ExamGecko
Home Home / Cisco / 300-715

Cisco 300-715 Practice Test - Questions Answers, Page 20

Question list
Search
Search

List of questions

Search

Related questions











Which compliance status is set when a matching posture policy has been defined for that endpomt. but all the mandatory requirements during posture assessment are not met?

A.

unauthorized

A.

unauthorized

Answers
B.

untrusted

B.

untrusted

Answers
C.

non-compliant

C.

non-compliant

Answers
D.

unknown

D.

unknown

Answers
Suggested answer: C

A Cisco device has a port configured in multi-authentication mode and is accepting connections only from hosts assigned the SGT of SGT_0422048549 The VLAN trunk link supports a maximum of 8 VLANS What is the reason for these restrictions?

A.

The device is performing inline tagging without acting as a SXP speaker

A.

The device is performing inline tagging without acting as a SXP speaker

Answers
B.

The device is performing mime tagging while acting as a SXP speaker

B.

The device is performing mime tagging while acting as a SXP speaker

Answers
C.

The IP subnet addresses are dynamically mapped to an SGT.

C.

The IP subnet addresses are dynamically mapped to an SGT.

Answers
D.

The IP subnet addresses are statically mapped to an SGT

D.

The IP subnet addresses are statically mapped to an SGT

Answers
Suggested answer: C

An administrator wants to configure network device administration and is trying to decide whether to use TACACS* or RADIUS. A reliable protocol must be used that can check command authorization Which protocol meets these requirements and why?

A.

TACACS+ because it runs over TCP

A.

TACACS+ because it runs over TCP

Answers
B.

RADIUS because it runs over UDP

B.

RADIUS because it runs over UDP

Answers
C.

RADIUS because it runs over TCP.

C.

RADIUS because it runs over TCP.

Answers
D.

TACACS+ because it runs over UDP

D.

TACACS+ because it runs over UDP

Answers
Suggested answer: A

An administrator has added a new Cisco ISE PSN to their distributed deployment. Which two features must the administrator enable to accept authentication requests and profile the endpoints correctly, and add them to their respective endpoint identity groups? (Choose two )

A.

Session Services

A.

Session Services

Answers
B.

Endpoint Attribute Filter

B.

Endpoint Attribute Filter

Answers
C.

Posture Services

C.

Posture Services

Answers
D.

Profiling Services

D.

Profiling Services

Answers
E.

Radius Service

E.

Radius Service

Answers
Suggested answer: D, E

Refer to the exhibit.

Which two configurations are needed on a catalyst switch for it to be added as a network access device in a Cisco ISE that is being used for 802 1X authentications? (Choose two )

A.

Option A

A.

Option A

Answers
B.

Option B

B.

Option B

Answers
C.

Option C

C.

Option C

Answers
D.

Option D

D.

Option D

Answers
E.

Option E

E.

Option E

Answers
Suggested answer: A, C

An administrator is configuring sponsored guest access using Cisco ISE Access must be restricted to the sponsor portal to ensure that only necessary employees can issue sponsored accounts and employees must be classified to do so

What must be done to accomplish this task?

A.

Configure an identity-based access list in Cisco ISE to restrict the users allowed to login

A.

Configure an identity-based access list in Cisco ISE to restrict the users allowed to login

Answers
B.

Edit the sponsor portal to only accept members from the selected groups

B.

Edit the sponsor portal to only accept members from the selected groups

Answers
C.

Modify the sponsor groups assigned to reflect the desired user groups

C.

Modify the sponsor groups assigned to reflect the desired user groups

Answers
D.

Create an authorization rule using the Guest Flow condition to authorize the administrators

D.

Create an authorization rule using the Guest Flow condition to authorize the administrators

Answers
Suggested answer: C

Refer to the exhibit.

An engineer is configuring a client but cannot authenticate to Cisco ISE During troubleshooting, the show authentication sessions command was issued to display the authentication status of each port Which command gives additional information to help identify the problem with the authentication?

A.

show authentication sessions

A.

show authentication sessions

Answers
B.

show authentication sessions Interface Gil/0/1 output

B.

show authentication sessions Interface Gil/0/1 output

Answers
C.

show authentication sessions interface Gi1/0/1 details

C.

show authentication sessions interface Gi1/0/1 details

Answers
D.

show authentication sessions output

D.

show authentication sessions output

Answers
Suggested answer: C

An administrator is manually adding a device to a Cisco ISE identity group to ensure that it is able to access the network when needed without authentication Upon testing, the administrator notices that the device never hits the correct authorization policy line using the condition EndPoints LogicalProfile EQUALS static_list Why is this occurring?

A.

The dynamic logical profile is overriding the statically assigned profile

A.

The dynamic logical profile is overriding the statically assigned profile

Answers
B.

The device is changing identity groups after profiling instead ot remaining static

B.

The device is changing identity groups after profiling instead ot remaining static

Answers
C.

The logical profile is being statically assigned instead of the identity group

C.

The logical profile is being statically assigned instead of the identity group

Answers
D.

The identity group is being assigned instead of the logical profile

D.

The identity group is being assigned instead of the logical profile

Answers
Suggested answer: C

An engineer is creating a new authorization policy to give the endpoints access to VLAN 310 upon successful authentication The administrator tests the 802.1X authentication for the endpoint and sees that it is authenticating successfully

What must be done to ensure that the endpoint is placed into the correct VLAN?

A.

Configure the switchport access vlan 310 command on the switch port

A.

Configure the switchport access vlan 310 command on the switch port

Answers
B.

Ensure that the security group is not preventing the endpoint from being in VLAN 310

B.

Ensure that the security group is not preventing the endpoint from being in VLAN 310

Answers
C.

Add VLAN 310 in the common tasks of the authorization profile

C.

Add VLAN 310 in the common tasks of the authorization profile

Answers
D.

Ensure that the endpoint is using The correct policy set

D.

Ensure that the endpoint is using The correct policy set

Answers
Suggested answer: C

An engineer is configuring posture assessment for their network access control and needs to use an agent that supports using service conditions as conditions for the assessment. The agent should be run as a background process to avoid user interruption but when it is run. the user can see it. What is the problem?

A.

The engineer is using the "Anyconnect” posture agent but should be using the "Stealth Anyconnect posture agent

A.

The engineer is using the "Anyconnect” posture agent but should be using the "Stealth Anyconnect posture agent

Answers
B.

The posture module was deployed using the headend instead of installing it with SCCM

B.

The posture module was deployed using the headend instead of installing it with SCCM

Answers
C.

The user was in need of remediation so the agent appeared m the notifications

C.

The user was in need of remediation so the agent appeared m the notifications

Answers
D.

The proper permissions were no! given to the temporal agent to conduct the assessment

D.

The proper permissions were no! given to the temporal agent to conduct the assessment

Answers
Suggested answer: A
Total 242 questions
Go to page: of 25