ExamGecko
Home Home / Cisco / 300-715

Cisco 300-715 Practice Test - Questions Answers, Page 4

Question list
Search
Search

Related questions











Which configuration is required in the Cisco ISE authentication policy to allow Central Web Authentication?

A.

MAB and if user not found, continue

A.

MAB and if user not found, continue

Answers
B.

MAB and if authentication failed, continue

B.

MAB and if authentication failed, continue

Answers
C.

Dot1x and if user not found, continue

C.

Dot1x and if user not found, continue

Answers
D.

Dot1x and if authentication failed, continue

D.

Dot1x and if authentication failed, continue

Answers
Suggested answer: A

Which portal is used to customize the settings for a user to log in and download the compliance module?

A.

Client Profiling

A.

Client Profiling

Answers
B.

Client Endpoint

B.

Client Endpoint

Answers
C.

Client Provisioning

C.

Client Provisioning

Answers
D.

Client Guest

D.

Client Guest

Answers
Suggested answer: C

Which term refers to an endpoint agent that tries to join an 802 1X-enabled network?

A.

EAP server

A.

EAP server

Answers
B.

supplicant

B.

supplicant

Answers
C.

client

C.

client

Answers
D.

authenticator

D.

authenticator

Answers
Suggested answer: B

Explanation:

https://www.oreilly.com/library/view/cisco-isefor/9780133103632/ch16.html#:~:text=What%20is%20a%20supplicant%3F,networks%2C%20both%20wired%20and%20wireless.&text=The%20802.1X%20transactions%20are,Identity%20Services%20Engine%20(ISE).

Which two features are available when the primary admin node is down and the secondary admin node has not been promoted? (Choose two.)

A.

hotspot

A.

hotspot

Answers
B.

new AD user 802 1X authentication

B.

new AD user 802 1X authentication

Answers
C.

posture

C.

posture

Answers
D.

BYOD

D.

BYOD

Answers
E.

guest AUP

E.

guest AUP

Answers
Suggested answer: B, C


Which protocol must be allowed for a BYOD device to access the BYOD portal?

A.

HTTP

A.

HTTP

Answers
B.

SMTP

B.

SMTP

Answers
C.

HTTPS

C.

HTTPS

Answers
D.

SSH

D.

SSH

Answers
Suggested answer: C

In which two ways can users and endpoints be classified for TrustSec?

(Choose Two.)

A.

VLAN

A.

VLAN

Most voted
Answers (1)
Most voted
B.

SXP

B.

SXP

Answers
C.

dynamic

C.

dynamic

Most voted
Answers (1)
Most voted
D.

QoS

D.

QoS

Answers
E.

SGACL

E.

SGACL

Answers
Suggested answer: A, E

Which two fields are available when creating an endpoint on the context visibility page of Cisco IS?

(Choose two)

A.

Policy Assignment

A.

Policy Assignment

Answers
B.

Endpoint Family

B.

Endpoint Family

Answers
C.

Identity Group Assignment

C.

Identity Group Assignment

Answers
D.

Security Group Tag

D.

Security Group Tag

Answers
E.

IP Address

E.

IP Address

Answers
Suggested answer: A, C

When configuring Active Directory groups, what does the Cisco ISE use to resolve ambiguous group names?

A.

MIB

A.

MIB

Answers
B.

TGT

B.

TGT

Answers
C.

OMAB

C.

OMAB

Answers
D.

SID

D.

SID

Answers
Suggested answer: D

What is the purpose of the ip http server command on a switch?

A.

It enables the https server for users for web authentication

A.

It enables the https server for users for web authentication

Answers
B.

It enables MAB authentication on the switch

B.

It enables MAB authentication on the switch

Answers
C.

It enables the switch to redirect users for web authentication.

C.

It enables the switch to redirect users for web authentication.

Answers
D.

It enables dot1x authentication on the switch.

D.

It enables dot1x authentication on the switch.

Answers
Suggested answer: C

What are two requirements of generating a single signing in Cisco ISE by using a certificate provisioning portal, without generating a certificate request? (Choose two )

A.

Location the CSV file for the device MAC

A.

Location the CSV file for the device MAC

Answers
B.

Select the certificate template

B.

Select the certificate template

Answers
C.

Choose the hashing method

C.

Choose the hashing method

Answers
D.

Enter the common name

D.

Enter the common name

Answers
E.

Enter the IP address of the device

E.

Enter the IP address of the device

Answers
Suggested answer: B, D

Explanation:

https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/200534-ISE-2-0-Certificate-Provisioning-Portal.html

Total 242 questions
Go to page: of 25