Cisco 300-715 Practice Test - Questions Answers, Page 5

List of questions
Question 41

What service can be enabled on the Cisco ISE node to identity the types of devices connecting to a network?
MAB
profiling
posture
central web authentication
Question 42

What does the dot1x system-auth-control command do?
causes a network access switch not to track 802.1x sessions
globally enables 802.1x
enables 802.1x on a network access device interface
causes a network access switch to track 802.1x sessions
https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst4500/XE3-8-0E/15-24E/configuration/guide/xe-380-configuration/dot1x.html
Question 43

Which command displays all 802 1X/MAB sessions that are active on the switch ports of a Cisco Catalyst switch?
show authentication sessions output
Show authentication sessions
show authentication sessions interface Gi 1/0/x
show authentication sessions interface Gi1/0/x output
Question 44

Which personas can a Cisco ISE node assume'?
policy service, gatekeeping, and monitoring
administration, policy service, and monitoring
administration, policy service, gatekeeping
administration, monitoring, and gatekeeping
https://www.cisco.com/en/US/docs/security/ise/1.0/user_guide/ise10_dis_deploy.htmlThe persona or personas of a node determine the services provided by a node. An ISE node canassume any or all of the following personas:
Administration, Policy Service, and Monitoring. Themenu options that are available through the administrative user interface are dependent on the roleand personas that an ISE node assumes. See Cisco ISE Nodes and Available Menu Options for moreinformation.
Question 45

What is a characteristic of the UDP protocol?
UDP can detect when a server is down.
UDP offers best-effort delivery
UDP can detect when a server is slow
UDP offers information about a non-existent server
https://www.cisco.com/c/en/us/support/docs/security-vpn/remote-authentication-dial-userservice-radius/13838-10.html
Question 46

Which two endpoint compliance statuses are possible? (Choose two.)
unknown
known
invalid
compliant
valid
Question 47

Which are two characteristics of TACACS+? (Choose two)
It uses TCP port 49.
It combines authorization and authentication functions.
It separates authorization and authentication functions.
It encrypts the password only.
It uses UDP port 49.
Question 48

Which two ports do network devices typically use for CoA? (Choose two)
Question 49

Which two responses from the RADIUS server to NAS are valid during the authentication process?
(Choose two)
Question 50

Which two components are required for creating a Native Supplicant Profile within a BYOD flow?
(Choose two)
Question