Cisco 300-715 Practice Test - Questions Answers, Page 2
List of questions
Question 11
![Export Export](https://examgecko.com/assets/images/icon-download-24.png)
What must be configured on the Cisco ISE authentication policy for unknown MAC addresses/identities for successful authentication?
pass
reject
drop
continue
Explanation:
https://www.cisco.com/en/US/docs/security/ise/1.0/user_guide/ise10_man_id_stores.html
Question 12
![Export Export](https://examgecko.com/assets/images/icon-download-24.png)
Which two probes must be enabled for the ARP cache to function in the Cisco ISE profile service so that a user can reliably bind the IP address and MAC addresses of endpoints? (Choose two.)
NetFlow
SNMP
HTTP
DHCP
RADIUS
Explanation:
Cisco ISE implements an ARP cache in the profiling service, so that you can reliably map the IP addresses and the MAC addresses of endpoints. For the ARP cache to function, you must enable either the DHCP probe or the RADIUS probe. The DHCP and RADIUS probes carry the IP addresses and the MAC addresses of endpoints in the payload data. The dhcp-requested address attribute in the DHCP probe and the Framed-IP-address attribute in the RADIUS probe carry the IP addresses of endpoints, along with their MAC addresses, which can be mapped and stored in the ARP cache.
https://www.cisco.com/c/en/us/td/docs/security/ise/2-1/admin_guide/b_ise_admin_guide_21/b_ise_admin_guide_20_chapter_010100.html
Question 13
![Export Export](https://examgecko.com/assets/images/icon-download-24.png)
Which RADIUS attribute is used to dynamically assign the Inactivity active timer for MAB users from the Cisco ISE node?
session timeout
idle timeout
radius-server timeout
termination-action
Explanation:
When the inactivity timer is enabled, the switch monitors the activity from authenticated endpoints.
When the inactivity timer expires, the switch removes the authenticated session. The inactivity timer for MAB can be statically configured on the switch port, or it can be dynamically assigned using the RADIUS Idle-Timeout attribute
Question 14
![Export Export](https://examgecko.com/assets/images/icon-download-24.png)
What must match between Cisco ISE and the network access device to successfully authenticate endpoints?
SNMP version
shared secret
certificate
profile
Explanation:
https://www.cisco.com/en/US/docs/security/ise/1.0/user_guide/ise10_man_network_devices.html
Question 15
![Export Export](https://examgecko.com/assets/images/icon-download-24.png)
Which two methods should a sponsor select to create bulk guest accounts from the sponsor portal?
(Choose two )
Random
Monthly
Daily
Imported
Known
Question 16
![Export Export](https://examgecko.com/assets/images/icon-download-24.png)
How is policy services node redundancy achieved in a deployment?
by enabling VIP
by utilizing RADIUS server list on the NAD
by creating a node group
by deploying both primary and secondary node
Question 17
![Export Export](https://examgecko.com/assets/images/icon-download-24.png)
If a user reports a device lost or stolen, which portal should be used to prevent the device from accessing the network while still providing information about why the device is blocked?
Client Provisioning
Guest
BYOD
Blacklist
Explanation:
https://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/Borderless_Networks/Unified_Access/BYOD_Design_Guide/Managing_Lost_or_Stolen_Device.html#90273The Blacklist identity group is system generated and maintained by ISE to prevent access to lost orstolen devices. In this design guide, two authorization profiles are used to enforce the permissionsfor wireless and wired devices within the Blacklist:
Blackhole WiFi Access
Blackhole Wired Access
Question 18
![Export Export](https://examgecko.com/assets/images/icon-download-24.png)
A user reports that the RADIUS accounting packets are not being seen on the Cisco ISE server.
Which command is the user missing in the switch's configuration?
radius-server vsa send accounting
aaa accounting network default start-stop group radius
aaa accounting resource default start-stop group radius
aaa accounting exec default start-stop group radios
Question 19
![Export Export](https://examgecko.com/assets/images/icon-download-24.png)
What are two benefits of TACACS+ versus RADIUS for device administration? (Choose two )
TACACS+ supports 802.1X, and RADIUS supports MAB
TACACS+ uses UDP, and RADIUS uses TCP
TACACS+ has command authorization, and RADIUS does not.
TACACS+ provides the service type, and RADIUS does not
TACACS+ encrypts the whole payload, and RADIUS encrypts only the password.
Question 20
![Export Export](https://examgecko.com/assets/images/icon-download-24.png)
Which two task types are included in the Cisco ISE common tasks support for TACACS+ profiles?
(Choose two.)
Firepower
WLC
IOS
ASA
Shell
Explanation:
https://www.cisco.com/c/en/us/td/docs/security/ise/2-1/admin_guide/b_ise_admin_guide_21/b_ise_admin_guide_20_chapter_0100010.htmlTACACS+ ProfileTACACS+ profiles control the initial login session of the device administrator. A session refers to eachindividual authentication, authorization, or accounting request. A session authorization request to anetwork device elicits an ISE response. The response includes a token that is interpreted by thenetwork device, which limits the commands that may be executed for the duration of a session. Theauthorization policy for a device administration access service can contain a single shell profile andmultiple command sets. The TACACS+ profile definitions are split into two components:
Common tasks
Custom attributes
There are two views in the TACACS+ Profiles page (Work Centers > Device Administration > Policy Elements > Results > TACACS Profiles)—Task Attribute View and Raw View. Common tasks can be entered using the Task
Attribute View and custom attributes can be created in the Task Attribute View as well as the Raw View.
The Common Tasks section allows you to select and configure the frequently used attributes for a profile. The attributes that are included here are those defined by the TACACS+ protocol draft specifications. However, the values can be used in the authorization of requests from other services.
In the Task Attribute View, the ISE administrator can set the privileges that will be assigned to the device administrator. The common task types are:
Shell
WLC
Nexus
Generic
The Custom Attributes section allows you to configure additional attributes. It provides a list of attributes that are not recognized by the Common Tasks section. Each definition consists of the attribute name, an indication of whether the attribute is mandatory or optional, and the value for the attribute. In the Raw View, you can enter the mandatory attributes using a equal to (=) sign between the attribute name and its value and optional attributes are entered using an asterisk (*) between the attribute name and its value. The attributes entered in the Raw View are reflected in the Custom Attributes section in the Task Attribute View and vice versa. The Raw View is also used to copy paste the attribute list (for example, another product's attribute list) from the clipboard onto ISE. Custom attributes can be defined for nonshell services.
Question