ExamGecko
Home / Cisco / 300-715 / List of questions
Ask Question

Cisco 300-715 Practice Test - Questions Answers, Page 2

List of questions

Question 11

Report
Export
Collapse

What must be configured on the Cisco ISE authentication policy for unknown MAC addresses/identities for successful authentication?

pass

pass

reject

reject

drop

drop

continue

continue

Suggested answer: D

Explanation:

https://www.cisco.com/en/US/docs/security/ise/1.0/user_guide/ise10_man_id_stores.html

asked 07/10/2024
Derrick Roberson
35 questions

Question 12

Report
Export
Collapse

Which two probes must be enabled for the ARP cache to function in the Cisco ISE profile service so that a user can reliably bind the IP address and MAC addresses of endpoints? (Choose two.)

NetFlow

NetFlow

SNMP

SNMP

HTTP

HTTP

DHCP

DHCP

RADIUS

RADIUS

Suggested answer: D, E

Explanation:

Cisco ISE implements an ARP cache in the profiling service, so that you can reliably map the IP addresses and the MAC addresses of endpoints. For the ARP cache to function, you must enable either the DHCP probe or the RADIUS probe. The DHCP and RADIUS probes carry the IP addresses and the MAC addresses of endpoints in the payload data. The dhcp-requested address attribute in the DHCP probe and the Framed-IP-address attribute in the RADIUS probe carry the IP addresses of endpoints, along with their MAC addresses, which can be mapped and stored in the ARP cache.

https://www.cisco.com/c/en/us/td/docs/security/ise/2-1/admin_guide/b_ise_admin_guide_21/b_ise_admin_guide_20_chapter_010100.html

asked 07/10/2024
Andres Montero
32 questions

Question 13

Report
Export
Collapse

Which RADIUS attribute is used to dynamically assign the Inactivity active timer for MAB users from the Cisco ISE node?

session timeout

session timeout

idle timeout

idle timeout

radius-server timeout

radius-server timeout

termination-action

termination-action

Suggested answer: B

Explanation:

When the inactivity timer is enabled, the switch monitors the activity from authenticated endpoints.

When the inactivity timer expires, the switch removes the authenticated session. The inactivity timer for MAB can be statically configured on the switch port, or it can be dynamically assigned using the RADIUS Idle-Timeout attribute

asked 07/10/2024
AARON MCCOMBS
46 questions

Question 14

Report
Export
Collapse

What must match between Cisco ISE and the network access device to successfully authenticate endpoints?

SNMP version

SNMP version

shared secret

shared secret

certificate

certificate

profile

profile

Suggested answer: B

Explanation:

https://www.cisco.com/en/US/docs/security/ise/1.0/user_guide/ise10_man_network_devices.html

asked 07/10/2024
Vicky Mukhy
31 questions

Question 15

Report
Export
Collapse

Which two methods should a sponsor select to create bulk guest accounts from the sponsor portal?

(Choose two )

Random

Random

Monthly

Monthly

Daily

Daily

Imported

Imported

Known

Known

Suggested answer: A, D
asked 07/10/2024
Srinivasan Kumaresan
36 questions

Question 16

Report
Export
Collapse

How is policy services node redundancy achieved in a deployment?

by enabling VIP

by enabling VIP

by utilizing RADIUS server list on the NAD

by utilizing RADIUS server list on the NAD

by creating a node group

by creating a node group

by deploying both primary and secondary node

by deploying both primary and secondary node

Suggested answer: C
asked 07/10/2024
Tebogo Maphafo
36 questions

Question 17

Report
Export
Collapse

If a user reports a device lost or stolen, which portal should be used to prevent the device from accessing the network while still providing information about why the device is blocked?

Client Provisioning

Client Provisioning

Guest

Guest

BYOD

BYOD

Blacklist

Blacklist

Suggested answer: D

Explanation:

https://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/Borderless_Networks/Unified_Access/BYOD_Design_Guide/Managing_Lost_or_Stolen_Device.html#90273The Blacklist identity group is system generated and maintained by ISE to prevent access to lost orstolen devices. In this design guide, two authorization profiles are used to enforce the permissionsfor wireless and wired devices within the Blacklist:

Blackhole WiFi Access

Blackhole Wired Access

asked 07/10/2024
Sam Poon
40 questions

Question 18

Report
Export
Collapse

A user reports that the RADIUS accounting packets are not being seen on the Cisco ISE server.

Which command is the user missing in the switch's configuration?

radius-server vsa send accounting

radius-server vsa send accounting

aaa accounting network default start-stop group radius

aaa accounting network default start-stop group radius

aaa accounting resource default start-stop group radius

aaa accounting resource default start-stop group radius

aaa accounting exec default start-stop group radios

aaa accounting exec default start-stop group radios

Suggested answer: A
asked 07/10/2024
Franjo Tomurad
27 questions

Question 19

Report
Export
Collapse

What are two benefits of TACACS+ versus RADIUS for device administration? (Choose two )

TACACS+ supports 802.1X, and RADIUS supports MAB

TACACS+ supports 802.1X, and RADIUS supports MAB

TACACS+ uses UDP, and RADIUS uses TCP

TACACS+ uses UDP, and RADIUS uses TCP

TACACS+ has command authorization, and RADIUS does not.

TACACS+ has command authorization, and RADIUS does not.

TACACS+ provides the service type, and RADIUS does not

TACACS+ provides the service type, and RADIUS does not

TACACS+ encrypts the whole payload, and RADIUS encrypts only the password.

TACACS+ encrypts the whole payload, and RADIUS encrypts only the password.

Suggested answer: C, E
asked 07/10/2024
Orenthial Johnson
31 questions

Question 20

Report
Export
Collapse

Which two task types are included in the Cisco ISE common tasks support for TACACS+ profiles?

(Choose two.)

Firepower

Firepower

WLC

WLC

IOS

IOS

ASA

ASA

Shell

Shell

Suggested answer: B, E

Explanation:

https://www.cisco.com/c/en/us/td/docs/security/ise/2-1/admin_guide/b_ise_admin_guide_21/b_ise_admin_guide_20_chapter_0100010.htmlTACACS+ ProfileTACACS+ profiles control the initial login session of the device administrator. A session refers to eachindividual authentication, authorization, or accounting request. A session authorization request to anetwork device elicits an ISE response. The response includes a token that is interpreted by thenetwork device, which limits the commands that may be executed for the duration of a session. Theauthorization policy for a device administration access service can contain a single shell profile andmultiple command sets. The TACACS+ profile definitions are split into two components:

Common tasks

Custom attributes

There are two views in the TACACS+ Profiles page (Work Centers > Device Administration > Policy Elements > Results > TACACS Profiles)—Task Attribute View and Raw View. Common tasks can be entered using the Task

Attribute View and custom attributes can be created in the Task Attribute View as well as the Raw View.

The Common Tasks section allows you to select and configure the frequently used attributes for a profile. The attributes that are included here are those defined by the TACACS+ protocol draft specifications. However, the values can be used in the authorization of requests from other services.

In the Task Attribute View, the ISE administrator can set the privileges that will be assigned to the device administrator. The common task types are:

Shell

WLC

Nexus

Generic

The Custom Attributes section allows you to configure additional attributes. It provides a list of attributes that are not recognized by the Common Tasks section. Each definition consists of the attribute name, an indication of whether the attribute is mandatory or optional, and the value for the attribute. In the Raw View, you can enter the mandatory attributes using a equal to (=) sign between the attribute name and its value and optional attributes are entered using an asterisk (*) between the attribute name and its value. The attributes entered in the Raw View are reflected in the Custom Attributes section in the Task Attribute View and vice versa. The Raw View is also used to copy paste the attribute list (for example, another product's attribute list) from the clipboard onto ISE. Custom attributes can be defined for nonshell services.

asked 07/10/2024
david buisan garcia
30 questions
Total 242 questions
Go to page: of 25

Related questions