ExamGecko
Home Home / Cisco / 300-715

Cisco 300-715 Practice Test - Questions Answers, Page 13

Question list
Search
Search

List of questions

Search

Related questions











A customer wants to set up the Sponsor portal and delegate the authentication flow to a third party for added security while using Kerberos Which database should be used to accomplish this goal?

A.

RSA Token Server

A.

RSA Token Server

Answers
B.

Active Directory

B.

Active Directory

Answers
C.

Local Database

C.

Local Database

Answers
D.

LDAP

D.

LDAP

Answers
Suggested answer: B

Explanation:

https://www.cisco.com/c/en/us/td/docs/security/ise/2-6/admin_guide/b_ise_admin_guide_26/b_ise_admin_guide_26_chapter_01111.html#concept_srz_bkb_4db

An administrator is configuring a Cisco ISE posture agent in the client provisioning policy and needs to ensure that the posture policies that interact with clients are monitored, and end users are required to comply with network usage rules

Which two resources must be added in Cisco ISE to accomplish this goal? (Choose two)

A.

AnyConnect

A.

AnyConnect

Answers
B.

Supplicant

B.

Supplicant

Answers
C.

Cisco ISE NAC

C.

Cisco ISE NAC

Answers
D.

PEAP

D.

PEAP

Answers
E.

Posture Agent

E.

Posture Agent

Answers
Suggested answer: A, E

Explanation:

https://www.cisco.com/c/en/us/td/docs/security/vpn_client/anyconnect/anyconnect40/administration/guide/b_AnyConnect_Administrator_Guide_4-0/configure-posture.html

https://www.cisco.com/c/en/us/td/docs/security/ise/2-4/admin_guide/b_ISE_admin_guide_24/m_configure_client_provisioning.html#task_D1C2E8ECE1D54D259C01BCBF0A5822F1

Refer to the exhibit:

interface GigabitEthernetl/O/1

authentication host-mode multi-auth

authentication post-control auto

mab

dotlx pae authenticator

Refer to the exhibit Which switch configuration change will allow only one voice and one data endpoint on each port?

A.

Multi-auth to multi-domain

A.

Multi-auth to multi-domain

Answers
B.

Mab to dot1x

B.

Mab to dot1x

Answers
C.

Auto to manual

C.

Auto to manual

Answers
D.

Multi-auth to single-auth

D.

Multi-auth to single-auth

Answers
Suggested answer: A

Explanation:

https://community.cisco.com/t5/network-access-control/cisco-ise-multi-auth-or-multi-host/mp/3750907

An administrator needs to give the same level of access to the network devices when users are logging into them using TACACS+ However, the administrator must restrict certain commands based on one of three user roles that require different commands How is this accomplished without creating too many objects using Cisco ISE?

A.

Create one shell profile and multiple command sets.

A.

Create one shell profile and multiple command sets.

Answers
B.

Create multiple shell profiles and multiple command sets.

B.

Create multiple shell profiles and multiple command sets.

Answers
C.

Create one shell profile and one command set.

C.

Create one shell profile and one command set.

Answers
D.

Create multiple shell profiles and one command set

D.

Create multiple shell profiles and one command set

Answers
Suggested answer: A

Explanation:

https://www.cisco.com/c/en/us/td/docs/security/ise/2-1/admin_guide/b_ise_admin_guide_21/b_ise_admin_guide_20_chapter_0100010.html

https://www.youtube.com/watch?v=IlZwB71Szog&ab_channel=JasonMaynard

An administrator for a small network is configuring Cisco ISE to provide dynamic network access to users. Management needs Cisco ISE to not automatically trigger a CoA whenever a profile change is detected. Instead, the administrator needs to verify the new profile and manually trigger a Co

A.

What must be configuring in the profiler to accomplish this goal?

A.

What must be configuring in the profiler to accomplish this goal?

Answers
B.

Port Bounce

B.

Port Bounce

Answers
C.

No CoA

C.

No CoA

Answers
D.

Session Query

D.

Session Query

Answers
E.

Reauth

E.

Reauth

Answers
Suggested answer: B

Explanation:

https://ciscocustomer.lookbookhq.com/iseguidedjourney/ISE-profiling-policies

An organization wants to split their Cisco ISE deployment to separate the device administration functionalities from the mam deployment. For this to work, the administrator must deregister any nodes that will become a part of the new deployment, but the button for this option is grayed out Which configuration is causing this behavior?

A.

One of the nodes is an active PSN.

A.

One of the nodes is an active PSN.

Answers
B.

One of the nodes is the Primary PAN

B.

One of the nodes is the Primary PAN

Answers
C.

All of the nodes participate in the PAN auto failover.

C.

All of the nodes participate in the PAN auto failover.

Answers
D.

All of the nodes are actively being synched.

D.

All of the nodes are actively being synched.

Answers
Suggested answer: B

Explanation:

https://www.cisco.com/c/en/us/td/docs/security/ise/2-7/admin_guide/b_ise_27_admin_guide/b_ISE_admin_27_deployment.html#ID185

An organization is adding new profiling probes to the system to improve profiling on Oseo ISE The probes must support a common network management protocol to receive information about the endpoints and the ports to which they are connected What must be configured on the network device to accomplish this goal?

A.

ARP

A.

ARP

Answers
B.

SNMP

B.

SNMP

Answers
C.

WCCP

C.

WCCP

Answers
D.

ICMP

D.

ICMP

Answers
Suggested answer: B

Explanation:

https://community.cisco.com/t5/security-documents/ise-profiling-design-guide/ta-p/3739456#tochId-790343135

A network administrator is configuring a secondary cisco ISE node from the backup configuration of the primary cisco ISE node to create a high availability pair The Cisco ISE CA certificates and keys must be manually backed up from the primary Cisco ISE and copied into the secondary Cisco ISE Which command most be issued for this to work?

A.

copy certificate Ise

A.

copy certificate Ise

Answers
B.

application configure Ise

B.

application configure Ise

Answers
C.

certificate configure Ise

C.

certificate configure Ise

Answers
D.

Import certificate Ise

D.

Import certificate Ise

Answers
Suggested answer: B

Explanation:

https://community.cisco.com/t5/network-access-control/ise-certificate-import-export/m-p/3847746

An employee logs on to the My Devices portal and marks a currently on-boarded device as 'Lost'.

Which two actions occur within Cisco ISE as a result oí this action? (Choose two)

A.

Certificates provisioned to the device are not revoked

A.

Certificates provisioned to the device are not revoked

Answers
B.

BYOD Registration status is updated to No

B.

BYOD Registration status is updated to No

Answers
C.

The device access has been denied

C.

The device access has been denied

Answers
D.

BYOD Registration status is updated to Unknown.

D.

BYOD Registration status is updated to Unknown.

Answers
E.

The device status is updated to Stolen

E.

The device status is updated to Stolen

Answers
Suggested answer: A, B

Explanation:

https://www.cisco.com/c/en/us/td/docs/security/ise/2-2/admin_guide/b_ise_admin_guide_22/b_ise_admin_guide_22_chapter_01111.html

An administrator connects an HP printer to a dot1x enable port, but the printer in not accessible Which feature must the administrator enable to access the printer?

A.

MAC authentication bypass

A.

MAC authentication bypass

Answers
B.

change of authorization

B.

change of authorization

Answers
C.

TACACS authentication

C.

TACACS authentication

Answers
D.

RADIUS authentication

D.

RADIUS authentication

Answers
Suggested answer: A

Explanation:

https://community.cisco.com/t5/network-access-control/ise-for-printer-security/m-p/3933216

Total 242 questions
Go to page: of 25