Which component of the SD-Access fabric is responsible for communicating with networks that are external to the fabric?
A. edge nodes
B. control plane nodes
C. intermediate nodes
D. border nodes
Which two statements are true regarding Cisco ISE? (Choose two.)
A. It distributed deployments, failover from primary to secondary Policy Administration Nodes happens automatically.
B. The number of logs that ISE can retain is determined by your disk space.
C. ISE supports IPv6 downloadable ACLs.
D. ISE can detected endpoints whose addresses have been translated via NAT.
E. ISE supports up to 100 Policy Services Nodes.
F. In two-nodes standalone ISE deployments, failover must be done manually.
How would Cisco ISE handle authentication for your printer that does not have a supplicant?
A. ISE would not authenticate the printer as printers are not subject to ISE authentication.
B. ISE would authenticate the printer using 802.1X authentication.
C. ISE would authenticate the printer using MAB.
D. ISE would authenticate the printer using web authentication.
E. ISE would authenticate the printer using MAC RADIUS authentication.
Which three ways are SD-Access and ACI Fabric similar? (Choose three.)
A. use of overlays
B. use of Virtual Network IDs
C. focus on user endpoints
D. use of group policy
E. use of Endpoint Groups
F. use of Scalable Group Tags
Which is a function of the Proactive Insights feature of Cisco DNA Center Assurance?
A. pointing out where the most serious issues are happening in the network
B. generating synthetic traffic to perform tests that raise awareness of potential network issues
C. enabling you to quickly view all of the contextual information related to a single user D. enabling you to see the complete path of packets from the client to the end application
Which three options focus of the current digital business era? (Choose three.)
A. IoT scale
B. connectivity
C. virtualized services
D. automation
E. centralized enterprise and web applications
F. Human scale
Which two activities should occur during an SE's demo process? (Choose two.)
A. determining whether the customer would like to dive deeper during a follow up.
B. asking the customer to provide network drawings or white board the environment for you.
C. identifying which capabilities require demonstration.
D. leveraging a company such as Complete Communications to build a financial case.
E. highlighting opportunities that although not currently within scope would result in lower operational costs and complexity.
Which two options are primary functions of Cisco ISE? (Choose two.)
A. providing VPN access for any type of device
B. providing information about every device that touches the network
C. enabling WAN deployment over any type of connection
D. automatically enabling, disabling, or reducing allocated power to certain devices
E. enforcing endpoint compliance with network security policies
F. allocating resources
Which are two advantages of a "one switch at a time" approach to integrating SD-Access into an existing brownfield environment? (Choose two.)
A. appropriate for campus and remote site environment
B. allows simplified testing prior to cutover
C. ideal for protecting recent investments while upgrading legacy hardware
D. involves the least risk of all approaches
E. opens up many new design and deployment opportunities
F. allows simplified roll back
Which node enables Cisco ISE to share contextual information on a device with Cisco Stealthwatch?
A. Monitoring and Troubleshooting Node
B. pXGrid Controller
C. Policy Administration Node
D. Inline Posture Node