ExamGecko
Home Home / Cisco / 300-715

Cisco 300-715 Practice Test - Questions Answers, Page 11

Question list
Search
Search

List of questions

Search

Related questions











What is a function of client provisioning?

A.

Client provisioning ensures that endpoints receive the appropriate posture agents.

A.

Client provisioning ensures that endpoints receive the appropriate posture agents.

Answers
B.

Client provisioning checks a dictionary attribute with a value.

B.

Client provisioning checks a dictionary attribute with a value.

Answers
C.

Client provisioning ensures an application process is running on the endpoint.

C.

Client provisioning ensures an application process is running on the endpoint.

Answers
D.

Client provisioning checks the existence, date, and versions of the file on a client.

D.

Client provisioning checks the existence, date, and versions of the file on a client.

Answers
Suggested answer: A

Explanation:

https://www.cisco.com/c/en/us/td/docs/security/ise/1-2/user_guide/ise_client_prov.html#:~:text=After%20Cisco%20ISE%20classifies%20a,packages%20and%20profiles%2C%20if%20necessary.

An engineer is testing Cisco ISE policies in a lab environment with no support for a deployment server. In order to push supplicant profiles to the workstations for testing, firewall ports will need to be opened. From which Cisco ISE persona should this traffic be originating?

A.

monitoring

A.

monitoring

Answers
B.

policy service

B.

policy service

Answers
C.

administration

C.

administration

Answers
D.

authentication

D.

authentication

Answers
Suggested answer: B

What is an advantage of using EAP-TLS over EAP-MS-CHAPv2 for client authentication?

A.

EAP-TLS uses a username and password for authentication to enhance security, while EAP-MSCHAPv2 does not.

A.

EAP-TLS uses a username and password for authentication to enhance security, while EAP-MSCHAPv2 does not.

Answers
B.

EAP-TLS secures the exchange of credentials, while EAP-MS-CHAPv2 does not.

B.

EAP-TLS secures the exchange of credentials, while EAP-MS-CHAPv2 does not.

Answers
C.

EAP-TLS uses a device certificate for authentication to enhance security, while EAP-MS-CHAPv2 does not.

C.

EAP-TLS uses a device certificate for authentication to enhance security, while EAP-MS-CHAPv2 does not.

Answers
D.

EAP-TLS uses multiple forms of authentication, while EAP-MS-CHAPv2 only uses one.

D.

EAP-TLS uses multiple forms of authentication, while EAP-MS-CHAPv2 only uses one.

Answers
Suggested answer: C

There are several devices on a network that are considered critical and need to be placed into the ISE database and a policy used for them. The organization does not want to use profiling. What must be done to accomplish this goal?

A.

Enter the MAC address in the correct Endpoint Identity Group.

A.

Enter the MAC address in the correct Endpoint Identity Group.

Answers
B.

Enter the MAC address in the correct Logical Profile.

B.

Enter the MAC address in the correct Logical Profile.

Answers
C.

Enter the IP address in the correct Logical Profile.

C.

Enter the IP address in the correct Logical Profile.

Answers
D.

Enter the IP address in the correct Endpoint Identity Group.

D.

Enter the IP address in the correct Endpoint Identity Group.

Answers
Suggested answer: A

An engineer is tasked with placing a guest access anchor controller in the DMZ. Which two ports or port sets must be opened up on the firewall to accomplish this task? (Choose two.)

A.

UDP port 1812 RADIUS

A.

UDP port 1812 RADIUS

Answers
B.

TCP port 161

B.

TCP port 161

Answers
C.

TCP port 514

C.

TCP port 514

Answers
D.

UDP port 79

D.

UDP port 79

Answers
E.

UDP port 16666

E.

UDP port 16666

Answers
Suggested answer: B, C

A network administrator is configuring authorization policies on Cisco ISE There is a requirement to use AD group assignments to control access to network resources After a recent power failure and Cisco ISE rebooting itself, the AD group assignments no longer work What is the cause of this issue?

A.

The AD join point is no longer connected.

A.

The AD join point is no longer connected.

Answers
B.

The AD DNS response is slow.

B.

The AD DNS response is slow.

Answers
C.

The certificate checks are not being conducted.

C.

The certificate checks are not being conducted.

Answers
D.

The network devices ports are shut down.

D.

The network devices ports are shut down.

Answers
Suggested answer: A

Explanation:

https://www.cisco.com/c/en/us/td/docs/security/ise/2-3/ise_active_directory_integration/b_ISE_AD_integration_2x.html#ID612

An administrator is adding a switch to a network that is running Cisco ISE and is only for IP Phones The phones do not have the ability to authenticate via 802 1X Which command is needed on each switch port for authentication?

A.

dot1x system-auth-control

A.

dot1x system-auth-control

Answers
B.

enable bypass-mac

B.

enable bypass-mac

Answers
C.

enable network-authentication

C.

enable network-authentication

Answers
D.

mab

D.

mab

Answers
Suggested answer: D

Explanation:

https://www.cisco.com/en/US/docs/ios-xml/ios/sec_usr_aaa/configuration/15-2mt/sec-configmab.html

A network administrator is setting up wireless guest access and has been unsuccessful in testing client access. The endpoint is able to connect to the SSID but is unable to grant access to the guest network through the guest portal. What must be done to identify the problem?

A.

Use context visibility to verify posture status.

A.

Use context visibility to verify posture status.

Answers
B.

Use the endpoint ID to execute a session trace.

B.

Use the endpoint ID to execute a session trace.

Answers
C.

Use the identity group to validate the authorization rules.

C.

Use the identity group to validate the authorization rules.

Answers
D.

Use traceroute to ensure connectivity.

D.

Use traceroute to ensure connectivity.

Answers
Suggested answer: B

Explanation:

https://www.cisco.com/c/en/us/td/docs/security/ise/1-3/admin_guide/b_ise_admin_guide_13/b_ise_admin_guide_sample_chapter_011001.html#concept_87916A77E8774545B36D0BB422429596

An administrator is configuring new probes to use with Cisco ISE and wants to use metadata to help profile the endpoints. The metadata must contain traffic information relating to the endpoints instead of industry-standard protocol information Which probe should be enabled to meet these requirements?

A.

NetFlow probe

A.

NetFlow probe

Answers
B.

DNS probe

B.

DNS probe

Answers
C.

DHCP probe

C.

DHCP probe

Answers
D.

SNMP query probe

D.

SNMP query probe

Answers
Suggested answer: C

Explanation:

http://www.network-node.com/blog/2016/1/2/ise-20-profiling

An organization wants to standardize the 802 1X configuration on their switches and remove static ACLs on the switch ports while allowing Cisco ISE to communicate to the switch what access to provide What must be configured to accomplish this task?

A.

security group tag within the authorization policy

A.

security group tag within the authorization policy

Answers
B.

extended access-list on the switch for the client

B.

extended access-list on the switch for the client

Answers
C.

port security on the switch based on the client's information

C.

port security on the switch based on the client's information

Answers
D.

dynamic access list within the authorization profile

D.

dynamic access list within the authorization profile

Answers
Suggested answer: A

Explanation:

https://www.cisco.com/c/en/us/td/docs/security/ise/1-2/user_guide/ise_user_guide/ise_sga_pol.html#

Total 242 questions
Go to page: of 25