Please refer to the chart on page 10 of https://www2-realm.cisco.com/c/en/us/td/docs/security/ise/2-4/admin_guide/b_ISE_admin_guide_24/m_ise_devices_byod.pdf
Horrible question, could be A and D.
If you use the Default, you do not have to:
1-Create endpoint groups (Registered Enpointd)
2- Customize device portal (Defaul my device portal )
3- Deploy client provisioning portal (This is not even an option for BYOD, only Posture).
External identity source is a must for BYOD, you have to add somithing to ISE: AD, LDAP, CERTS, etc + Policy services must be enabled as well.
https://www.cisco.com/c/en/us/td/docs/security/ise/3-0/admin_guide/b_ISE_admin_3_0/b_ISE_admin_30_byod.html
Client Provisioning Portal
Employees do not access this portal directly, but are redirected to it.
The Client Provisioning system provides posture assessments and remediations for devices that are attempting to gain access to your corporate network. When employees request network access using their devices, you can route them to a Client Provisioning portal and require them to first download the posture agent. The posture agent scans the device for compliance, such as verifying that virus protection software is installed on it and that its operating system is supported.
Answer for me is A and D.
B is not needed:
Employees can add and manage new devices by entering the MAC address for the device. When employees add devices using the My Devices portal, Cisco ISE adds the devices to the Endpoints window (Administration > Context Visibility > Endpoints) as members of the RegisteredDevices endpoint identity group (unless already statically assigned to a different endpoint identity group). The devices are profiled like any other endpoint in Cisco ISE and go through a registration process for network access.
C is not a must you don't need to customize the BYOD portal for let it work properly.
D is not a must, you only need to use .exe provisioned by ISE for automatically download the certificate
E for me is a must because you need to configure the client provisioning portal correctly without it the clients will not get the certificate having pushed down the file that can be downloaded to the BYOD portal.
Cisco ISE end-user web portals depend on the Administration, Policy Services, and Monitoring personas to provide configuration, session support, and reporting.
https://www.cisco.com/c/en/us/td/docs/security/ise/3-1/admin_guide/b_ise_admin_3_1/b_ISE_admin_31_byod.html#concept_94C0C7873E48486F9E24A2F947409E82
Client Provisioning Portal is for posture, not BYOD.
I would say customize portal and enable external id src for 802.1x cert authentication after nsp provision.
But not sure if costumize portal is a MUST, typical Cisco question
Configuring a BYOD (Bring Your Own Device) portal in Cisco Identity Services Engine (ISE) does not necessarily require you to provision an external identity source. Whether you need an external identity source depends on your specific requirements and how you want to handle user authentication and authorization within the BYOD portal.
upvoted 2 times
...
...
This section is not available anymore. Please use the main Exam Page.300-715 Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
odd1411
Highly Voted 1 year, 5 months agoCachaman
Most Recent 1 month, 2 weeks agoTiberiuszSun
6 months, 2 weeks agoNullNull88
1 year, 1 month agoHercJ
1 year, 3 months agobendoom
1 year, 4 months agoXBfoundX
1 year, 4 months agoXBfoundX
1 year, 4 months agoJor466077
1 year, 5 months agoIETF1
1 year, 5 months agothol119
1 year, 6 months agoleostor
1 year, 5 months ago