ExamGecko
Home Home / Cisco / 300-715

Cisco 300-715 Practice Test - Questions Answers, Page 17

Question list
Search
Search

List of questions

Search

Related questions











An engineer is configuring TACACS+ within Cisco ISE for use with a non-Cisco network device. They need to send special attributes in the Access-Accept response to ensure that the users are given the appropriate access. What must be configured to accomplish this'?

A.

dACLs to enforce the various access policies for the users

A.

dACLs to enforce the various access policies for the users

Answers
B.

custom access conditions for defining the different roles

B.

custom access conditions for defining the different roles

Answers
C.

shell profiles with custom attributes that define the various roles

C.

shell profiles with custom attributes that define the various roles

Answers
D.

TACACS+ command sets to provide appropriate access

D.

TACACS+ command sets to provide appropriate access

Answers
Suggested answer: C

An engineer is configuring Cisco ISE policies to support MAB for devices that do not have 802.1X capabilities. The engineer is configuring new endpoint identity groups as conditions to be used in the AuthZ policies, but noticed that the endpoints are not hitting the correct policies. What must be done in order to get the devices into the right policies?

A.

Manually add the MAC addresses of the devices to endpoint ID groups in the context visibility database.

A.

Manually add the MAC addresses of the devices to endpoint ID groups in the context visibility database.

Answers
B.

Create an AuthZ policy to identify Unknown devices and provide partial network access prior to profiling.

B.

Create an AuthZ policy to identify Unknown devices and provide partial network access prior to profiling.

Answers
C.

Add an identity policy to dynamically add the IP address of the devices to their endpoint identity groups.

C.

Add an identity policy to dynamically add the IP address of the devices to their endpoint identity groups.

Answers
D.

Identify the non 802.1 * supported device types and create custom profiles for them to profile into.

D.

Identify the non 802.1 * supported device types and create custom profiles for them to profile into.

Answers
Suggested answer: D

An administrator is configuring a Cisco WLC for web authentication Which two client profiling methods are enabled by default if the Apply Cisco ISE Default Settings check box has been selected'?

(Choose two.)

A.

CDP

A.

CDP

Answers
B.

DHCP

B.

DHCP

Answers
C.

HTTP

C.

HTTP

Answers
D.

SNMP

D.

SNMP

Answers
E.

LLDP

E.

LLDP

Answers
Suggested answer: A, E

An administrator needs to allow guest devices to connect to a private network without requiring usernames and passwords. Which two features must be configured to allow for this? (Choose two.)

A.

hotspot guest portal

A.

hotspot guest portal

Answers
B.

device registration WebAuth

B.

device registration WebAuth

Answers
C.

central WebAuth

C.

central WebAuth

Answers
D.

local WebAuth

D.

local WebAuth

Answers
E.

self-registered guest portal

E.

self-registered guest portal

Answers
Suggested answer: A, B

An engineer is enabling a newly configured wireless SSID for tablets and needs visibility into which other types of devices are connecting to it. What must be done on the Cisco WLC to provide this information to Cisco ISE9

A.

enable IP Device Tracking

A.

enable IP Device Tracking

Answers
B.

enable MAC filtering

B.

enable MAC filtering

Answers
C.

enable Fast Transition

C.

enable Fast Transition

Answers
D.

enable mDNS snooping

D.

enable mDNS snooping

Answers
Suggested answer: B

A network administrator is currently using Cisco ISE to authenticate devices and users via 802 1X There is now a need to also authorize devices and users using EAP-TLS. Which two additional components must be configured in Cisco ISE to accomplish this'? (Choose two.)

A.

Network Device Group

A.

Network Device Group

Answers
B.

Serial Number attribute that maps to a CA Server

B.

Serial Number attribute that maps to a CA Server

Answers
C.

Common Name attribute that maps to an identity store

C.

Common Name attribute that maps to an identity store

Answers
D.

Certificate Authentication Profile

D.

Certificate Authentication Profile

Answers
E.

EAP Authorization Profile

E.

EAP Authorization Profile

Answers
Suggested answer: C, D

An engineer is configuring sponsored guest access and needs to limit each sponsored guest to a maximum of two devices. There are other guest services in production that rely on the default guest types. How should this configuration change be made without disrupting the other guest services currently offering three or more guest devices per user?

A.

Create an ISE identity group to add users to and limit the number of logins via the group configuration.

A.

Create an ISE identity group to add users to and limit the number of logins via the group configuration.

Answers
B.

Create a new guest type and set the maximum number of devices sponsored guests can register

B.

Create a new guest type and set the maximum number of devices sponsored guests can register

Answers
C.

Create an LDAP login for each guest and tag that in the guest portal for authentication.

C.

Create an LDAP login for each guest and tag that in the guest portal for authentication.

Answers
D.

Create a new sponsor group and adjust the settings to limit the devices for each guest.

D.

Create a new sponsor group and adjust the settings to limit the devices for each guest.

Answers
Suggested answer: D

A Cisco ISE administrator needs to ensure that guest endpoint registrations are only valid for 1 day.

When testing the guest policy flow, the administrator sees that the Cisco ISE does not delete the endpoint in the Guest Endpoints identity store after one day and allows access to the guest network after that period. Which configuration is causing this problem?

A.

The RADIUS policy set for guest access is set to allow repeated authentication of the same device.

A.

The RADIUS policy set for guest access is set to allow repeated authentication of the same device.

Answers
B.

The length of access is set to 7 days in the Guest Portal Settings.

B.

The length of access is set to 7 days in the Guest Portal Settings.

Answers
C.

The Endpoint Purge Policy is set to 30 days for guest devices.

C.

The Endpoint Purge Policy is set to 30 days for guest devices.

Answers
D.

The Guest Account Purge Policy is set to 15 days.

D.

The Guest Account Purge Policy is set to 15 days.

Answers
Suggested answer: C

An employee must access the internet through the corporate network from a new mobile device that does not support native supplicant provisioning provided by Cisco ISE. Which portal must the employee use to provision to the device?

A.

BYOD

A.

BYOD

Answers
B.

Personal Device

B.

Personal Device

Answers
C.

My Devices

C.

My Devices

Answers
D.

Client Provisioning

D.

Client Provisioning

Answers
Suggested answer: C

What are two differences between the RADIUS and TACACS+ protocols'? (Choose two.)

A.

RADIUS is a Cisco proprietary protocol, whereas TACACS+ is an open standard protocol

A.

RADIUS is a Cisco proprietary protocol, whereas TACACS+ is an open standard protocol

Answers
B.

TACACS+uses TCP port 49. whereas RADIUS uses UDP ports 1812 and 1813.

B.

TACACS+uses TCP port 49. whereas RADIUS uses UDP ports 1812 and 1813.

Answers
C.

RADIUS offers multiprotocol support, whereas TACACS+ does not

C.

RADIUS offers multiprotocol support, whereas TACACS+ does not

Answers
D.

RADIUS combines authentication and authorization, whereas TACACS+ does not

D.

RADIUS combines authentication and authorization, whereas TACACS+ does not

Answers
E.

RADIUS enables encryption of all the packets, whereas with TACACS+. only the password is encrypted.

E.

RADIUS enables encryption of all the packets, whereas with TACACS+. only the password is encrypted.

Answers
Suggested answer: B, D
Total 242 questions
Go to page: of 25