application across environments
✓ Correct
-
B
Users must maintain separate identities for cloud and on-premises resources
-
C
All passwords are stored in plaintext for easy management
-
D
All applications must be migrated to the cloud
Explanation
Identity synchronization keeps on-premises AD and cloud identity providers in alignment, ensuring users have consistent attributes and access policies whether accessing on-premises or cloud resources.
When configuring SISE Identity Services for TACACS+ authentication, which attribute is critical for defining user privilege levels on network devices?
-
A
user-role
-
B
priv-lvl
✓ Correct
-
C
device-privilege
-
D
access-level
Explanation
The priv-lvl attribute in TACACS+ is the standard mechanism for assigning privilege levels to users, controlling their command access on network devices. This attribute directly maps to device privilege escalation.
Which of the following best describes the primary purpose of the Cisco Identity Services Engine posture module?
-
A
To replace traditional intrusion prevention systems on the network
-
B
To monitor and enforce endpoint compliance with security policies before network access is granted
✓ Correct
-
C
To authenticate users using biometric data exclusively
-
D
To provide real-time threat intelligence from external sources
Explanation
The posture module in ISE evaluates endpoint security status (antivirus, firewall, patches) and enforces compliance policies before granting network access, enabling zero-trust principles.
In ISE profiling services, what is the primary function of the endpoint classification engine?
-
A
Generating certificates for endpoint authentication purposes
-
B
Analyzing network traffic patterns and device characteristics to categorize endpoints by type and risk profile
✓ Correct
-
C
Blocking all unknown devices automatically without classification
-
D
Encrypting all endpoint communications across the network infrastructure
Explanation
The endpoint classification engine analyzes traffic, DHCP fingerprints, DNS queries, and behavioral patterns to identify device types (printers, phones, IoT) and assess risk levels for dynamic policy application.
When implementing ISE with 802.1X authentication in a wired network, which component is responsible for making the initial access control decision at the switch port?
-
A
The endpoint supplicant application
-
B
The network access server relay agent
-
C
The ISE Policy Service Node
-
D
The authenticator (switch or wireless controller)
✓ Correct
Explanation
The authenticator acts as the enforcement point, blocking or allowing traffic based on the RADIUS response from ISE. It does not make the decision itself but enforces ISE's decision at the access port.
What is the primary advantage of using ISE's guest services portal with sponsor approval workflows?
-
A
It completely eliminates the need for any guest password configuration
-
B
It enables controlled guest access while maintaining an audit trail and reducing administrative overhead through delegated approval
✓ Correct
-
C
It provides direct administrative access to the network for all guests
-
D
It automatically removes all guest accounts after 24 hours without notification
Explanation
Sponsor approval workflows allow authorized staff to approve guest access, creating accountability and audit trails while reducing the burden on IT administrators for guest account management.
In ISE context visibility, which of the following is NOT a primary data source for endpoint context collection?
-
A
Financial transaction records from the endpoint user
✓ Correct
-
B
DNS query logs and resolution data
-
C
DHCP snooping data from network switches
-
D
Profiler probe network flow analysis
Explanation
ISE collects network-based context like DHCP, DNS, and flow data for endpoint identification and profiling. Financial transaction records are not relevant to network identity and access control.
When deploying ISE in a distributed architecture, what is the primary role of the Monitoring and Troubleshooting (MnT) node?
-
A
Managing all endpoint profiling and classification tasks
-
B
Providing network access services and authorization decisions
-
C
Serving as the backup authentication server for failover scenarios
-
D
Collecting, aggregating, and storing logs and reporting data from all PSNs in the deployment
✓ Correct
Explanation
The MnT node acts as a central collection point for logs, alarms, and metrics from all Policy Service Nodes, enabling centralized monitoring, reporting, and troubleshooting across the ISE deployment.
Which ISE authorization policy component allows you to enforce device compliance requirements before granting network access?
-
A
TrustSec peer identity verification
-
B
Authentication policy conditions
-
C
Dynamic ACL assignment based on device compliance status
-
D
Posture Remediation Service integration
✓ Correct
Explanation
Posture Remediation integrates with ISE authorization to check endpoint compliance status (antivirus, firewall, patches) and enforce remediation workflows before granting or limiting access.
In ISE TrustSec implementation, what does the Security Group Tag (SGT) represent?
-
A
A mandatory password complexity requirement for device authentication
-
B
A numeric identifier that groups users and endpoints into logical security zones for policy application
✓ Correct
-
C
A specific VLAN assignment that cannot be changed by network administrators
-
D
A time-limited certificate used for WPA2 encryption
Explanation
SGTs are 16-bit tags that represent logical security groups independent of network topology, enabling policy enforcement based on identity and device posture rather than just IP subnet.
What is the primary benefit of integrating ISE with Mobile Device Management (MDM) solutions in a BYOD deployment?
-
A
MDM integration eliminates the need for any endpoint authentication mechanisms
-
B
It allows ISE to query MDM data for device compliance status and apply conditional access policies based on device management state
✓ Correct
-
C
It removes the requirement for users to accept acceptable use policies
-
D
It automatically encrypts all device data without user intervention or awareness
Explanation
MDM integration enables ISE to assess whether BYOD devices are enrolled in management, compliant with policies, and have required controls enabled—using this context to enforce appropriate access levels.