New Year Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Free and Premium Cisco 300-715 Dumps Questions Answers

Page: 1 / 22
Total 299 questions

Implementing and Configuring Cisco Identity Services Engine (SISE) v4.0 (300-715 SISE) Questions and Answers

Question 1

There are several devices on a network that are considered critical and need to be placed into the ISE database and a policy used for them. The organization does not want to use profiling. What must be done to accomplish this goal?

Options:

A.

Enter the MAC address in the correct Endpoint Identity Group.

B.

Enter the MAC address in the correct Logical Profile.

C.

Enter the IP address in the correct Logical Profile.

D.

Enter the IP address in the correct Endpoint Identity Group.

Buy Now
Question 2

A network engineer must configure a policy rule to check the endpoint. The policy must ensure disk encryption is enabled and the appropriate antivirus software version is installed. Which configuration must the engineer apply to the rule?

Options:

A.

dictionary simple condition

B.

simple posture condition

C.

dictionary compound condition

D.

compound posture condition

Question 3

A new employee just connected their workstation to a Cisco IP phone. The network administrator wants to ensure that the Cisco IP phone remains online when the user disconnects their Workstation from the corporate network Which CoA configuration meets this requirement?

Options:

A.

Port Bounce

B.

Reauth

C.

NoCoA

D.

Disconnect

Question 4

Which RADIUS attribute is used to dynamically assign the Inactivity active timer for MAB users from the Cisco ISE node?

Options:

A.

session timeout

B.

idle timeout

C.

radius-server timeout

D.

termination-action

Question 5

Refer to the exhibit. In which scenario does this switch configuration apply?

Options:

A.

when allowing a hub with multiple clients connected

B.

when passing IP phone authentication

C.

when allowing multiple IP phones to be connected

D.

when preventing users with hypervisor

Question 6

A network engineer needs to deploy 802.1x using Cisco ISE in a wired network environment where thin clients download their system image upon bootup using PXE. For which mode must the switch ports be configured?

Options:

A.

closed

B.

restricted

C.

monitor

D.

low-impact

Question 7

Which two authentication protocols are supported by RADIUS but not by TACACS+? (Choose two.)

Options:

A.

MSCHAPv1

B.

PAP

C.

EAP

D.

CHAP

E.

MSCHAPV2

Question 8

A network administrator is configuring a secondary cisco ISE node from the backup configuration of the primary cisco ISE node to create a high availability pair The Cisco ISE CA certificates and keys must be manually backed up from the primary Cisco ISE and copied into the secondary Cisco ISE Which command most be issued for this to work?

Options:

A.

copy certificate Ise

B.

application configure Ise

C.

certificate configure Ise

D.

Import certificate Ise

Question 9

What should be considered when configuring certificates for BYOD?

    An endpoint certificate is mandatory for the Cisco ISE BYOD

Options:

A.

An Android endpoint uses EST whereas other operation systems use SCEP for enrollment

B.

The CN field is populated with the endpoint host name.

C.

The SAN field is populated with the end user name

Question 10

Which port does Cisco ISE use for native supplicant provisioning of a Windows laptop?

Options:

A.

TCP 8909

B.

TCP 8905

C.

UDP 1812

D.

TCP 443

Question 11

A network engineer is in the predeployment discovery phase o! a Cisco ISE deployment and must discover the network. There is an existing network management system in the network. Which type of probe must be configured to gather the information?

Options:

A.

NetFlow

B.

RADIUS

C.

SNMP

D.

NMAP

Question 12

An engineer is assigned to enhance security across the campus network. The task is to enable MAB across all access switches in the network. Which command must be entered on the switch to enable MAB?

Options:

A.

Switch(config-if)# mab

B.

Switch(config)# mab

C.

Switch# authentication port-control auto

D.

Switch(config)# authentication port-control auto

Question 13

An administrator is trying to collect metadata information about the traffic going across the network to gam added visibility into the hosts. This Information will be used to create profiling policies for devices us mg Cisco ISE so that network access policies can be used What must be done to accomplish this task?

Options:

A.

Configure the RADIUS profiling probe within Cisco ISE

B.

Configure NetFlow to be sent to me Cisco ISE appliance.

C.

Configure SNMP to be used with the Cisco ISE appliance

D.

Configure the DHCP probe within Cisco ISE

Question 14

What is a valid guest portal type?

Options:

A.

Sponsored-Guest

B.

My Devices

C.

Sponsor

D.

Captive-Guest

Question 15

A user misplaces a personal phone and wants to blacklist the device from accessing the company network. The company uses Cisco ISE for corporate and BYOD device authentication. Which action must the user take in Cisco ISE?

Options:

A.

Sign in to the BYOD portal and mark the device as Lost.

B.

Sign in to the My Devices portal and mark the device as Lost.

C.

Sign in to the My Devices portal and mark the device as Irrecoverable.

D.

Sign in to the BYOD portal and mark the device as Irrecoverable.

Question 16

An administrator replaced a PSN in the distributed Cisco ISE environment. When endpoints authenticate to it, the devices are not getting the right profiles or attributes and as a result, are not hitting the correct policies. This was working correctly on the previous PSN. Which action must be taken to ensure the endpoints get identified?

Options:

A.

Verify that the MnT node is tracking the session.

B.

Verify the shared secret used between the switch and the PSN.

C.

Verify that the profiling service is running on the new PSN.

D.

Verify that the authentication request the PSN is receiving is not malformed.

Question 17

A network engineer is configuring a network device that needs to filter traffic based on security group tags using a security policy on a routed into this task?

Options:

A.

cts role-based enforcement

B.

cts cache enable

C.

cts role-based policy priority-static

Question 18

Which supplicant(s) and server(s) are capable of supporting EAP-CHAINING?

Options:

A.

Cisco AnyConnect NAM and Cisco Identity Service Engine

B.

Cisco AnyConnect NAM and Cisco Access Control Server

C.

Cisco Secure Services Client and Cisco Access Control Server

D.

Windows Native Supplicant and Cisco Identity Service Engine

Question 19

Which term refers to an endpoint agent that tries to join an 802 1X-enabled network?

Options:

A.

EAP server

B.

supplicant

C.

client

D.

authenticator

Question 20

A customer wants to set up the Sponsor portal and delegate the authentication flow to a third party for added security while using Kerberos Which database should be used to accomplish this goal?

Options:

A.

RSA Token Server

B.

Active Directory

C.

Local Database

D.

LDAP

Question 21

A Cisco ISE administrator must restrict specific endpoints from accessing the network while in closed mode. The requirement is to have Cisco ISE centrally store the endpoints to restrict access from. What must be done to accomplish this task''

Options:

A.

Add each MAC address manually to a blocklist identity group and create a policy denying access

B.

Create a logical profile for each device's profile policy and block that via authorization policies.

C.

Create a profiling policy for each endpoint with the cdpCacheDeviceld attribute.

D.

Add each IP address to a policy denying access.

Question 22

What is the maximum number of PSN nodes supported in a medium-sized deployment?

Options:

A.

three

B.

five

C.

two

D.

eight

Question 23

An administrator is configuring a Cisco WLC for web authentication Which two client profiling methods are enabled by default if the Apply Cisco ISE Default Settings check box has been selected'? (Choose two.)

Options:

A.

CDP

B.

DHCP

C.

HTTP

D.

SNMP

E.

LLDP

Question 24

What is the difference between how RADIUS and TACACS+ handle encryption?

Options:

A.

RADIUS encrypts the entire packet, whereas TACACS+ encrypts only the username and password fields.

B.

RADIUS encrypts the entire packet, whereas TACACS+ only encrypts the password field.

C.

RADIUS only encrypts the password field, whereas TACACS+ encrypts the payload of the packet.

D.

RADIUS encrypts only the username and password fields, whereas TACACS+ encrypts the entire packet.

Question 25

Refer to the exhibit Which component must be configured to apply the SGACL?

Options:

A.

egress router

B.

host

C.

secure server

D.

ingress router

Question 26

An administrator needs to add a new third party network device to be used with Cisco ISE for Guest and BYOD authorizations. Which two features must be configured under Network Device Profile to achieve this? (Choose two.)

Options:

A.

dACL

B.

TACACS

C.

URL Redirect

D.

SNMP community

E.

CoA Type

Question 27

An engineer is configuring Cisco ISE policies to support MAB for devices that do not have 802.1X capabilities. The engineer is configuring new endpoint identity groups as conditions to be used in the AuthZ policies, but noticed that the endpoints are not hitting the correct policies. What must be done in order to get the devices into the right policies?

Options:

A.

Manually add the MAC addresses of the devices to endpoint ID groups in the context visibility database.

B.

Create an AuthZ policy to identify Unknown devices and provide partial network access prior to profiling.

C.

Add an identity policy to dynamically add the IP address of the devices to their endpoint identity groups.

D.

Identify the non 802.1X supported device types and create custom profiles for them to profile into.

Question 28

An engineer must use Cisco ISE profiler services to provide network access to Cisco IP phones that cannot support 802.1X. Cisco ISE is configured to use the access switch device sensor information — system-description and platform-type — to profile Cisco IP phones and allow access.

Which two protocols must be configured on the switch to complete the configuration? (Choose two.)

Options:

A.

LLDP

B.

CDP

C.

EAPOL

D.

SNMP

E.

STP

Question 29

What is the difference between how RADIUS and TACACS+ handle encryption?

Options:

A.

RADIUS encrypts only the username and password fields, whereas TACACS+ encrypts the entire packet.

B.

RADIUS encrypts the entire packet, whereas TACACS+ only encrypts the password field.

C.

RADIUS only encrypts the password field, whereas TACACS+ encrypts the payload of packet.

D.

RADIUS encrypts the entire packet, whereas TACACS+ encrypts only the username and password fields.

Question 30

What does a fully distributed Cisco ISE deployment include?

Options:

A.

PAN and PSN on the same node while MnTs are on their own dedicated nodes.

B.

PAN and MnT on the same node while PSNs are on their own dedicated nodes.

C.

All Cisco ISE personas on their own dedicated nodes.

D.

All Cisco ISE personas are sharing the same node.

Question 31

There is a need within an organization for a new policy to be created in Cisco ISE. It must validate that a specific anti-virus application is not only installed, but running on a machine before it is allowed access to the network. Which posture condition should the administrator configure in order for this policy to work?

Options:

A.

file

B.

registry

C.

application

D.

service

Question 32

Refer to the exhibit. An engineer must configure BYOD in Cisco ISE. A single SSID must be used to allow BYOD devices to connect to the network. These configurations have been performed on Wireless LAN Controller already:

RADIUS server

BYOD-Dot1x SSID

Which two configurations must be done in Cisco ISE to meet the requirement? (Choose two.)

Options:

A.

FlexConnect ACL

B.

External identity source

C.

Authentication policy

D.

Redirect ACL

E.

Profiling policy

Question 33

An engineer has been tasked with standing up a new guest portal for customers that are waiting in the lobby. There is a requirement to allow guests to use their social media logins to access the guest network to appeal to more customers What must be done to accomplish this task?

Options:

A.

Create a sponsor portal to allow guests to create accounts using their social media logins.

B.

Create a sponsored guest portal and enable social media in the external identity sources.

C.

Create a self-registered guest portal and enable the feature for social media logins

D.

Create a hotspot portal and enable social media login for network access

Question 34

What are the minimum requirements for deploying the Automatic Failover feature on Administration nodes in a distributed Cisco ISE deployment?

Options:

A.

a primary and secondary PAN and a health check node for the Secondary PAN

B.

a primary and secondary PAN and no health check nodes

C.

a primary and secondary PAN and a pair of health check nodes

D.

a primary and secondary PAN and a health check node for the Primary PAN

Question 35

Which two task types are included in the Cisco ISE common tasks support for TACACS+ profiles?

(Choose two.)

Options:

A.

Firepower

B.

WLC

C.

IOS

D.

ASA

E.

Shell

Question 36

A network engineer has been tasked with enabling a switch to support standard web authentication for Cisco ISE. This must include the ability to provision for URL redirection on authentication Which two commands must be entered to meet this requirement? (Choose two)

Options:

A.

Ip http secure-authentication

B.

Ip http server

C.

Ip http redirection

D.

Ip http secure-server

E.

Ip http authentication

Question 37

What is a difference between RADIUS versus TACACS+ with regards to packet encryption?

Options:

A.

TACACS+ encrypts the entire body of the packet, and RADIUS encrypts the username and password in the access-request packet.

B.

RADIUS encrypts the entire body of the packet, and TACACS+ encrypts the username and password in the access-request packet.

C.

RADIUS encrypts the entire body of the packet, and TACACS+ encrypts only the password in the access-request packet.

D.

TACACS+ encrypts the entire body of the packet, and RADIUS encrypts only the password in the access-request packet.

Question 38

An administrator is adding a switch to a network that is running Cisco ISE and is only for IP Phones The phones do not have the ability to authenticate via 802 1X Which command is needed on each switch port for authentication?

Options:

A.

dot1x system-auth-control

B.

enable bypass-mac

C.

enable network-authentication

D.

mab

Question 39

An organization is adding new profiling probes to the system to improve profiling on Oseo ISE The probes must support a common network management protocol to receive information about the endpoints and the ports to which they are connected What must be configured on the network device to accomplish this goal?

Options:

A.

ARP

B.

SNMP

C.

WCCP

D.

ICMP

Question 40

An administrator has added a new Cisco ISE PSN to their distributed deployment. Which two features must the administrator enable to accept authentication requests and profile the endpoints correctly, and add them to their respective endpoint identity groups? (Choose two )

Options:

A.

Session Services

B.

Endpoint Attribute Filter

C.

Posture Services

D.

Profiling Services

E.

Radius Service

Question 41

Which two features should be used on Cisco ISE to enable the TACACS+ feature? (Choose two )

Options:

A.

External TACACS Servers

B.

Device Admin Service

C.

Device Administration License

D.

Server Sequence

E.

Command Sets

Question 42

An engineer deploys Cisco ISE and must configure Active Directory to then use information from Active Directory in an authorization policy. Which two components must be configured, in addition to Active Directory groups, to achieve this goat? (Choose two )

Options:

A.

Active Directory External Identity Sources

B.

Library Condition for External Identity. External Groups

C.

Identity Source Sequences

D.

LDAP External Identity SourcesE Library Condition for Identity Group: User Identity Group

Question 43

Which two fields are available when creating an endpoint on the context visibility page of Cisco IS? (Choose two)

Options:

A.

Policy Assignment

B.

Endpoint Family

C.

Identity Group Assignment

D.

Security Group Tag

E.

IP Address

Question 44

An administrator is configuring a switch port for use with 802 1X What must be done so that the port will allow voice and multiple data endpoints?

Options:

A.

Configure the port with the authentication host-mode multi-auth command

B.

Connect the data devices to the port, then attach the phone behind them.

C.

Use the command authentication host-mode multi-domain on the port

D.

Connect a hub to the switch port to allow multiple devices access after authentication

Question 45

An administrator must configure Cisco ISE to send CoA requests to a Cisco switch using SNMP. These configurations were already performed:

    enabled SNMP on the switch

    added the switch to Cisco ISE

    configured a network device profile

    configured the NAD port detection method

    configured the operation to be performed on the switch port

    configured an authorization profile

Which two configurations must be performed to send the CoA requests? (Choose two.)

Options:

A.

Select the CoA type as SNMP in the network device profile.

B.

Configure the SNMP server in Cisco ISE.

C.

Configure SNMP authentication in Cisco ISE.

D.

Configure a network device group.

E.

Configure the switch SNMP settings of the NAD.

Question 46

The security engineer for a company has recently deployed Cisco ISE to perform centralized authentication of all network device logins using TACACS+ against the local AD domain. Some of the other network engineers are having a hard time remembering to enter their AD account password instead of the local admin password that they have used for years. The security engineer wants to change the password prompt to "Use Local AD Password:" as a way of providing a hint to the network engineers when logging in. Under which page in Cisco ISE would this change be made?

Options:

A.

Work Centers > Device Administration > Settings > Connection Settings

B.

Work Centers > Device Administration > Ext Id Sources > Advanced Settings

C.

The password prompt cannot be changed on a Cisco IOS device

D.

Work Centers > Device Administration > Network Resources > Network Devices

Question 47

Using the SAK Active Directory Federation Services server. The configurations were performed:

• created a new SAML Identity provider profile in Cisco ISE

• exported the service provider Information

• configured all the required Active Directory Federation Services configurations

• Imported the Active Directory Federation Services metadata

• configured groups in the new SAML identity

• added attributes to the new SAML identity provider profile

• configured Advanced Settings in the new SAML identity provider profile

Which two actions must be taken to complete the configuration? (Choose two.)

Options:

A.

Allow Kerberos single sign-on on the Sponsor portal.

B.

Configure the Sponsor portal HTTPS port for Active Directory Federation Services integration.

C.

Customize the Sponsor portal pages for Integration with Active Directory Federation Services.

D.

Add SAML identity provider groups in Sponsor Group Members.

E.

Configure an identity source sequence in the Sponsor portal.

Question 48

An engineer is configuring a new Cisco ISE node. Context-sensitive information must be shared between the Cisco ISE and a Cisco ASA. Which persona must be enabled?

Options:

A.

Administration

B.

Policy Service

C.

pxGrid

D.

Monitoring

Question 49

What occurs when a Cisco ISE distributed deployment has two nodes and the secondary node is deregistered?

Options:

A.

The primary node restarts

B.

The secondary node restarts.

C.

The primary node becomes standalone

D.

Both nodes restart.

Question 50

An engineer is enabling a newly configured wireless SSID for tablets and needs visibility into which other types of devices are connecting to it. What must be done on the Cisco WLC to provide this information to Cisco ISE9

Options:

A.

enable IP Device Tracking

B.

enable MAC filtering

C.

enable Fast Transition

D.

enable mDNS snooping

Question 51

An engineer is unable to use SSH to connect to a switch after adding the required CLI commands to the device to enable TACACS+. The device administration license has been added to Cisco ISE, and the required policies have been created. Which action is needed to enable access to the switch?

Options:

A.

The ip ssh source-interface command needs to be set on the switch

B.

802.1X authentication needs to be configured on the switch.

C.

The RSA keypair used for SSH must be regenerated after enabling TACACS+.

D.

The switch needs to be added as a network device in Cisco ISE and set to use TACACS+.

Question 52

What is the minimum certainty factor when creating a profiler policy?

Options:

A.

the minimum number that a predefined condition provides

B.

the maximum number that a predefined condition provides

C.

the minimum number that a device certainty factor must reach to become a member of the profile

D.

the maximum number that a device certainty factor must reach to become a member of the profile

Question 53

An engineer is configuring Cisco ISE for guest services They would like to have any unregistered guests redirected to the guest portal for authentication then have a CoA provide them with full access to the network that is segmented via firewalls Why is the given configuration failing to accomplish this goal?

Options:

A.

The Guest Flow condition is not in the line that gives access to the quest portal

B.

The Network_Access_Authentication_Passed condition will not work with guest services for portal access.

C.

The Permit Access result is not set to restricted access in its policy line

D.

The Guest Portal and Guest Access policy lines are in the wrong order

Question 54

A Cisco device has a port configured in multi-authentication mode and is accepting connections only from hosts assigned the SGT of SGT_0422048549 The VLAN trunk link supports a maximum of 8 VLANS What is the reason for these restrictions?

Options:

A.

The device is performing inline tagging without acting as a SXP speaker

B.

The device is performing mime tagging while acting as a SXP speaker

C.

The IP subnet addresses are dynamically mapped to an SGT.

D.

The IP subnet addresses are statically mapped to an SGT

Question 55

Which two default guest portals are available with Cisco ISE? (Choose two.)

Options:

A.

visitor

B.

WIFI-access

C.

self-registered

D.

central web authentication

E.

sponsored

Question 56

A network administrator is currently using Cisco ISE to authenticate devices and users via 802 1X There is now a need to also authorize devices and users using EAP-TLS. Which two additional components must be configured in Cisco ISE to accomplish this'? (Choose two.)

Options:

A.

Network Device Group

B.

Serial Number attribute that maps to a CA Server

C.

Common Name attribute that maps to an identity store

D.

Certificate Authentication Profile

E.

EAP Authorization Profile

Question 57

A network security administrator wants to integrate Cisco ISE with Active Directory. Which configuration action must the security administrator take to accomplish the task?

Options:

A.

Remove Cisco ISE user account from the domain.

B.

Remove the ISE machine account from the domain.

C.

Join Cisco ISE to the Active Directory domain.

D.

Search Active Directory to see if admin user account exists.

Question 58

A network engineer must enable a profiling probe. The profiling must take details through the Active Directory. Where in the Cisco ISE interface would the engineer enable the probe?

Options:

A.

Policy > Policy Elements > Profiling

B.

Administration > Deployment > System > Profiling

C.

Policy > Deployment > System > Profiling

D.

Administration > System > Deployment > Profiling

Question 59

Which two features must be used on Cisco ISE to enable the TACACS. feature? (Choose two)

Options:

A.

Device Administration License

B.

Server Sequence

C.

Command Sets

D.

Enable Device Admin Service

E.

External TACACS Servers

Question 60

A security engineer configures a Cisco Catalyst switch to use Cisco TrustSec. The engineer must define the PAC key to authenticate the switch to Cisco IISE. Drag and drop the commands from the left into sequence on the right. Not all options are used.

Options:

Question 61

An engineer needs to configure a compliance policy on Cisco ISE to ensure that the latest encryption software is running on the C drive of all endpoints. Drag and drop the configuration steps from the left into the sequence on the right to accomplish this task.

Options:

Question 62

Drag the descriptions on the left onto the components of 802.1X on the right.

Options:

Question 63

An administrator is responsible for configuring network access for a temporary network printer. The administrator must only use the printer MAC address 50:89:65: 18:8: AB for authentication. Which authentication method will accomplish the task?

Options:

A.

Posturing

B.

Profiling

C.

MAB

D.

802.1x

Question 64

A network administrator is configuring client provisioning resource policies for client machines and must ensure that an agent pop-up is presented to the client when attempting to connect to the network Which configuration item needs to be added to allow for this'?

Options:

A.

the client provisioning URL in the authorization policy

B.

a temporal agent that gets installed onto the system

C.

a remote posture agent proxying the network connection

D.

an API connection back to the client

Question 65

An engineer is migrating users from MAB to 802.1X on the network. This must be done during normal business hours with minimal impact to users. Which CoA method should be used?

Options:

A.

Port Bounce

B.

Port Shutdown

C.

Session Termination

D.

Session Reauthentication

Question 66

Refer to the exhibit.

An engineer is configuring a client but cannot authenticate to Cisco ISE During troubleshooting, the show authentication sessions command was issued to display the authentication status of each port Which command gives additional information to help identify the problem with the authentication?

Options:

A.

show authentication sessions

B.

show authentication sessions Interface Gil/0/1 output

C.

show authentication sessions interface Gi1/0/1 details

D.

show authentication sessions output

Question 67

A network engineer must create a guest portal for wireless guests on Cisco ISE. The guest users must not be able to create accounts; however, the portal should require a username and password to connect. Which portal type must be created in Cisco ISE to meet the requirements?

Options:

A.

Sponsored Guest Access

B.

Self Registered Guest Access

C.

Custom Guest Portal

D.

Hotspot Guest Access

Question 68

An engineer must use Cisco ISE profiler services to provide network access to Cisco IP phones that cannot support 802.1X. Cisco ISE is configured to use the access switch device sensor information system-description and platform-type to profile Cisco IP phones and allow access. Which two protocols must be configured on the switch to complete the configuration? (Choose two.)

Options:

A.

CDP

B.

EAPOL

C.

LLDP

D.

SNMP

E.

STP

Question 69

A laptop was stolen and a network engineer added it to the block list endpoint identity group What must be done on a new Cisco ISE deployment to redirect the laptop and restrict access?

Options:

A.

Select DenyAccess within the authorization policy.

B.

Ensure that access to port 8443 is allowed within the ACL.

C.

Ensure that access to port 8444 is allowed within the ACL.

D.

Select DROP under If Auth fail within the authentication policy.

Question 70

An engineer needs to configure a new certificate template in the Cisco ISE Internal Certificate Authority to prevent BYOD devices from needing to re-enroll when their MAC address changes. Which option must be selected in the Subject Alternative Name field?

Options:

A.

Common Name and GUID

B.

MAC Address and GUID

C.

Distinguished Name

D.

Common Name

Question 71

An organization wants to enable web-based guest access for both employees and visitors The goal is to use a single portal for both user types Which two authentication methods should be used to meet this requirement? (Choose two )

Options:

A.

LDAP

B.

802 1X

C.

Certificate-based

D.

LOCAL

E.

MAC based

Question 72

Which nodes are supported in a distributed Cisco ISE deployment?

Options:

A.

Policy Service nodes for session failover

B.

Monitoring nodes for PxGrid services

C.

Administration nodes for session failover

D.

Policy Service nodes for automatic failover

Question 73

The security team identified a rogue endpoint with MAC address 00:46:91:02:28:4A attached to the network. Which action must security engineer take within Cisco ISE to effectively

restrict network access for this endpoint?

Options:

A.

Configure access control list on network switches to block traffic.

B.

Create authentication policy to force reauthentication.

C.

Add MAC address to the endpoint quarantine list.

D.

Implement authentication policy to deny access.

Question 74

What allows an endpoint to obtain a digital certificate from Cisco ISE during a BYOD flow?

Options:

A.

Network Access Control

B.

My Devices Portal

C.

Application Visibility and Control

D.

Supplicant Provisioning Wizard

Question 75

An engineer is configuring posture assessment for their network access control and needs to use an agent that supports using service conditions as conditions for the assessment. The agent should be run as a background process to avoid user interruption but when it is run. the user can see it. What is the problem?

Options:

A.

The engineer is using the "Anyconnect” posture agent but should be using the "Stealth Anyconnect posture agent

B.

The posture module was deployed using the headend instead of installing it with SCCM

C.

The user was in need of remediation so the agent appeared m the notifications

D.

The proper permissions were no! given to the temporal agent to conduct the assessment

Question 76

An engineer is configuring 802.1X and is testing out their policy sets. After authentication, some endpoints are given an access-reject message but are still allowed onto the network. What is causing this issue to occur?

Options:

A.

The switch port is configured with authentication event server dead action authorize vlan.

B.

The authorization results for the endpoints include a dACL allowing access.

C.

The authorization results for the endpoints include the Trusted security group tag.

D.

The switch port is configured with authentication open.

Question 77

What is a method for transporting security group tags throughout the network?

Options:

A.

by enabling 802.1AE on every network device

B.

by the Security Group Tag Exchange Protocol

C.

by embedding the security group tag in the IP header

D.

by embedding the security group tag in the 802.1Q header

Question 78

Which two responses from the RADIUS server to NAS are valid during the authentication process? (Choose two)

Options:

A.

access-response

B.

access-request

C.

access-reserved

D.

access-accept

E.

access-challenge

Question 79

Refer to the exhibit.

An engineer must configure Cisco ISE to be used as the TACACS+ server for any administrator that signs into the router. Users must be able to change their Telnet password through the TACACS+ server. Drag and drop the configuration steps from the left into the sequence on the right.

Options:

Question 80

Which two ports do network devices typically use for CoA? (Choose two)

Options:

A.

443

B.

19005

C.

8080

D.

3799

E.

1700

Question 81

Which two external identity stores support EAP-TLS and PEAP-TLS? (Choose two.)

Options:

A.

Active Directory

B.

RADIUS Token

C.

Internal Database

D.

RSA SecurlD

E.

LDAP

Question 82

Which two roles are taken on by the administration person within a Cisco ISE distributed environment? (Choose two.)

Options:

A.

backup

B.

secondary

C.

standby

D.

primary

E.

active

Question 83

Which compliance status is set when a matching posture policy has been defined for that endpomt. but all the mandatory requirements during posture assessment are not met?

Options:

A.

unauthorized

B.

untrusted

C.

non-compliant

D.

unknown

Question 84

A network administrator must configura endpoints using an 802 1X authentication method with EAP identity certificates that are provided by the Cisco ISE When the endpoint presents the identity certificate to Cisco ISE to validate the certificate, endpoints must be authorized to connect to the network Which EAP type must be configured by the network administrator to complete this task?

Options:

A.

EAP-PEAP-MSCHAPv2

B.

EAP-TTLS

C.

EAP-FAST

D.

EAP-TLS

Question 85

An administrator adds a new network device to the Cisco ISE configuration to authenticate endpoints to the network. The RADIUS test fails after the administrator configures all of the settings in Cisco ISE and adds the proper configurations to the switch. What is the issue"?

Options:

A.

The endpoint profile is showing as "unknown."

B.

The endpoint does not have the appropriate credentials for network access.

C.

The shared secret is incorrect on the switch or on Cisco ISE.

D.

The certificate on the switch is self-signed not a CA-provided certificate.

Question 86

When creating a policy within Cisco ISE for network access control, the administrator wants to allow different access restrictions based upon the wireless SSID to which the device is connecting. Which policy condition must be used in order to accomplish this?

Options:

A.

Network Access NetworkDeviceName CONTAINS

B.

DEVICE Device Type CONTAINS

C.

Radius Called-Station-ID CONTAINS

D.

Airespace Airespace-Wlan-ld CONTAINS

Question 87

An administrator connects an HP printer to a dot1x enable port, but the printer in not accessible Which feature must the administrator enable to access the printer?

Options:

A.

MAC authentication bypass

B.

change of authorization

C.

TACACS authentication

D.

RADIUS authentication

Question 88

An ISE administrator must change the inactivity timer for MAB endpoints to terminate the authentication session whenever a switch port that is connected to an IP phone does not detect packets from the device for 30 minutes. Which action must be taken to accomplish this task?

Options:

A.

Add the authentication timer reauthenticate server command to the switchport.

B.

Add the authentication timer inactivity 3600 command to the switchport.

C.

Change the idle-timeout on the Radius server to 3600 seconds for IP Phone endpoints.

D.

Configure the session-timeout to be 3600 seconds on Cisco ISE.

Question 89

Which two external identity stores are supported by Cisco ISE for password types? (Choose two.)

Options:

A.

LDAP

B.

OBDC

C.

RADIUS Token Server

D.

TACACS+ Token Server

E.

SOL

Page: 1 / 22
Total 299 questions