When demonstrating Cisco Software-Defined Access (SDA), it's essential to tailor the presentation to highlight the strategic benefits and overall architecture without overwhelming the audience with excessive technical details. Two key recommendations for a successful SDA demonstration are:
Keep the demo at a high level (Option B):It's crucial to keep the demonstration focused on the overarching concepts and benefits rather than delving into the intricate technical details. This approach ensures that the audience, which may include decision-makers and non-technical stakeholders, can easily grasp the value and advantages of SDA. By presenting at a high level, you can effectivelycommunicate how SDA simplifies network management, enhances security, and supports digital transformation initiatives.
Show the customer how to integrate ISE into DNA Center at the end of the demo (Option E):Integrating Cisco Identity Services Engine (ISE) with Cisco DNA Center is a pivotal aspect of the SDA solution. Demonstrating this integration towards the end of the presentation allows you to showcase the seamless interoperability and added security benefits that ISE brings to the SDA environment. This part of the demo highlights how ISE enhances network access control, policy enforcement, and overall security management within the SDA framework.
References:
Cisco Software-Defined Access Solution Overview
Cisco DNA Center and ISE Integration Guide
Question 2
Which two activities should occur during an SE’s demo process? (Choose two.)
Options:
A.
identifying which capabilities require demonstration
B.
highlighting opportunities that although not currently within scope would result in lower operational costs and complexity
C.
asking the customer to provide network drawings or white board the environment for you
D.
determining whether the customer would like to dive deeper during a follow -up
E.
leveraging a company such as Complete Communications to build a financial case
Answer:
B, D
Explanation:
Question 3
Which node enables Cisco ISE to share contextual information on a device with Cisco Stealth watch?
Options:
A.
Inline Posture Node
B.
pXGrid Controller
C.
Monitoring and Troubleshooting Node
D.
Policy Administration Node
Answer:
B
Explanation:
The node that enables Cisco ISE to share contextual information on a device with Cisco Stealthwatch is the pXGrid Controller. The pXGrid Controller is a component of the ISE Policy Service Node (PSN) that facilitates the exchange of contextual data between ISE and other security products, such as Stealthwatch, via the Platform Exchange Grid (pxGrid) protocol. The pXGrid Controller acts as a broker that registers, authenticates, and authorizes pxGrid clients, and allows them to publish and subscribe to topics of interest. For example, Stealthwatch can subscribe to the Session Directory topic to obtain user and device information from ISE, and use it to enrich the network flow data and provide better visibility and security analytics. Stealthwatch can also publish topics, such as Rapid Threat Containment (RTC), to allow ISE to take mitigation actions on compromised endpoints, such as quarantine or re-authentication. References: