ExamGecko
Home Home / Cisco / 300-715

Cisco 300-715 Practice Test - Questions Answers, Page 22

Question list
Search
Search

List of questions

Search

Related questions











What is a valid status of an endpoint attribute during the device registration process?

A.

block listed

A.

block listed

Answers
B.

pending

B.

pending

Answers
C.

unknown

C.

unknown

Answers
D.

DenyAccess

D.

DenyAccess

Answers
Suggested answer: B

An administrator is configuring the Native Supplicant Profile to be used with the Cisco ISE posture agents and needs to test the connection using wired devices to determine which profile settings are available. Which two configuration settings should be used to accomplish this task? (Choose two.)

A.

authentication mode

A.

authentication mode

Answers
B.

proxy host/IP

B.

proxy host/IP

Answers
C.

certificate template

C.

certificate template

Answers
D.

security

D.

security

Answers
E.

allowed protocol

E.

allowed protocol

Answers
Suggested answer: C, E

Which Cisco ISE solution ensures endpoints have the latest version of antivirus updates installed before being allowed access to the corporate network?

A.

Threat Services

A.

Threat Services

Answers
B.

Profiling Services

B.

Profiling Services

Answers
C.

Provisioning Services

C.

Provisioning Services

Answers
D.

Posture Services

D.

Posture Services

Answers
Suggested answer: D

An administrator is configuring posture assessment in Cisco ISE for the first time. Which two components must be uploaded to Cisco ISE to use Anyconnect for the agent configuration in a client provisioning policy? (Choose two.)

A.

Anyconnect network visibility module

A.

Anyconnect network visibility module

Answers
B.

Anyconnect compliance module

B.

Anyconnect compliance module

Answers
C.

AnyConnectProfile.xml file

C.

AnyConnectProfile.xml file

Answers
D.

AnyConnectProfile.xsd file

D.

AnyConnectProfile.xsd file

Answers
E.

Anyconnect agent image

E.

Anyconnect agent image

Answers
Suggested answer: B, D

What is a difference between TACACS+ and RADIUS in regards to encryption?

A.

TACACS+ encrypts only the password, whereas RADIUS encrypts the username and password.

A.

TACACS+ encrypts only the password, whereas RADIUS encrypts the username and password.

Answers
B.

TACACS+ encrypts the username and password, whereas RADIUS encrypts only the password.

B.

TACACS+ encrypts the username and password, whereas RADIUS encrypts only the password.

Answers
C.

TACACS+ encrypts the password, whereas RADIUS sends the entire packet in clear text.

C.

TACACS+ encrypts the password, whereas RADIUS sends the entire packet in clear text.

Answers
D.

TACACS+ encrypts the entire packet, whereas RADIUS encrypts only the password.

D.

TACACS+ encrypts the entire packet, whereas RADIUS encrypts only the password.

Answers
Suggested answer: D

An administrator must block access to BYOD endpoints that were onboarded without a certificate and have been reported as stolen in the Cisco ISE My Devices Portal. Which condition must be used when configuring an authorization policy that sets DenyAccess permission?

A.

Endpoint Identity Group is Blocklist, and the BYOD state is Registered.

A.

Endpoint Identity Group is Blocklist, and the BYOD state is Registered.

Answers
B.

Endpoint Identify Group is Blocklist, and the BYOD state is Pending.

B.

Endpoint Identify Group is Blocklist, and the BYOD state is Pending.

Answers
C.

Endpoint Identity Group is Blocklist, and the BYOD state is Lost.

C.

Endpoint Identity Group is Blocklist, and the BYOD state is Lost.

Answers
D.

Endpoint Identity Group is Blocklist, and the BYOD state is Reinstate.

D.

Endpoint Identity Group is Blocklist, and the BYOD state is Reinstate.

Answers
Suggested answer: A

Explanation:

https://www.cisco.com/c/en/us/td/docs/security/ise/26/admin_guide/b_ISE_26_admin_guide/b_ISE_admin_26_byod.html

An engineer needs to configure a new certificate template in the Cisco ISE Internal Certificate Authority to prevent BYOD devices from needing to re-enroll when their MAC address changes.

Which option must be selected in the Subject Alternative Name field?

A.

Common Name and GUID

A.

Common Name and GUID

Answers
B.

MAC Address and GUID

B.

MAC Address and GUID

Answers
C.

Distinguished Name

C.

Distinguished Name

Answers
D.

Common Name

D.

Common Name

Answers
Suggested answer: B

Explanation:

The engineer needs to select the option of MAC Address and GUID in the Subject Alternative Name field when configuring a new certificate template in the Cisco ISE Internal Certificate Authority to prevent BYOD devices from needing to re-enroll when their MAC address changes.

A user changes the status of a device to stolen in the My Devices Portal of Cisco ISE. The device was originally onboarded in the BYOD wireless Portal without a certificate. The device is found later, but the user cannot re-onboard the device because Cisco ISE assigned the device to the Blocklist endpoint identity group. What must the user do in the My Devices Portal to resolve this issue?

A.

Manually remove the device from the Blocklist endpoint identity group.

A.

Manually remove the device from the Blocklist endpoint identity group.

Answers
B.

Change the device state from Stolen to Not Registered.

B.

Change the device state from Stolen to Not Registered.

Answers
C.

Change the BYOD registration attribute of the device to None.

C.

Change the BYOD registration attribute of the device to None.

Answers
D.

Delete the device, and then re-add the device.

D.

Delete the device, and then re-add the device.

Answers
Suggested answer: B

A security administrator is using Cisco ISE to create a BYOD onboarding solution for all employees who use personal devices on the corporate network. The administrator generates a Certificate Signing Request and signs the request using an external Certificate Authority server. Which certificate usage option must be selected when importing the certificate into ISE?

A.

RADIUS

A.

RADIUS

Answers
B.

DLTS

B.

DLTS

Answers
C.

Portal

C.

Portal

Answers
D.

Admin

D.

Admin

Answers
Suggested answer: C

Which two actions must be verified to confirm that the internet is accessible via guest access when configuring a guest portal? (Choose two.)

A.

The guest device successfully associates with the correct SSID.

A.

The guest device successfully associates with the correct SSID.

Answers
B.

The guest user gets redirected to the authentication page when opening a browser.

B.

The guest user gets redirected to the authentication page when opening a browser.

Answers
C.

The guest device has internal network access on the WLAN.

C.

The guest device has internal network access on the WLAN.

Answers
D.

The guest device can connect to network file shares.

D.

The guest device can connect to network file shares.

Answers
E.

Cisco ISE sends a CoA upon successful guest authentication.

E.

Cisco ISE sends a CoA upon successful guest authentication.

Answers
Suggested answer: B, E
Total 242 questions
Go to page: of 25