An engineer is adding a Cisco DUO solution to the current TACACS+ deployment using Cisco ISE. The engineer wants to authenticate users using their account when they log into network devices. Which action accomplishes this task?
Configure Cisco DUO with the external Active Directory connector and tie it to the policy set within Cisco ISE.
Install and configure the Cisco DUO Authentication Proxy and configure the identity source sequence within Cisco ISE
Create an identity policy within Cisco ISE to send all authentication requests to Cisco DUO.
Modify the current policy with the condition MFASourceSequence DUO=true in the authorization conditions within Cisco ISE
accomplish the task is to install and configure the Cisco DUO Authentication Proxy and configure the identity source sequence within Cisco ISE. This will allow the engineer to integrate Cisco ISE with Cisco DUO for TACACS+ device administration using Active Directory as the primary authentication source and Cisco DUO as the secondary authentication source for multi-factor authentication (MFA). The steps to configure this solution are as follows12:
References := 1: Duo MFA Integration with ISE for TACACS+ Device Administration with Microsoft Active Directory Users - Cisco Community 2: Protecting Access to Network devices with ISE TACACS+ and DUO MFA - Cisco Community
Which two actions does the Cisco Identity Services Engine posture module provide that ensures endpoint security? (Choose two.)
Assignments to endpoint groups are made dynamically, based on endpoint attributes.
Endpoint supplicant configuration is deployed.
A centralized management solution is deployed.
Patch management remediation is performed.
The latest antivirus updates are applied before access is allowed.
The Cisco Identity Services Engine (ISE) posture module provides several actions that ensure endpoint security. Two of these actions are:
References:
What are two security benefits of an MDM deployment? (Choose two.)
robust security policy enforcement
privacy control checks
on-device content management
distributed software upgrade
distributed dashboard
Mobile device management (MDM) is a solution that allows organizations to manage and secure mobile devices such as smartphones and tablets. MDM can provide two security benefits:
References:
What is a description of microsegmentation?
Environments apply a zero-trust model and specify how applications on different servers or containers can communicate
Environments deploy a container orchestration platform, such as Kubernetes, to manage the application delivery
Environments implement private VLAN segmentation to group servers with similar applications.
Environments deploy centrally managed host-based firewall rules on each server or container
Microsegmentation is a network security technique that enables security architects to logically divide the data center or cloud environment into distinct security segments down to the individual workload level, and then define security controls and deliver services for each unique segment. Microsegmentation software with network virtualization technology is used to create zones in cloud deployments. These granular secure zones isolate workloads, securing them individually with custom, workload-specific policies. Microsegmentation uses a zero-trust model, which means that no traffic is allowed by default, and only explicitly authorized traffic is permitted based on the principle of least privilege. Microsegmentation helps to reduce the attack surface, prevent the lateral movement of threats, and strengthen regulatory compliance. The other options are incorrect because they do not describe microsegmentation accurately. Option B is incorrect because container orchestration platforms, such as Kubernetes, are used to automate the deployment, scaling, and management of containerized applications, but they do not provide microsegmentation by themselves. Option C is incorrect because private VLAN segmentation is a network security technique that isolates hosts within the same VLAN, but it does not provide granular security controls at the workload level. Option D is incorrect because host-based firewall rules are one of the components of microsegmentation, but they are not sufficient to implement microsegmentation without network virtualization and policy automation. References : What Is Microsegmentation? - Palo Alto Networks, What Is Micro-Segmentation? - Cisco, What is Micro-Segmentation? | VMware Glossary
Copyright © 2021-2025 CertsTopics. All Rights Reserved