ExamGecko
Home Home / Cisco / 300-715

Cisco 300-715 Practice Test - Questions Answers, Page 6

Question list
Search
Search

Related questions











What is the minimum certainty factor when creating a profiler policy?

A.

the minimum number that a predefined condition provides

A.

the minimum number that a predefined condition provides

Answers
B.

the maximum number that a predefined condition provides

B.

the maximum number that a predefined condition provides

Answers
C.

the minimum number that a device certainty factor must reach to become a member of the profile

C.

the minimum number that a device certainty factor must reach to become a member of the profile

Answers
D.

the maximum number that a device certainty factor must reach to become a member of the profile

D.

the maximum number that a device certainty factor must reach to become a member of the profile

Answers
Suggested answer: C

What gives Cisco ISE an option to scan endpoints for vulnerabilities?

A.

authorization policy

A.

authorization policy

Answers
B.

authentication policy

B.

authentication policy

Answers
C.

authentication profile

C.

authentication profile

Answers
D.

authorization profile

D.

authorization profile

Answers
Suggested answer: A

A network administrator has just added a front desk receptionist account to the Cisco ISE Guest Service sponsor group. Using the Cisco ISE Guest Sponsor Portal, which guest services can the receptionist provide?

A.

Keep track of guest user activities

A.

Keep track of guest user activities

Answers
B.

Configure authorization settings for guest users

B.

Configure authorization settings for guest users

Answers
C.

Create and manage guest user accounts

C.

Create and manage guest user accounts

Answers
D.

Authenticate guest users to Cisco ISE

D.

Authenticate guest users to Cisco ISE

Answers
Suggested answer: C

Which interface-level command is needed to turn on 802 1X authentication?

A.

Dofl1x pae authenticator

A.

Dofl1x pae authenticator

Answers
B.

dot1x system-auth-control

B.

dot1x system-auth-control

Answers
C.

authentication host-mode single-host

C.

authentication host-mode single-host

Answers
D.

aaa server radius dynamic-author

D.

aaa server radius dynamic-author

Answers
Suggested answer: A

Which permission is common to the Active Directory Join and Leave operations?

A.

Create a Cisco ISE machine account in the domain if the machine account does not already exist

A.

Create a Cisco ISE machine account in the domain if the machine account does not already exist

Answers
B.

Remove the Cisco ISE machine account from the domain.

B.

Remove the Cisco ISE machine account from the domain.

Answers
C.

Set attributes on the Cisco ISE machine account

C.

Set attributes on the Cisco ISE machine account

Answers
D.

Search Active Directory to see if a Cisco ISE machine account already ex.sts.

D.

Search Active Directory to see if a Cisco ISE machine account already ex.sts.

Answers
Suggested answer: D

Explanation:

https://www.cisco.com/c/en/us/td/docs/security/ise/2-0/ise_active_directory_integration/b_ISE_AD_integration_2x.html

Which two features must be used on Cisco ISE to enable the TACACS. feature? (Choose two)

A.

Device Administration License

A.

Device Administration License

Answers
B.

Server Sequence

B.

Server Sequence

Answers
C.

Command Sets

C.

Command Sets

Answers
D.

Enable Device Admin Service

D.

Enable Device Admin Service

Answers
E.

External TACACS Servers

E.

External TACACS Servers

Answers
Suggested answer: A, D

During BYOD flow, from where does a Microsoft Windows PC download the Network Setup Assistant?

A.

Cisco App Store

A.

Cisco App Store

Answers
B.

Microsoft App Store

B.

Microsoft App Store

Answers
C.

Cisco ISE directly

C.

Cisco ISE directly

Answers
D.

Native OTA functionality

D.

Native OTA functionality

Answers
Suggested answer: C

Which use case validates a change of authorization?

A.

An authenticated, wired EAP-capable endpoint is discovered

A.

An authenticated, wired EAP-capable endpoint is discovered

Answers
B.

An endpoint profiling policy is changed for authorization policy.

B.

An endpoint profiling policy is changed for authorization policy.

Answers
C.

An endpoint that is disconnected from the network is discovered

C.

An endpoint that is disconnected from the network is discovered

Answers
D.

Endpoints are created through device registration for the guests

D.

Endpoints are created through device registration for the guests

Answers
Suggested answer: B

Explanation:

https://www.cisco.com/c/en/us/td/docs/security/ise/1-2/user_guide/ise_user_guide/ise_prof_pol.html

A network engineer is configuring a network device that needs to filter traffic based on security group tags using a security policy on a routed into this task?

A.

cts authorization list

A.

cts authorization list

Answers
B.

cts role-based enforcement

B.

cts role-based enforcement

Answers
C.

cts cache enable

C.

cts cache enable

Answers
D.

cts role-based policy priority-static

D.

cts role-based policy priority-static

Answers
Suggested answer: B

An engineer is working with a distributed deployment of Cisco ISE and needs to configure various network probes to collect a set of attributes from the used to accomplish this task?

A.

policy service

A.

policy service

Answers
B.

monitoring

B.

monitoring

Answers
C.

pxGrid

C.

pxGrid

Answers
D.

primary policy administrator

D.

primary policy administrator

Answers
Suggested answer: B
Total 242 questions
Go to page: of 25