ExamGecko
Home Home / Cisco / 300-715

Cisco 300-715 Practice Test - Questions Answers, Page 16

Question list
Search
Search

List of questions

Search

Related questions











A network administrator notices that after a company-wide shut down, many users cannot connect their laptops to the corporate SSID. What must be done to permit access in a timely manner?

A.

Authenticate the user's system to the secondary Cisco ISE node and move this user to the primary with the renewed certificate.

A.

Authenticate the user's system to the secondary Cisco ISE node and move this user to the primary with the renewed certificate.

Answers
B.

Connect this system as a guest user and then redirect the web auth protocol to log in to the network.

B.

Connect this system as a guest user and then redirect the web auth protocol to log in to the network.

Answers
C.

Add a certificate issue from the CA server, revoke the expired certificate, and add the new certificate in system.

C.

Add a certificate issue from the CA server, revoke the expired certificate, and add the new certificate in system.

Answers
D.

Allow authentication for expired certificates within the EAP-TLS section under the allowed protocols.

D.

Allow authentication for expired certificates within the EAP-TLS section under the allowed protocols.

Answers
Suggested answer: A

An administrator adds a new network device to the Cisco ISE configuration to authenticate endpoints to the network. The RADIUS test fails after the administrator configures all of the settings in Cisco ISE and adds the proper configurations to the switch. What is the issue"?

A.

The endpoint profile is showing as "unknown."

A.

The endpoint profile is showing as "unknown."

Answers
B.

The endpoint does not have the appropriate credentials for network access.

B.

The endpoint does not have the appropriate credentials for network access.

Answers
C.

The shared secret is incorrect on the switch or on Cisco ISE.

C.

The shared secret is incorrect on the switch or on Cisco ISE.

Answers
D.

The certificate on the switch is self-signed not a CA-provided certificate.

D.

The certificate on the switch is self-signed not a CA-provided certificate.

Answers
Suggested answer: B

An engineer tests Cisco ISE posture services on the network and must configure the compliance module to automatically download and install on endpoints Which action accomplishes this task for VPN users?

A.

Create a Cisco AnyConnect configuration and Client Provisioning policy within Cisco ISE.

A.

Create a Cisco AnyConnect configuration and Client Provisioning policy within Cisco ISE.

Answers
B.

Configure the compliance module to be downloaded from within the posture policy.

B.

Configure the compliance module to be downloaded from within the posture policy.

Answers
C.

Push the compliance module from Cisco FTD prior to attempting posture.

C.

Push the compliance module from Cisco FTD prior to attempting posture.

Answers
D.

Use a compound posture condition to check for the compliance module and download if needed.

D.

Use a compound posture condition to check for the compliance module and download if needed.

Answers
Suggested answer: A

Users in an organization report issues about having to remember multiple usernames and passwords. The network administrator wants the existing Cisco ISE deployment to utilize an external identity source to alleviate this issue. Which two requirements must be met to implement this change? (Choose two.)

A.

Enable IPC access over port 80.

A.

Enable IPC access over port 80.

Answers
B.

Ensure that the NAT address is properly configured

B.

Ensure that the NAT address is properly configured

Answers
C.

Establish access to one Global Catalog server.

C.

Establish access to one Global Catalog server.

Answers
D.

Provide domain administrator access to Active Directory.

D.

Provide domain administrator access to Active Directory.

Answers
E.

Configure a secure LDAP connection.

E.

Configure a secure LDAP connection.

Answers
Suggested answer: C, D

Which two external identity stores support EAP-TLS and PEAP-TLS? (Choose two.)

A.

Active Directory

A.

Active Directory

Answers
B.

RADIUS Token

B.

RADIUS Token

Answers
C.

Internal Database

C.

Internal Database

Answers
D.

RSA SecurlD

D.

RSA SecurlD

Answers
E.

LDAP

E.

LDAP

Answers
Suggested answer: A, E

What is a function of client provisioning?

A.

It ensures an application process is running on the endpoint.

A.

It ensures an application process is running on the endpoint.

Answers
B.

It checks a dictionary' attribute with a value.

B.

It checks a dictionary' attribute with a value.

Answers
C.

It ensures that endpoints receive the appropriate posture agents

C.

It ensures that endpoints receive the appropriate posture agents

Answers
D.

It checks the existence date and versions of the file on a client.

D.

It checks the existence date and versions of the file on a client.

Answers
Suggested answer: C

An administrator is troubleshooting an endpoint that is supposed to bypass 802 1X and use MAB. The endpoint is bypassing 802.1X and successfully getting network access using MAB. however the endpoint cannot communicate because it cannot obtain an IP address. What is the problem?

A.

The DHCP probe for Cisco ISE is not working as expected.

A.

The DHCP probe for Cisco ISE is not working as expected.

Answers
B.

The 802.1 X timeout period is too long.

B.

The 802.1 X timeout period is too long.

Answers
C.

The endpoint is using the wrong protocol to authenticate with Cisco ISE.

C.

The endpoint is using the wrong protocol to authenticate with Cisco ISE.

Answers
D.

An AC I on the port is blocking HTTP traffic

D.

An AC I on the port is blocking HTTP traffic

Answers
Suggested answer: B

A Cisco ISE administrator must restrict specific endpoints from accessing the network while in closed mode. The requirement is to have Cisco ISE centrally store the endpoints to restrict access from.

What must be done to accomplish this task''

A.

Add each MAC address manually to a blocklist identity group and create a policy denying access

A.

Add each MAC address manually to a blocklist identity group and create a policy denying access

Answers
B.

Create a logical profile for each device's profile policy and block that via authorization policies.

B.

Create a logical profile for each device's profile policy and block that via authorization policies.

Answers
C.

Create a profiling policy for each endpoint with the cdpCacheDeviceld attribute.

C.

Create a profiling policy for each endpoint with the cdpCacheDeviceld attribute.

Answers
D.

Add each IP address to a policy denying access.

D.

Add each IP address to a policy denying access.

Answers
Suggested answer: B

An engineer deploys Cisco ISE and must configure Active Directory to then use information from Active Directory in an authorization policy. Which two components must be configured, in addition to Active Directory groups, to achieve this goat? (Choose two )

A.

Active Directory External Identity Sources

A.

Active Directory External Identity Sources

Answers
B.

Library Condition for External Identity: External Groups

B.

Library Condition for External Identity: External Groups

Answers
C.

Identity Source Sequences

C.

Identity Source Sequences

Answers
D.

LDAP External Identity Sources

D.

LDAP External Identity Sources

Answers
E.

Library Condition for Identity Group: User Identity Group

E.

Library Condition for Identity Group: User Identity Group

Answers
Suggested answer: A, B

An engineer is working with a distributed deployment of Cisco ISE and needs to configure various network probes to collect a set of attributes from the endpoints on the network. Which node should be used to accomplish this task?

A.

PSN

A.

PSN

Answers
B.

primary PAN

B.

primary PAN

Answers
C.

pxGrid

C.

pxGrid

Answers
D.

MnT

D.

MnT

Answers
Suggested answer: A
Total 242 questions
Go to page: of 25