ExamGecko
Home Home / Cisco / 300-715

Cisco 300-715 Practice Test - Questions Answers, Page 18

Question list
Search
Search

List of questions

Search

Related questions











An administrator is configuring a new profiling policy in Cisco ISE for a printer type that is missing from the profiler feed The logical profile Printers must be used in the authorization rule and the rule must be hit. What must be done to ensure that this configuration will be successful^

A.

Create a new logical profile for the new printer policy

A.

Create a new logical profile for the new printer policy

Answers
B.

Enable the EndPoints:EndPointPolicy condition in the authorization policy.

B.

Enable the EndPoints:EndPointPolicy condition in the authorization policy.

Answers
C.

Add the new profiling policy to the logical profile Printers.

C.

Add the new profiling policy to the logical profile Printers.

Answers
D.

Modify the profiler conditions to ensure that it goes into the correct logical profile

D.

Modify the profiler conditions to ensure that it goes into the correct logical profile

Answers
Suggested answer: B

Which two default guest portals are available with Cisco ISE? (Choose two.)

A.

visitor

A.

visitor

Answers
B.

WIFI-access

B.

WIFI-access

Answers
C.

self-registered

C.

self-registered

Answers
D.

central web authentication

D.

central web authentication

Answers
E.

sponsored

E.

sponsored

Answers
Suggested answer: C, E

An engineer builds a five-node distributed Cisco ISE deployment The first two deployed nodes are responsible for the primary and secondary administration and monitoring personas Which persona configuration is necessary to have the remaining three Cisco ISE nodes serve as dedicated nodes in the Cisco ISE cube that is responsible only for handling the RADIUS and TACACS+ authentication requests, identity lookups, and policy evaluation?

A.

Option A

A.

Option A

Answers
B.

Option B

B.

Option B

Answers
C.

Option C

C.

Option C

Answers
D.

Option D

D.

Option D

Answers
Suggested answer: B

An administrator is configuring a switch port for use with 802 1X What must be done so that the port will allow voice and multiple data endpoints?

A.

Configure the port with the authentication host-mode multi-auth command

A.

Configure the port with the authentication host-mode multi-auth command

Answers
B.

Connect the data devices to the port, then attach the phone behind them.

B.

Connect the data devices to the port, then attach the phone behind them.

Answers
C.

Use the command authentication host-mode multi-domain on the port

C.

Use the command authentication host-mode multi-domain on the port

Answers
D.

Connect a hub to the switch port to allow multiple devices access after authentication

D.

Connect a hub to the switch port to allow multiple devices access after authentication

Answers
Suggested answer: A

Refer to the exhibit.

An engineer is configuring Cisco ISE for guest services They would like to have any unregistered guests redirected to the guest portal for authentication then have a CoA provide them with full access to the network that is segmented via firewalls Why is the given configuration failing to accomplish this goal?

A.

The Guest Flow condition is not in the line that gives access to the quest portal

A.

The Guest Flow condition is not in the line that gives access to the quest portal

Answers
B.

The Network_Access_Authentication_Passed condition will not work with guest services for portal access.

B.

The Network_Access_Authentication_Passed condition will not work with guest services for portal access.

Answers
C.

The Permit Access result is not set to restricted access in its policy line

C.

The Permit Access result is not set to restricted access in its policy line

Answers
D.

The Guest Portal and Guest Access policy lines are in the wrong order

D.

The Guest Portal and Guest Access policy lines are in the wrong order

Answers
Suggested answer: D

An engineer is configuring ISE for network device administration and has devices that support both protocols. What are two benefits of choosing TACACS+ over RADUs for these devices? (Choose two.)

A.

TACACS+ is FIPS compliant while RADIUS is not

A.

TACACS+ is FIPS compliant while RADIUS is not

Answers
B.

TACACS+ is designed for network access control while RADIUS is designed for role-based access.

B.

TACACS+ is designed for network access control while RADIUS is designed for role-based access.

Answers
C.

TACACS+ uses secure EAP-TLS while RADIUS does not.

C.

TACACS+ uses secure EAP-TLS while RADIUS does not.

Answers
D.

TACACS+ provides the ability to authorize specific commands while RADIUS does not

D.

TACACS+ provides the ability to authorize specific commands while RADIUS does not

Answers
E.

TACACS+ encrypts the entire payload being sent while RADIUS only encrypts the password.

E.

TACACS+ encrypts the entire payload being sent while RADIUS only encrypts the password.

Answers
Suggested answer: D, E

During a 802 1X deployment, an engineer must identify failed authentications without causing problems for the connected endpoint. Which command will successfully achieve this''

A.

dotlxsystem-auth-control

A.

dotlxsystem-auth-control

Answers
B.

dotlx pae authenticator

B.

dotlx pae authenticator

Answers
C.

authentication open

C.

authentication open

Answers
D.

authentication port-control auto

D.

authentication port-control auto

Answers
Suggested answer: C

An engineer is configuring 802.1X and is testing out their policy sets. After authentication, some endpoints are given an access-reject message but are still allowed onto the network. What is causing this issue to occur?

A.

The switch port is configured with authentication event server dead action authorize vlan.

A.

The switch port is configured with authentication event server dead action authorize vlan.

Answers
B.

The authorization results for the endpoints include a dACL allowing access.

B.

The authorization results for the endpoints include a dACL allowing access.

Answers
C.

The authorization results for the endpoints include the Trusted security group tag.

C.

The authorization results for the endpoints include the Trusted security group tag.

Answers
D.

The switch port is configured with authentication open.

D.

The switch port is configured with authentication open.

Answers
Suggested answer: D

An engineer has been tasked with standing up a new guest portal for customers that are waiting in the lobby. There is a requirement to allow guests to use their social media logins to access the guest network to appeal to more customers

What must be done to accomplish this task?

A.

Create a sponsor portal to allow guests to create accounts using their social media logins.

A.

Create a sponsor portal to allow guests to create accounts using their social media logins.

Answers
B.

Create a sponsored guest portal and enable social media in the external identity sources.

B.

Create a sponsored guest portal and enable social media in the external identity sources.

Answers
C.

Create a self-registered guest portal and enable the feature for social media logins

C.

Create a self-registered guest portal and enable the feature for social media logins

Answers
D.

Create a hotspot portal and enable social media login for network access

D.

Create a hotspot portal and enable social media login for network access

Answers
Suggested answer: C

Which Cisco ISE deployment model provides redundancy by having every node in the deployment configured with the Administration. Policy Service, and Monitoring personas to protect from a complete node failure?

A.

distributed

A.

distributed

Answers
B.

dispersed

B.

dispersed

Answers
C.

two-node

C.

two-node

Answers
D.

hybrid

D.

hybrid

Answers
Suggested answer: C
Total 242 questions
Go to page: of 25