ExamGecko
Home Home / Cisco / 300-715

Cisco 300-715 Practice Test - Questions Answers, Page 12

Question list
Search
Search

List of questions

Search

Related questions











A network engineer is configuring guest access and notices that when a guest user registers a second device for access, the first device loses access What must be done to ensure that both devices for a particular user are able to access the guest network simultaneously?

A.

Configure the sponsor group to increase the number of logins.

A.

Configure the sponsor group to increase the number of logins.

Answers
B.

Use a custom portal to increase the number of logins

B.

Use a custom portal to increase the number of logins

Answers
C.

Modify the guest type to increase the number of maximum devices

C.

Modify the guest type to increase the number of maximum devices

Answers
D.

Create an Adaptive Network Control policy to increase the number of devices

D.

Create an Adaptive Network Control policy to increase the number of devices

Answers
Suggested answer: C

Explanation:

https://content.cisco.com/chapter.sjs?uri=/searchable/chapter/content/en/us/td/docs/security/ise/2-7/admin_guide/b_ise_admin_guide_27/b_ise_admin_guide_27_chapter_01111.html.xml

An organization is implementing Cisco ISE posture services and must ensure that a host-based firewall is in place on every Windows and Mac computer that attempts to access the network They have multiple vendors' firewall applications for their devices, so the engineers creating the policies are unable to use a specific application check in order to validate the posture for this What should be done to enable this type of posture check?

A.

Use the file registry condition to ensure that the firewal is installed and running appropriately.

A.

Use the file registry condition to ensure that the firewal is installed and running appropriately.

Answers
B.

Use a compound condition to look for the Windows or Mac native firewall applications.

B.

Use a compound condition to look for the Windows or Mac native firewall applications.

Answers
C.

Enable the default firewall condition to check for any vendor firewall application.

C.

Enable the default firewall condition to check for any vendor firewall application.

Answers
D.

Enable the default application condition to identify the applications installed and validade the firewall app.

D.

Enable the default application condition to identify the applications installed and validade the firewall app.

Answers
Suggested answer: C

Explanation:

https://www.youtube.com/watch?v=6Kj8P8Hn7dY&t=109s&ab_channel=CiscoISEIdentityServicesEngine

An administrator is configuring TACACS+ on a Cisco switch but cannot authenticate users with Cisco ISE. The configuration contains the correct key of Cisc039712287. but the switch is not receiving a response from the Cisco ISE instance

What must be done to validate the AAA configuration and identify the problem with the TACACS+ servers?

A.

Check for server reachability using the test aaa group tacacs+ admin <key> legacy command.

A.

Check for server reachability using the test aaa group tacacs+ admin <key> legacy command.

Answers
B.

Test the user account on the server using the test aaa group radius server CUCS user admin pass

<key> legacy command.

B.

Test the user account on the server using the test aaa group radius server CUCS user admin pass

<key> legacy command.

Answers
C.

Validate that the key value is correct using the test aaa authentication admin <key> legacy command.

C.

Validate that the key value is correct using the test aaa authentication admin <key> legacy command.

Answers
D.

Confirm the authorization policies are correct using the test aaa authorization admin drop legacy command.

D.

Confirm the authorization policies are correct using the test aaa authorization admin drop legacy command.

Answers
Suggested answer: A

Explanation:

https://medium.com/training-course-ccna-security-210-260/ccna-security-part-3-implementing-aaain-cisco-ios-4b13ab285f51

Refer to the exhibit:

Refer to the exhibit. In which scenario does this switch configuration apply?

A.

when allowing a hub with multiple clients connected

A.

when allowing a hub with multiple clients connected

Answers
B.

when passing IP phone authentication

B.

when passing IP phone authentication

Answers
C.

when allowing multiple IP phones to be connected

C.

when allowing multiple IP phones to be connected

Answers
D.

when preventing users with hypervisor

D.

when preventing users with hypervisor

Answers
Suggested answer: A

Explanation:

https://www.linkedin.com/pulse/mac-authentication-bypass-priyankakumari#:~:text=Multi%2Dauthentication%20host%20mode%3A%20You,allows%20multiple%20source%20MAC%20addresses.

When configuring an authorization policy, an administrator cannot see specific Active Directory groups present in their domain to be used as a policy condition. However, other groups that are in the same domain are seen What is causing this issue?

A.

Cisco ISE only sees the built-in groups, not user created ones

A.

Cisco ISE only sees the built-in groups, not user created ones

Answers
B.

The groups are present but need to be manually typed as conditions

B.

The groups are present but need to be manually typed as conditions

Answers
C.

Cisco ISE's connection to the AD join point is failing

C.

Cisco ISE's connection to the AD join point is failing

Answers
D.

The groups are not added to Cisco ISE under the AD join point

D.

The groups are not added to Cisco ISE under the AD join point

Answers
Suggested answer: D

Explanation:

https://www.youtube.com/watch?v=0kuEZEo564s&ab_channel=CiscoISE-IdentityServicesEngine

A network administrator changed a Cisco ISE deployment from pilot to production and noticed that the JVM memory utilization increased significantly. The administrator suspects this is due to replication between the nodes What must be configured to minimize performance degradation?

A.

Review the profiling policies for any misconfiguration

A.

Review the profiling policies for any misconfiguration

Answers
B.

Enable the endpoint attribute filter

B.

Enable the endpoint attribute filter

Answers
C.

Change the reauthenticate interval.

C.

Change the reauthenticate interval.

Answers
D.

Ensure that Cisco ISE is updated with the latest profiler feed update

D.

Ensure that Cisco ISE is updated with the latest profiler feed update

Answers
Suggested answer: B

Explanation:

https://www.cisco.com/c/en/us/td/docs/security/ise/2-3/admin_guide/b_ise_admin_guide_23/b_ise_admin_guide_23_chapter_010111.html

An engineer is designing a BYOD environment utilizing Cisco ISE for devices that do not support native supplicants Which portal must the security engineer configure to accomplish this task?

A.

MDM

A.

MDM

Answers
B.

Client provisioning

B.

Client provisioning

Answers
C.

My devices

C.

My devices

Answers
D.

BYOD

D.

BYOD

Answers
Suggested answer: C

Explanation:

https://www.cisco.com/c/en/us/td/docs/security/ise/2-2/admin_guide/b_ise_admin_guide_22/b_ise_admin_guide_22_chapter_01111.html

A Cisco ISE administrator needs to ensure that guest endpoint registrations are only valid for one day When testing the guest policy flow, the administrator sees that the Cisco ISE does not delete the endpoint in the Guest Endpoints identity store after one day and allows access to the guest network after that period. Which configuration is causing this problem?

A.

The Endpoint Purge Policy is set to 30 days for guest devices

A.

The Endpoint Purge Policy is set to 30 days for guest devices

Answers
B.

The RADIUS policy set for guest access is set to allow repeated authentication of the same device

B.

The RADIUS policy set for guest access is set to allow repeated authentication of the same device

Answers
C.

The length of access is set to 7 days in the Guest Portal Settings

C.

The length of access is set to 7 days in the Guest Portal Settings

Answers
D.

The Guest Account Purge Policy is set to 15 days

D.

The Guest Account Purge Policy is set to 15 days

Answers
Suggested answer: A

Explanation:

https://www.cisco.com/c/en/us/td/docs/security/ise/1-3/admin_guide/b_ise_admin_guide_13/b_ise_admin_guide_sample_chapter_01101.html#:~:text=Cisco%20ISE%2C%20by%20default%2C%20deletes,5000%20endpoints%20every%20three%20minutes.

A network engineer is configuring Cisco TrustSec and needs to ensure that the Security Group Tag is being transmitted between two devices Where in the Layer 2 frame should this be verified?

A.

CMD filed

A.

CMD filed

Answers
B.

802.1Q filed

B.

802.1Q filed

Answers
C.

Payload

C.

Payload

Answers
D.

802.1 AE header

D.

802.1 AE header

Answers
Suggested answer: A

Explanation:

https://www.cisco.com/c/dam/global/en_ca/assets/ciscoconnect/2014/pdfs/policy_defined_segmentation_with_trustsec_rob_bleeker.pdf (slide 25)

A Cisco ISE server sends a CoA to a NAD after a user logs in successfully using CWA Which action does the CoA perform?

A.

It terminates the client session

A.

It terminates the client session

Answers
B.

It applies the downloadable ACL provided in the CoA

B.

It applies the downloadable ACL provided in the CoA

Answers
C.

It applies new permissions provided in the CoA to the client session.

C.

It applies new permissions provided in the CoA to the client session.

Answers
D.

It triggers the NAD to reauthenticate the client

D.

It triggers the NAD to reauthenticate the client

Answers
Suggested answer: B

Explanation:

https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/115732-centralweb-auth-00.html

https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/113362-config-webauth-ise-00.html

Total 242 questions
Go to page: of 25