ExamGecko
Home Home / Cisco / 300-715

Cisco 300-715 Practice Test - Questions Answers, Page 2

Question list
Search
Search

Related questions











What must be configured on the Cisco ISE authentication policy for unknown MAC addresses/identities for successful authentication?

A.

pass

A.

pass

Answers
B.

reject

B.

reject

Answers
C.

drop

C.

drop

Answers
D.

continue

D.

continue

Answers
Suggested answer: D

Explanation:

https://www.cisco.com/en/US/docs/security/ise/1.0/user_guide/ise10_man_id_stores.html

Which two probes must be enabled for the ARP cache to function in the Cisco ISE profile service so that a user can reliably bind the IP address and MAC addresses of endpoints? (Choose two.)

A.

NetFlow

A.

NetFlow

Answers
B.

SNMP

B.

SNMP

Answers
C.

HTTP

C.

HTTP

Answers
D.

DHCP

D.

DHCP

Answers
E.

RADIUS

E.

RADIUS

Answers
Suggested answer: D, E

Explanation:

Cisco ISE implements an ARP cache in the profiling service, so that you can reliably map the IP addresses and the MAC addresses of endpoints. For the ARP cache to function, you must enable either the DHCP probe or the RADIUS probe. The DHCP and RADIUS probes carry the IP addresses and the MAC addresses of endpoints in the payload data. The dhcp-requested address attribute in the DHCP probe and the Framed-IP-address attribute in the RADIUS probe carry the IP addresses of endpoints, along with their MAC addresses, which can be mapped and stored in the ARP cache.

https://www.cisco.com/c/en/us/td/docs/security/ise/2-1/admin_guide/b_ise_admin_guide_21/b_ise_admin_guide_20_chapter_010100.html

Which RADIUS attribute is used to dynamically assign the Inactivity active timer for MAB users from the Cisco ISE node?

A.

session timeout

A.

session timeout

Answers
B.

idle timeout

B.

idle timeout

Answers
C.

radius-server timeout

C.

radius-server timeout

Answers
D.

termination-action

D.

termination-action

Answers
Suggested answer: B

Explanation:

When the inactivity timer is enabled, the switch monitors the activity from authenticated endpoints.

When the inactivity timer expires, the switch removes the authenticated session. The inactivity timer for MAB can be statically configured on the switch port, or it can be dynamically assigned using the RADIUS Idle-Timeout attribute

What must match between Cisco ISE and the network access device to successfully authenticate endpoints?

A.

SNMP version

A.

SNMP version

Answers
B.

shared secret

B.

shared secret

Answers
C.

certificate

C.

certificate

Answers
D.

profile

D.

profile

Answers
Suggested answer: B

Explanation:

https://www.cisco.com/en/US/docs/security/ise/1.0/user_guide/ise10_man_network_devices.html

Which two methods should a sponsor select to create bulk guest accounts from the sponsor portal?

(Choose two )

A.

Random

A.

Random

Answers
B.

Monthly

B.

Monthly

Answers
C.

Daily

C.

Daily

Answers
D.

Imported

D.

Imported

Answers
E.

Known

E.

Known

Answers
Suggested answer: A, D

How is policy services node redundancy achieved in a deployment?

A.

by enabling VIP

A.

by enabling VIP

Answers
B.

by utilizing RADIUS server list on the NAD

B.

by utilizing RADIUS server list on the NAD

Answers
C.

by creating a node group

C.

by creating a node group

Answers
D.

by deploying both primary and secondary node

D.

by deploying both primary and secondary node

Answers
Suggested answer: C

If a user reports a device lost or stolen, which portal should be used to prevent the device from accessing the network while still providing information about why the device is blocked?

A.

Client Provisioning

A.

Client Provisioning

Answers
B.

Guest

B.

Guest

Answers
C.

BYOD

C.

BYOD

Answers
D.

Blacklist

D.

Blacklist

Answers
Suggested answer: D

Explanation:

https://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/Borderless_Networks/Unified_Access/BYOD_Design_Guide/Managing_Lost_or_Stolen_Device.html#90273The Blacklist identity group is system generated and maintained by ISE to prevent access to lost orstolen devices. In this design guide, two authorization profiles are used to enforce the permissionsfor wireless and wired devices within the Blacklist:

Blackhole WiFi Access

Blackhole Wired Access

A user reports that the RADIUS accounting packets are not being seen on the Cisco ISE server.

Which command is the user missing in the switch's configuration?

A.

radius-server vsa send accounting

A.

radius-server vsa send accounting

Answers
B.

aaa accounting network default start-stop group radius

B.

aaa accounting network default start-stop group radius

Answers
C.

aaa accounting resource default start-stop group radius

C.

aaa accounting resource default start-stop group radius

Answers
D.

aaa accounting exec default start-stop group radios

D.

aaa accounting exec default start-stop group radios

Answers
Suggested answer: A

What are two benefits of TACACS+ versus RADIUS for device administration? (Choose two )

A.

TACACS+ supports 802.1X, and RADIUS supports MAB

A.

TACACS+ supports 802.1X, and RADIUS supports MAB

Answers
B.

TACACS+ uses UDP, and RADIUS uses TCP

B.

TACACS+ uses UDP, and RADIUS uses TCP

Answers
C.

TACACS+ has command authorization, and RADIUS does not.

C.

TACACS+ has command authorization, and RADIUS does not.

Answers
D.

TACACS+ provides the service type, and RADIUS does not

D.

TACACS+ provides the service type, and RADIUS does not

Answers
E.

TACACS+ encrypts the whole payload, and RADIUS encrypts only the password.

E.

TACACS+ encrypts the whole payload, and RADIUS encrypts only the password.

Answers
Suggested answer: C, E

Which two task types are included in the Cisco ISE common tasks support for TACACS+ profiles?

(Choose two.)

A.

Firepower

A.

Firepower

Answers
B.

WLC

B.

WLC

Answers
C.

IOS

C.

IOS

Answers
D.

ASA

D.

ASA

Answers
E.

Shell

E.

Shell

Answers
Suggested answer: B, E

Explanation:

https://www.cisco.com/c/en/us/td/docs/security/ise/2-1/admin_guide/b_ise_admin_guide_21/b_ise_admin_guide_20_chapter_0100010.htmlTACACS+ ProfileTACACS+ profiles control the initial login session of the device administrator. A session refers to eachindividual authentication, authorization, or accounting request. A session authorization request to anetwork device elicits an ISE response. The response includes a token that is interpreted by thenetwork device, which limits the commands that may be executed for the duration of a session. Theauthorization policy for a device administration access service can contain a single shell profile andmultiple command sets. The TACACS+ profile definitions are split into two components:

Common tasks

Custom attributes

There are two views in the TACACS+ Profiles page (Work Centers > Device Administration > Policy Elements > Results > TACACS Profiles)—Task Attribute View and Raw View. Common tasks can be entered using the Task

Attribute View and custom attributes can be created in the Task Attribute View as well as the Raw View.

The Common Tasks section allows you to select and configure the frequently used attributes for a profile. The attributes that are included here are those defined by the TACACS+ protocol draft specifications. However, the values can be used in the authorization of requests from other services.

In the Task Attribute View, the ISE administrator can set the privileges that will be assigned to the device administrator. The common task types are:

Shell

WLC

Nexus

Generic

The Custom Attributes section allows you to configure additional attributes. It provides a list of attributes that are not recognized by the Common Tasks section. Each definition consists of the attribute name, an indication of whether the attribute is mandatory or optional, and the value for the attribute. In the Raw View, you can enter the mandatory attributes using a equal to (=) sign between the attribute name and its value and optional attributes are entered using an asterisk (*) between the attribute name and its value. The attributes entered in the Raw View are reflected in the Custom Attributes section in the Task Attribute View and vice versa. The Raw View is also used to copy paste the attribute list (for example, another product's attribute list) from the clipboard onto ISE. Custom attributes can be defined for nonshell services.

Total 242 questions
Go to page: of 25