ExamGecko
Home Home / Cisco / 300-715

Cisco 300-715 Practice Test - Questions Answers, Page 7

Question list
Search
Search

List of questions

Search

Related questions












An engineer is configuring Cisco ISE to reprofile endpoints based only on new requests of INITREBOOT and SELECTING message types. Which probe should be used to accomplish this task?

A.

MMAP

A.

MMAP

Answers
B.

DNS

B.

DNS

Answers
C.

DHCP

C.

DHCP

Answers
D.

RADIUS

D.

RADIUS

Answers
Suggested answer: C

An engineer is using Cisco ISE and configuring guest services to allow wireless devices to access the network. Which action should accomplish this task?

A.

Create the redirect ACL on the WLC and add it to the WLC policy

A.

Create the redirect ACL on the WLC and add it to the WLC policy

Answers
B.

Create the redirect ACL on the WLC and add it to the Cisco ISE policy.

B.

Create the redirect ACL on the WLC and add it to the Cisco ISE policy.

Answers
C.

Create the redirect ACL on Cisco ISE and add it to the WLC policy

C.

Create the redirect ACL on Cisco ISE and add it to the WLC policy

Answers
D.

Create the redirect ACL on Cisco ISE and add it to the Cisco ISE Policy

D.

Create the redirect ACL on Cisco ISE and add it to the Cisco ISE Policy

Answers
Suggested answer: B

An engineer is configuring web authentication using non-standard ports and needs the switch to redirect traffic to the correct port. Which command should be used to accomplish this task?

A.

permit tcp any any eq <port number>

A.

permit tcp any any eq <port number>

Answers
B.

aaa group server radius proxy

B.

aaa group server radius proxy

Answers
C.

ip http port <port number>

C.

ip http port <port number>

Answers
D.

aaa group server radius

D.

aaa group server radius

Answers
Suggested answer: C

An administrator needs to connect ISE to Active Directory as an external authentication source and allow the proper ports through the firewall. Which two ports should be opened to accomplish this task? (Choose two)

A.

TELNET 23

A.

TELNET 23

Answers
B.

LDAP 389

B.

LDAP 389

Answers
C.

HTTP 80

C.

HTTP 80

Answers
D.

HTTPS 443

D.

HTTPS 443

Answers
E.

MSRPC 445

E.

MSRPC 445

Answers
Suggested answer: B, E

Refer to the exhibit.

A network engineers configuring the switch to accept downloadable ACLs from a Cisco ISC server Which two commands should be run to complete the configuration? (Choose two)

A.

aaa authorization auth-proxy default group radius

A.

aaa authorization auth-proxy default group radius

Answers
B.

radius server vsa sand authentication

B.

radius server vsa sand authentication

Answers
C.

radius-server attribute 8 include-in-access-req

C.

radius-server attribute 8 include-in-access-req

Answers
D.

ip device tracking

D.

ip device tracking

Answers
E.

dot1x system-auth-control

E.

dot1x system-auth-control

Answers
Suggested answer: B, C

An engineer is using the low-impact mode for a phased deployment of Cisco ISE and is trying to connect to the network prior to authentication. Which access will be denied in this?

A.

HTTP

A.

HTTP

Answers
B.

DNS

B.

DNS

Answers
C.

EAP

C.

EAP

Answers
D.

DHCP

D.

DHCP

Answers
Suggested answer: A

A network engineer needs to ensure that the access credentials are not exposed during the 802.1x authentication among components. Which two protocols should complete this task?

A.

PEAP

A.

PEAP

Answers
B.

EAP-MD5

B.

EAP-MD5

Answers
C.

LEAP

C.

LEAP

Answers
D.

EAP-TLS

D.

EAP-TLS

Answers
E.

EAP-TTLS

E.

EAP-TTLS

Answers
Suggested answer: B, D

An engineer is configuring a guest password policy and needs to ensure that the password complexity requirements are set to mitigate brute force attacks. Which two requirement complete this policy? (Choose two)

A.

minimum password length

A.

minimum password length

Answers
B.

active username limit

B.

active username limit

Answers
C.

access code control

C.

access code control

Answers
D.

gpassword expiration period

D.

gpassword expiration period

Answers
E.

username expiration date

E.

username expiration date

Answers
Suggested answer: A, D

Which two actions occur when a Cisco ISE server device administrator logs in to a device? (Choose two)

A.

The device queries the internal identity store

A.

The device queries the internal identity store

Answers
B.

The Cisco ISE server queries the internal identity store

B.

The Cisco ISE server queries the internal identity store

Answers
C.

The device queries the external identity store

C.

The device queries the external identity store

Answers
D.

The Cisco ISE server queries the external identity store.

D.

The Cisco ISE server queries the external identity store.

Answers
E.

The device queries the Cisco ISE authorization server

E.

The device queries the Cisco ISE authorization server

Answers
Suggested answer: A, D

When planning for the deployment of Cisco ISE, an organization's security policy dictates that they must use network access authentication via RADIUS. It also states that the deployment provide an adequate amount of security and visibility for the hosts on the network. Why should the engineer configure MAB in this situation?

A.

The Cisco switches only support MAB.

A.

The Cisco switches only support MAB.

Answers
B.

MAB provides the strongest form of authentication available.

B.

MAB provides the strongest form of authentication available.

Answers
C.

The devices in the network do not have a supplicant.

C.

The devices in the network do not have a supplicant.

Answers
D.

MAB provides user authentication.

D.

MAB provides user authentication.

Answers
Suggested answer: C
Total 242 questions
Go to page: of 25