ExamGecko
Home Home / Cisco / 300-715

Cisco 300-715 Practice Test - Questions Answers, Page 9

Question list
Search
Search

List of questions

Search

Related questions











What should be considered when configuring certificates for BYOD?

A.

The SAN field is populated with the end user name.

A.

The SAN field is populated with the end user name.

Answers
B.

The CN field is populated with the endpoint host name.

B.

The CN field is populated with the endpoint host name.

Answers
C.

An endpoint certificate is mandatory for the Cisco ISE BYOD.

C.

An endpoint certificate is mandatory for the Cisco ISE BYOD.

Answers
D.

An Android endpoint uses EST, whereas other operating systems use SCEP for enrollment.

D.

An Android endpoint uses EST, whereas other operating systems use SCEP for enrollment.

Answers
Suggested answer: C

A policy is being created in order to provide device administration access to the switches on a network. There is a requirement to ensure that if the session is not actively being used, after 10 minutes, it will be disconnected. Which task must be configured in order to meet this requirement?

A.

session timeout

A.

session timeout

Answers
B.

idle time

B.

idle time

Answers
C.

monitor

C.

monitor

Answers
D.

set attribute as

D.

set attribute as

Answers
Suggested answer: A

Explanation:

https://www.cisco.com/c/en/us/td/docs/security/ise/2-4/admin_guide/b_ISE_admin_guide_24/m_admin_accesspolicy_settings.html#reference_0E24B8FBFAB248219E1194435670347F

An administrator is attempting to replace the built-in self-signed certificates on a Cisco ISE appliance.

The CA is requesting some information about the appliance in order to sign the new certificate. What must be done in order to provide the CA this information?

A.

Install the Root CA and intermediate CA.

A.

Install the Root CA and intermediate CA.

Answers
B.

Generate the CSR.

B.

Generate the CSR.

Answers
C.

Download the intermediate server certificate.

C.

Download the intermediate server certificate.

Answers
D.

Download the CA server certificate.

D.

Download the CA server certificate.

Answers
Suggested answer: B

An organization is hosting a conference and must make guest accounts for several of the speakers attending. The conference ended two days early but the guest accounts are still being used to access the network. What must be configured to correct this?

A.

Create an authorization rule denying sponsored guest access.

A.

Create an authorization rule denying sponsored guest access.

Answers
B.

Navigate to the Guest Portal and delete the guest accounts.

B.

Navigate to the Guest Portal and delete the guest accounts.

Answers
C.

Create an authorization rule denying guest access.

C.

Create an authorization rule denying guest access.

Answers
D.

Navigate to the Sponsor Portal and suspend the guest accounts.

D.

Navigate to the Sponsor Portal and suspend the guest accounts.

Answers
Suggested answer: D

An administrator is configuring posture with Cisco ISE and wants to check that specific services are present on the workstations that are attempting to access the network. What must be configured to accomplish this goal?

A.

Create a registry posture condition using a non-OPSWAT API version.

A.

Create a registry posture condition using a non-OPSWAT API version.

Answers
B.

Create an application posture condition using a OPSWAT API version.

B.

Create an application posture condition using a OPSWAT API version.

Answers
C.

Create a compound posture condition using a OPSWAT API version.

C.

Create a compound posture condition using a OPSWAT API version.

Answers
D.

Create a service posture condition using a non-OPSWAT API version.

D.

Create a service posture condition using a non-OPSWAT API version.

Answers
Suggested answer: D

An engineer is configuring 802.1X and wants it to be transparent from the users' point of view. The implementation should provide open authentication on the switch ports while providing strong levels of security for non-authenticated devices. Which deployment mode should be used to achieve this?

A.

closed

A.

closed

Answers
B.

low-impact

B.

low-impact

Answers
C.

open

C.

open

Answers
D.

high-impact

D.

high-impact

Answers
Suggested answer: B

Explanation:

https://www.lookingpoint.com/blog/cisco-ise-wired-802.1x-deploymentmonitormode#:~:text=Low%20impact%20mode%20works%20similar,DHCP%2C%20PXE%20boot%2C%20etc.

What is the deployment mode when two Cisco ISE nodes are configured in an environment?

A.

distributed

A.

distributed

Answers
B.

active

B.

active

Answers
C.

standalone

C.

standalone

Answers
D.

standard

D.

standard

Answers
Suggested answer: A

Which two roles are taken on by the administration person within a Cisco ISE distributed environment? (Choose two.)

A.

backup

A.

backup

Answers
B.

secondary

B.

secondary

Answers
C.

standby

C.

standby

Answers
D.

primary

D.

primary

Answers
E.

active

E.

active

Answers
Suggested answer: B, D

A company is attempting to improve their BYOD policies and restrict access based on certain criteri a. The company's subnets are organized by building. Which attribute should be used in order to gain access based on location?

A.

static group assignment

A.

static group assignment

Answers
B.

IP address

B.

IP address

Answers
C.

device registration status

C.

device registration status

Answers
D.

MAC address

D.

MAC address

Answers
Suggested answer: A

Explanation:

https://www.cisco.com/c/en/us/td/docs/security/ise/2-1/admin_guide/b_ise_admin_guide_21/b_ise_admin_guide_20_chapter_010100.html#ID1353

An engineer is migrating users from MAB to 802.1X on the network. This must be done during normal business hours with minimal impact to users. Which CoA method should be used?

A.

Port Bounce

A.

Port Bounce

Answers
B.

Port Shutdown

B.

Port Shutdown

Answers
C.

Session Termination

C.

Session Termination

Answers
D.

Session Reauthentication

D.

Session Reauthentication

Answers
Suggested answer: D
Total 242 questions
Go to page: of 25