Config Router

  • Google Sheets
  • CCNA Online training
    • CCNA
  • CISCO Lab Guides
    • CCNA Security Lab Manual With Solutions
    • CCNP Route Lab Manual with Solutions
    • CCNP Switch Lab Manual with Solutions
  • Juniper
  • Linux
  • DevOps Tutorials
  • Python Array
You are here: Home / Cisco / CCNP Security FAQ: Authentication Policies

CCNP Security FAQ: Authentication Policies

March 24, 2020 by James Palmer

CCNP Security FAQ: Authentication Policies


Figure: Default authentication policy.

Q1. Which of the following is required to perform MAB from a Cisco network device?
a. The RADIUS packet must have the service-type set to login and the calledstation-id populated with the MAC address of the endpoint.
b. The RADIUS packet must have the service-type set to Call-Check and the calling-station-id populated with the MAC address of the endpoint.
c. The RADIUS packet must have the service-type set to Call-Check and the calledstation-id populated with the MAC address of the endpoint
d. The RADIUS packet must have the service-type set to login and the callingstation-id populated with the MAC address of the endpoint

Answer: B. The RADIUS packet must have the service-type set to Call-Check. The servicetype dictates the method of authentication. The calling-station-id field must be populated with the MAC address of the endpoint.

Q2. Which EAP type is capable of performing EAP chaining?
a. PEAP
b. EAP-FAST
c. EAP-TLS
d. EAP-MD5

Answer: B. Only EAP-FAST and TEAP (RFC 7170) have EAP chaining capabilities as of the publishing of this book.

Q3. Which of the following choices are purposes of an authentication policy?
a. To permit or deny access to the network based on the incoming authentication request
b. To apply access control filters, such as dACL or security group tags (SGTs), to the network device to limit traffic
c. To drop requests using an incorrect authentication method, route authentication requests tothe correct identity store, validate the identity, and “pass” successful authentications over to the authorization policy
d. To terminate encrypted tunnels for purposes of remote access into the network

Answer: C. An authentication policy is meant to drop traffic that isn’t allowed, meaning it is using an authentication protocol that is not configured, it will route authentication requests to the correct identity store to validate the identity, and “pass” successful authentications over to the authorization policy.

Q4. True or False? You must select Detect PAP as Host Lookup to enable MAB requests for Cisco nNetwork devices.
a. True
b. False

Answer: B. Only the Process Host Lookup check box must be select in the Allowed Protocols for Cisco MAB to work. Detecting another protocol as Host Lookup is only for non-Cisco network devices.

Q5. True or False? Policy conditions from attribute dictionaries can be saved as conditions inline while building authentication policies.
a. True
b. False

Answer: A. Reusable conditions can be built on-the-fly while building the authentication policy, and they are saved as dictionary objects.

Q6. Which method will work effectively to allow a different Identity store to be selected for each EAP type used?
a. This is not possible because the first rule to match 802.1X will be used and no further rules can be used.
b. Create one authentication rule that matches a service type framed for each of the EAP protocols. Each authentication rule should have one subrule that matches the EapAuthentication (such as EAP-TLS, EAP-FAST, and so on).
c. This is only possible for the main EAP types. If there is an inner method of EAP-MSCHAPv2 with PEAP, it must be sent to the same identity store as the EAP-MSCHAPv2 inner method of EAP-FAST.
d. Create one sub-rule for each EAP type under the default 802.1X authentication rule that points to the appropriate identity store per rule.

Answer: D. Create one sub-rule for each EAP type under the default 802.1X authentication rule that points to the appropriate identity store per rule.

Q7. Which RADIUS attribute is used to match the SSID?
a. calling-station-ID
b. source-wireless-SSID
c. framed-station-ID
d. called-station-ID

Answer: D. The Called-Station-ID attribute is used to match the source SSID.

Q8. Which RADIUS attribute contains the MAC address of the endpoint?
a. calling-station-ID
b. source-wireless-SSID
c. framed-station-ID
d. called-station-ID

Answer: A. The Calling-Station-ID attribute contains the MAC address of the endpoint.

Q9. What is the purpose of the continue option of an authentication rule?
a. The continue option is used to send an authentication down the list of rules in an authentication policy until there is a match.
b. The continue option sends an authentication to the next sub-rule within the same authentication rule.
c. The continue option is used to send an authentication to the authorization policy, even if the authentication was not successful.
d. The continue option will send an authentication to the selected identity store.

Answer: C. The continue option is used to send an authentication to the authorization policy even if the authentication was not successful.

Q10. True or False? The Drop option for an authentication rule will allow ISE to act as if it were not “alive” so the network device will no longer send authentication requests to that ISE server.
a. True
b. False

Answer: A. The Drop option for an authentication rule will allow ISE to act as if it were not “alive” so the network device will no longer send authentication requests to that ISE server.

More Resources

  • CCNP Security FAQ
  • CCNP Security VPN FAQ
  • CCNP Secure IPS FAQ
  • CCNA Security FAQ
  • Network Security FAQ
  • CCNA Exam Answers Cisco Learning Network
  • CCNA Frequently Asked Questions
  • CCNA Exam Questions with Explanation
  • CCNA Cyber Ops FAQ

Related

Filed Under: Cisco Tagged With: Authentication Policies, CCNP, CCNP Security, CCNP Security FAQ, CCNP Security FAQ: Authentication Policies

Recent Posts

  • How do I give user access to Jenkins?
  • What is docker volume command?
  • What is the date format in Unix?
  • What is the difference between ARG and ENV Docker?
  • What is rsync command Linux?
  • How to Add Music to Snapchat 2021 Android? | How to Search, Add, Share Songs on Snapchat Story?
  • How to Enable Snapchat Notifications for Android & iPhone? | Steps to Turn on Snapchat Bitmoji Notification
  • Easy Methods to Fix Snapchat Camera Not Working Black Screen Issue | Reasons & Troubleshooting Tips to Solve Snapchat Camera Problems
  • Detailed Procedure for How to Update Snapchat on iOS 14 for Free
  • What is Snapchat Spotlight Feature? How to Make a Spotlight on Snapchat?
  • Snapchat Hack Tutorial 2021: Can I hack a Snapchat Account without them knowing?

Copyright © 2023 · News Pro Theme on Genesis Framework · WordPress · Log in