A. Authentication source
B. Endpoint's DNS record
C. IP address of endpoint
D. Connection protocol (e.g., EAP, PAP)
A. To prioritize SNMP responses
B. To classify services for logging and monitoring
C. To filter syslog messages
D. To map IP addresses to device profiles
A. Handles DNS-based device profiling
B. Manages high availability for wireless controllers
C. Load balances incoming RADIUS requests
D. Serves as the central configuration and policy replication point
A. It extends VLANs over WAN links without tunneling
B. It assigns enforcement policies at the switch or gateway level based on identity
C. It monitors SNMP traps for VLAN mismatches
D. It automatically provisions firewall rules on endpoints
A. By triggering device profiling scans
B. By provisioning IP addresses
C. By mapping authentication to roles and applying enforcement policies
D. By logging the user credentials
A. RADIUS Access-Accept reply attributes
B. DNS server IP allocation
C. VLAN ID assignment
D. ClearPass system logging
A. Sending SMS with login credentials
B. Encrypting RADIUS traffic
C. Enforcing MAC-based VLAN assignment
D. Requiring sponsor approval
A. To prevent access by unauthorized IoT devices
B. To speed up DNS resolution for returning users
C. To bypass captive portal re-authentication for returning guests
D. To enforce VLAN tagging dynamically
A. Antivirus status
B. RADIUS NAS-Port-Type
C. Time of day
D. MAC address vendor