Tuesday, 14 April 2020

Cisco 300-208 Questions Answers

What steps must you perform to deploy a CA-signed identify certificate on an ISE device?

A. 1. Download the CA server certificate.
2. Generate a signing request and save it as a file.
3. Access the CA server and submit the ISE request.
4. Install the issued certificate on the ISE.
B. 1. Download the CA server certificate.
2. Generate a signing request and save it as a file.
3. Access the CA server and submit the ISE request.
4. Install the issued certificate on the CA server.
C. 1. Generate a signing request and save it as a file.
2. Download the CA server certificate.
3. Access the ISE server and submit the CA request.
4. Install the issued certificate on the CA server.
D. 1. Generate a signing request and save it as a file.
2. Download the CA server certificate.
3. Access the CA server and submit the ISE request.
4. Install the issued certificate on the ISE.

Answer: D


What implementation must be added to the WLC to enable 802.1X and CoA for wireless endpoints?

A. the ISE
B. an ACL
C. a router
D. a policy server

Answer: A

Friday, 4 October 2019

Cisco 300-208 Questions Answers

What is a requirement for posture administration services in Cisco ISE?

A. at least one Cisco router to store Cisco ISE profiling policies
B. Cisco NAC Agents that communicate with the Cisco ISE server
C. an ACL that points traffic to the Cisco ISE deployment
D. the advanced license package must be installed

Answer: D


Which two statements about Cisco NAC Agents that are installed on clients that interact with the Cisco ISE profiler are true? (Choose two.)


A. They send endpoint data to AAA servers.
B. They collect endpoint attributes.
C. They interact with the posture service to enforce endpoint security policies.
D. They block access from the network through noncompliant endpoints.
E. They store endpoints in the Cisco ISE with their profiles.
F. They evaluate clients against posture policies, to enforce requirements.

Answer: CF

Sunday, 7 October 2018

Cisco 300-208 Question Answer

From which location can you run reports on endpoint profiling?

A. Reports > Operations > Catalog > Endpoint
B. Operations > Reports > Catalog > Endpoint
C. Operations > Catalog > Reports > Endpoint
D. Operations > Catalog > Endpoint

Answer: B


Which two services are included in the Cisco ISE posture service? (Choose two.)

A. posture administration
B. posture run-time
C. posture monitoring
D. posture policing
E. posture catalog

Answer: AB

Monday, 26 March 2018

Cisco, Verizon Take Information-Centric Networking For A real-world Spin

A recent demonstration by Cisco and Verizon showed that ICN could have benefits for 5G networks, collecting IoT data and boosting security.


Cisco and Verizon recently came together to show content-aware technology that they say will seriously improve the performance and security of future networks, including the 5G wireless and IoT environments.

Cisco has long been an advocate for technology known as Information Centric Networking (ICN), which allows applications to request data by a name that is based on its content rather than its location (IP address).

Cisco says that by using such technology, the network can locate and retrieve data dynamically from any source, an important feature for future mobile and IoT environments. In terms of improving security, Cisco says that the technology secures and authenticates the data itself, rather than configuring point-to-point connections for authenticated hosts.

Potential benefits include more efficient multicast and unicast support in 5G networks, granular load balancing and lower latency for sensitive applications such as augmented and virtual reality and video. It also supports data security in the network layer that guarantees the integrity of all data and, optionally, can provide confidentiality through encryption.

Xerox PARC technology, open source

Xerox's PARC lab had been developing ICN for approximately 10 years until Cisco purchased the company's technology in February 2017. At that time, Cisco said the acquisition helped converge "several ICN dialects (CCN and NDN) into a single harmonized version of ICN, promoting a wider and faster adoption of the ICN-based solutions necessary to solve future network needs ".

At the same time, Cisco put the technology into an open source project within the Linux Foundation's FD.IO community, called Community ICN (CICN). Cisco contributed its own ICN software, including CCN software acquired from PARC, to FD.IO.

Cisco has developed what it calls Hybrid ICN (hICN), which allows the deployment of ICN within IP instead of as an overlay or replacement of IP. It retains all the features of ICN communication by coding ICN names into IP addresses, according to Giovanna Carofiglio, a Cisco Distinguished Engineer.

"HICN supports packet formats that comply with IPv4 or IPv6-RFC and guarantees transparent interconnection with standard IP network equipment, simplifies the insertion of ICN technology into the existing IP infrastructure and allows coexistence with legacy IP traffic," he said. Carofiglio

Cisco and Verizon hope that hICN will become a robust technology for 5G environments because the adoption of ICN can greatly simplify the next-generation network architecture by offering a unified network substrate compatible with content for the integration of heterogeneous networks, he said.

Carofiglio Test hICN

It's the hICN technology that Verizon recently tested in its lab. According to Verizon, the test suite included virtualized hICN software that runs on Cisco UCS servers (which act as routers), video encoders (MPEG Dash transmissions) and clients. Clients were connected mainly through 4G LTE and Wi-Fi. Several models of Android phones were used to consume the content, Verizon said.

According to Verizon, three roles were highlighted in the software package:

  •     Producer - generates "named data" and responds to "interest" queries
  •     Forwarders: resends "interest" queries using a strategy and returns "named data".
  •     Consumer - Conduct "interest" queries using an ICN namespace and consume "named data".

"HICN has many advantages in a 5G context, including mobility support without anchoring, access-independent transport with native multipath support, unicast / multicast unification, integrated edge-based caching / processing capabilities, and object-based flexible security," he said. Anil Guntupalli, executive director of Architecture and Technology Planning at Verizon. "In our test bench, we saw benefits due to the improved speed adaptation and the dynamic balance of pack-granular load over multiple accesses." We believe that applications such as AR / VR and smart video, which require high performance and low latency, will be able to take advantage of the technology ".

It is the world of mobile and video services that could need the hICN technology more quickly since Cisco says that by 2020, 82% of all IP traffic will be video and two thirds of all Internet traffic will be generated. from wireless and mobile devices, according to Cisco Visual Networking Index, with this latest trend backed by heterogeneous and high-speed 5G wireless access. "The growth of traffic goes hand in hand with the evolution of video services that drive the future design of 5G networks to meet the new uses of mobile video with very high bandwidth requirements under ultralow latency restrictions," he said. Cisco.

Security and hICN

Security is also a key component of hICN.  Cisco wrote in a white paper about ICN: “Current Internet security is made available by means of ad-hoc protocol extensions such as DNSsec, IPsec and TLS. TLS provides web security by encrypting a layer 4 connection between two hosts. Authenticity is provided by the web of trust (certification authorities and a public key infrastructure) to authenticate the web server and symmetric cypher on the two endpoints based on a negotiated key.  ICN security model is radically different. Instead of securing by encrypting simply connections, the ICN object-security model allows the separation of security actions regarding privacy, data integrity and data confidentiality, all of which leverage an existing web of trust based on certification authorities and a public key infrastructure. The security actions are performed directly at network layer with content identification provided in data names. All data is integrity protected, whereas confidentiality (via data encryption) is optional. Integrity protection guarantees the authenticity of the data bound to the name by including the producer signature of the data plus its name.”

hICN in the enterprise

With its key use cases in 5G and mobile, executives from both companies said hICN has an enterprise play as well. 

“We envision the concept to be implemented all the way to the edge of the enterprises and they would see very similar benefits,” Guntupalli said. Guntupalli added that This was Verizon’s first testbed. “We plan to open it up to the ecosystem and work with partners to collaborate on the use cases and implementation of the technology.”

“As enterprise mobility grows hICN would add intelligence and security to those environments all the way to the network edge,” Carofiglio said.  Cisco wrote: “Through our co-development with Verizon, we found that hICN empowers the network edge with low-latency caching and computing capabilities for the support of new revenue-generating applications such as enterprise multi-radio access, augmented and virtual reality, and IoT for 5G.”

As for when hICN-based service might hit the market, Verizon’s Guntupalli said, “That's hard to predict exactly, but we expect widespread adoption and implementation could happen within a year or two.

Monday, 5 March 2018

Cisco 300-208 Question Answer

Which three components comprise the Cisco ISE profiler? (Choose three.)

A. the sensor, which contains one or more probes
B. the probe manager
C. a monitoring tool that connects to the Cisco ISE
D. the trigger, which activates ACLs
E. an analyzer, which uses configured policies to evaluate endpoints
F. a remitter tool, which fails over to redundant profilers

Answer: ABE                                             300-208 Exam Braindumps


Which three statements about the Cisco ISE profiler are true? (Choose three.)

A. It sends endpoint data to AAA servers.
B. It collects endpoint attributes.
C. It stores MAC addresses for endpoint systems.
D. It monitors and polices router and firewall traffic.
E. It matches endpoints to their profiles.
F. It stores endpoints in the Cisco ISE database with their profiles.

Answer: BEF