ExamGecko
Home Home / Cisco / 300-715

Cisco 300-715 Practice Test - Questions Answers, Page 23

Question list
Search
Search

List of questions

Search

Related questions











An administrator made changes in Cisco ISE and needs to apply new permissions for endpoints that have already been authenticated by sending a CoA packet to the network devices. Which IOS command must be configured on the devices to accomplish this goal?

A.

aaa server radius dynamic-author

A.

aaa server radius dynamic-author

Answers
B.

authentication command bounce-port

B.

authentication command bounce-port

Answers
C.

authentication command disable-port

C.

authentication command disable-port

Answers
D.

aaa nas port extended

D.

aaa nas port extended

Answers
Suggested answer: A

An engineer needs to configure Cisco ISE Profiling Services to authorize network access for IP speakers that require access to the intercom system. This traffic needs to be identified if the ToS bit is set to 5 and the destination IP address is the intercom system. What must be configured to accomplish this goal?

A.

NMAP

A.

NMAP

Answers
B.

NETFLOW

B.

NETFLOW

Answers
C.

pxGrid

C.

pxGrid

Answers
D.

RADIUS

D.

RADIUS

Answers
Suggested answer: B

Which type of identity store allows for creating single-use access credentials in Cisco ISE?

A.

OpenLDAP

A.

OpenLDAP

Answers
B.

Local

B.

Local

Answers
C.

PKI

C.

PKI

Answers
D.

RSA SecurID

D.

RSA SecurID

Answers
Suggested answer: D

A network engineer needs to deploy 802.1x using Cisco ISE in a wired network environment where thin clients download their system image upon bootup using PXE. For which mode must the switch ports be configured?

A.

closed

A.

closed

Answers
B.

restricted

B.

restricted

Answers
C.

monitor

C.

monitor

Answers
D.

low-impact

D.

low-impact

Answers
Suggested answer: D

An ISE administrator must change the inactivity timer for MAB endpoints to terminate the authentication session whenever a switch port that is connected to an IP phone does not detect packets from the device for 30 minutes. Which action must be taken to accomplish this task?

A.

Add the authentication timer reauthenticate server command to the switchport.

A.

Add the authentication timer reauthenticate server command to the switchport.

Answers
B.

Add the authentication timer inactivity 3600 command to the switchport.

B.

Add the authentication timer inactivity 3600 command to the switchport.

Answers
C.

Change the idle-timeout on the Radius server to 3600 seconds for IP Phone endpoints.

C.

Change the idle-timeout on the Radius server to 3600 seconds for IP Phone endpoints.

Answers
D.

Configure the session-timeout to be 3600 seconds on Cisco ISE.

D.

Configure the session-timeout to be 3600 seconds on Cisco ISE.

Answers
Suggested answer: B
A.

VLAN to SGT mapping

A.

VLAN to SGT mapping

Answers
B.

IP Address to SGT mapping

B.

IP Address to SGT mapping

Answers
C.

L3IF to SGT mapping

C.

L3IF to SGT mapping

Answers
D.

Subnet to SGT mapping

D.

Subnet to SGT mapping

Answers
Suggested answer: B

Explanation:

https://community.cisco.com/t5/security-knowledge-base/segmentation-strategy/ta-p/3757424:

"The method of sending out IP to SGT mappings from ISE is particularly useful if the access switch does not support TrustSec"

An engineer must configure Cisco ISE to provide internet access for guests in which guests are required to enter a code to gain network access. Which action accomplishes the goal?

A.

Configure the hotspot portal for guest access and require an access code.

A.

Configure the hotspot portal for guest access and require an access code.

Answers
B.

Configure the sponsor portal with a single account and use the access code as the password.

B.

Configure the sponsor portal with a single account and use the access code as the password.

Answers
C.

Configure the self-registered guest portal to allow guests to create a personal access code.

C.

Configure the self-registered guest portal to allow guests to create a personal access code.

Answers
D.

Create a BYOD policy that bypasses the authentication of the user and authorizes access codes.

D.

Create a BYOD policy that bypasses the authentication of the user and authorizes access codes.

Answers
Suggested answer: A

An engineer wants to learn more about Cisco ISE and deployed a new lab with two nodes. Which two persona configurations allow the engineer to successfully test redundancy of a failed node? (Choose two.)

A.

Configure one of the Cisco ISE nodes as the Health Check node.

A.

Configure one of the Cisco ISE nodes as the Health Check node.

Answers
B.

Configure both nodes with the PAN and MnT personas only.

B.

Configure both nodes with the PAN and MnT personas only.

Answers
C.

Configure one of the Cisco ISE nodes as the primary PAN and MnT personas and the other as the secondary.

C.

Configure one of the Cisco ISE nodes as the primary PAN and MnT personas and the other as the secondary.

Answers
D.

Configure both nodes with the PAN, MnT, and PSN personas.

D.

Configure both nodes with the PAN, MnT, and PSN personas.

Answers
E.

Configure one of the Cisco ISE nodes as the primary PAN and PSN personas and the other as the secondary.

E.

Configure one of the Cisco ISE nodes as the primary PAN and PSN personas and the other as the secondary.

Answers
Suggested answer: C, E

DRAG DROP

An engineer needs to export a file in CSV format, encrypted with the password C1$c0438563935, and contains users currently configured in Cisco ISE. Drag and drop the steps from the left into the sequence on the right to complete this task.


Question 229
Correct answer: Question 229

DRAG DROP

An engineer needs to configure a compliance policy on Cisco ISE to ensure that the latest encryption software is running on the C drive of all endpoints. Drag and drop the configuration steps from the left into the sequence on the right to accomplish this task.


Question 230
Correct answer: Question 230
Total 242 questions
Go to page: of 25