ExamGecko
Home Home / Cisco / 300-715

Cisco 300-715 Practice Test - Questions Answers, Page 5

Question list
Search
Search

Related questions











What service can be enabled on the Cisco ISE node to identity the types of devices connecting to a network?

A.

MAB

A.

MAB

Answers
B.

profiling

B.

profiling

Answers
C.

posture

C.

posture

Answers
D.

central web authentication

D.

central web authentication

Answers
Suggested answer: B

What does the dot1x system-auth-control command do?

A.

causes a network access switch not to track 802.1x sessions

A.

causes a network access switch not to track 802.1x sessions

Answers
B.

globally enables 802.1x

B.

globally enables 802.1x

Answers
C.

enables 802.1x on a network access device interface

C.

enables 802.1x on a network access device interface

Answers
D.

causes a network access switch to track 802.1x sessions

D.

causes a network access switch to track 802.1x sessions

Answers
Suggested answer: B

Explanation:

https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst4500/XE3-8-0E/15-24E/configuration/guide/xe-380-configuration/dot1x.html

Which command displays all 802 1X/MAB sessions that are active on the switch ports of a Cisco Catalyst switch?

A.

show authentication sessions output

A.

show authentication sessions output

Answers
B.

Show authentication sessions

B.

Show authentication sessions

Answers
C.

show authentication sessions interface Gi 1/0/x

C.

show authentication sessions interface Gi 1/0/x

Answers
D.

show authentication sessions interface Gi1/0/x output

D.

show authentication sessions interface Gi1/0/x output

Answers
Suggested answer: B

Which personas can a Cisco ISE node assume'?

A.

policy service, gatekeeping, and monitoring

A.

policy service, gatekeeping, and monitoring

Answers
B.

administration, policy service, and monitoring

B.

administration, policy service, and monitoring

Answers
C.

administration, policy service, gatekeeping

C.

administration, policy service, gatekeeping

Answers
D.

administration, monitoring, and gatekeeping

D.

administration, monitoring, and gatekeeping

Answers
Suggested answer: B

Explanation:

https://www.cisco.com/en/US/docs/security/ise/1.0/user_guide/ise10_dis_deploy.htmlThe persona or personas of a node determine the services provided by a node. An ISE node canassume any or all of the following personas:

Administration, Policy Service, and Monitoring. Themenu options that are available through the administrative user interface are dependent on the roleand personas that an ISE node assumes. See Cisco ISE Nodes and Available Menu Options for moreinformation.

What is a characteristic of the UDP protocol?

A.

UDP can detect when a server is down.

A.

UDP can detect when a server is down.

Answers
B.

UDP offers best-effort delivery

B.

UDP offers best-effort delivery

Answers
C.

UDP can detect when a server is slow

C.

UDP can detect when a server is slow

Answers
D.

UDP offers information about a non-existent server

D.

UDP offers information about a non-existent server

Answers
Suggested answer: B

Explanation:

https://www.cisco.com/c/en/us/support/docs/security-vpn/remote-authentication-dial-userservice-radius/13838-10.html

Which two endpoint compliance statuses are possible? (Choose two.)

A.

unknown

A.

unknown

Answers
B.

known

B.

known

Answers
C.

invalid

C.

invalid

Answers
D.

compliant

D.

compliant

Answers
E.

valid

E.

valid

Answers
Suggested answer: A, D

Which are two characteristics of TACACS+? (Choose two)

A.

It uses TCP port 49.

A.

It uses TCP port 49.

Answers
B.

It combines authorization and authentication functions.

B.

It combines authorization and authentication functions.

Answers
C.

It separates authorization and authentication functions.

C.

It separates authorization and authentication functions.

Answers
D.

It encrypts the password only.

D.

It encrypts the password only.

Answers
E.

It uses UDP port 49.

E.

It uses UDP port 49.

Answers
Suggested answer: A, C

Which two ports do network devices typically use for CoA? (Choose two)

A.

443

A.

443

Answers
B.

19005

B.

19005

Answers
C.

8080

C.

8080

Answers
D.

3799

D.

3799

Answers
E.

1700

E.

1700

Answers
Suggested answer: D, E

Which two responses from the RADIUS server to NAS are valid during the authentication process?

(Choose two)

A.

access-response

A.

access-response

Answers
B.

access-request

B.

access-request

Answers
C.

access-reserved

C.

access-reserved

Answers
D.

access-accept

D.

access-accept

Answers
E.

access-challenge

E.

access-challenge

Answers
Suggested answer: B, D

Which two components are required for creating a Native Supplicant Profile within a BYOD flow?

(Choose two)

A.

Windows Settings

A.

Windows Settings

Answers
B.

Connection Type

B.

Connection Type

Answers
C.

iOS Settings

C.

iOS Settings

Answers
D.

Redirect ACL

D.

Redirect ACL

Answers
E.

Operating System

E.

Operating System

Answers
Suggested answer: B, E

Explanation:

https://www.cisco.com/c/en/us/td/docs/security/ise/2-1/admin_guide/b_ise_admin_guide_21/b_ise_admin_guide_20_chapter_010101.html#reference_21024A3B2B27427EAC78495E56962729

Total 242 questions
Go to page: of 25