1.
Which term describes a software application that seeks connectivity to the network via a network access device?
2.
How frequently does the Profiled Endpoints dashlet refresh data?
3.
Which command in the My Devices Portal can restore a previously lost device to the network?
4.
What is the first step that occurs when provisioning a wired device in a BYOD scenario?
5.
When MAB is configured, how often are ports reauthenticated by default?
6.
What is a required step when you deploy dynamic VLAN and ACL assignments?
7.
Which model does Cisco support in a RADIUS change of authorization implementation?
8.
An organization has recently deployed ISE with the latest models of Cisco switches, and it plans to deploy Trustsec to secure its infrastructure. The company also wants to allow different network access policies for different user groups (e.g., administrators). Which solution is needed to achieve these goals?

 
9.
Which administrative role has permission to assign Security Group Access Control Lists?
10.
Which set of commands allows IPX inbound on all interfaces?