Summer Special Discount 60% Offer - Ends in 0d 00h 00m 00s - Coupon code: brite60

ExamsBrite Dumps

Implementing and Configuring Cisco Identity Services Engine (SISE) v4.0 (300-715 SISE) Question and Answers

Implementing and Configuring Cisco Identity Services Engine (SISE) v4.0 (300-715 SISE)

Last Update Oct 2, 2025
Total Questions : 295

We are offering FREE 300-715 Cisco exam questions. All you do is to just go and sign up. Give your details, prepare 300-715 free exam questions and then go for complete pool of Implementing and Configuring Cisco Identity Services Engine (SISE) v4.0 (300-715 SISE) test questions that will help you more.

300-715 pdf

300-715 PDF

$46  $114.99
300-715 Engine

300-715 Testing Engine

$54  $134.99
300-715 PDF + Engine

300-715 PDF + Testing Engine

$70  $174.99
Questions 1

What is a valid guest portal type?

Options:

A.  

Sponsored-Guest

B.  

My Devices

C.  

Sponsor

D.  

Captive-Guest

Discussion 0
Questions 2

A new employee just connected their workstation to a Cisco IP phone. The network administrator wants to ensure that the Cisco IP phone remains online when the user disconnects their Workstation from the corporate network Which CoA configuration meets this requirement?

Options:

A.  

Port Bounce

B.  

Reauth

C.  

NoCoA

D.  

Disconnect

Discussion 0
Questions 3

An engineer needs to configure Cisco ISE Profiling Services to authorize network access for IP speakers that require access to the intercom system. This traffic needs to be identified if the ToS bit is set to 5 and the destination IP address is the intercom system. What must be configured to accomplish this goal?

Options:

A.  

NMAP

B.  

NETFLOW

C.  

pxGrid

D.  

RADIUS

Discussion 0
Questions 4

Drag the descriptions on the left onto the components of 802.1X on the right.

Options:

Discussion 0
Questions 5

An engineer is configuring 802.1X and is testing out their policy sets. After authentication, some endpoints are given an access-reject message but are still allowed onto the network. What is causing this issue to occur?

Options:

A.  

The switch port is configured with authentication event server dead action authorize vlan.

B.  

The authorization results for the endpoints include a dACL allowing access.

C.  

The authorization results for the endpoints include the Trusted security group tag.

D.  

The switch port is configured with authentication open.

Discussion 0
Questions 6

An engineer is implementing Cisco ISE and needs to configure 802.1X. The port settings are configured for port-based authentication. Which command should be used to complete this configuration?

Options:

A.  

dot1x pae authenticator

B.  

dot1x system-auth-control

C.  

authentication port-control auto

D.  

aaa authentication dot1x default group radius

Discussion 0
Questions 7

Which two endpoint compliance statuses are possible? (Choose two.)

Options:

A.  

unknown

B.  

known

C.  

invalid

D.  

compliant

E.  

valid

Discussion 0
Questions 8

A network security administrator needs a web authentication configuration when a guest user connects to the network with a wireless connection using these steps:

. An initial MAB request is sent to the Cisco ISE node.

. Cisco ISE responds with a URL redirection authorization profile if the user's MAC address is unknown in the endpoint identity store.

. The URL redirection presents the user with an AUP acceptance page when the user attempts to go to any URL.

Which authentication must the administrator configure on Cisco ISE?

Options:

A.  

device registration WebAuth

B.  

WLC with local WebAuth

C.  

wired NAD with local WebAuth

D.  

NAD with central WebAuth

Discussion 0
Questions 9

Drag the Cisco ISE node types from the left onto the appropriate purposes on the right.

Options:

Discussion 0
Questions 10

What is the difference between how RADIUS and TACACS+ handle encryption?

Options:

A.  

RADIUS encrypts only the username and password fields, whereas TACACS+ encrypts the entire packet.

B.  

RADIUS encrypts the entire packet, whereas TACACS+ only encrypts the password field.

C.  

RADIUS only encrypts the password field, whereas TACACS+ encrypts the payload of packet.

D.  

RADIUS encrypts the entire packet, whereas TACACS+ encrypts only the username and password fields.

Discussion 0
Questions 11

What is a requirement for Feed Service to work?

Options:

A.  

TCP port 3080 must be opened between Cisco ISE and the feed server

B.  

Cisco ISE has a base license.

C.  

Cisco ISE has access to an internal server to download feed update

D.  

Cisco ISE has Internet access to download feed update

Discussion 0
Questions 12

What is the Microsoft security policy recommendation (or fast user switching in Cisco ISE?

Options:

A.  

Disable BYOD posture agent.

B.  

Enable fast user switching.

C.  

Disable fast user switching.

D.  

Enable Cisco Secure Client posture agent.

Discussion 0
Questions 13

A user reports that the RADIUS accounting packets are not being seen on the Cisco ISE server.

Which command is the user missing in the switch’s configuration?

Options:

A.  

radius-server vsa send accounting

B.  

aaa accounting network default start-stop group radius

C.  

aaa accounting resource default start-stop group radius

D.  

aaa accounting exec default start-stop group radios

Discussion 0
Questions 14

What must be configured on the Cisco ISE authentication policy for unknown MAC addresses/identities for successful authentication?

Options:

A.  

pass

B.  

reject

C.  

drop

D.  

continue

Discussion 0
Questions 15

Which permission is common to the Active Directory Join and Leave operations?

Options:

A.  

Create a Cisco ISE machine account in the domain if the machine account does not already exist

B.  

Remove the Cisco ISE machine account from the domain.

C.  

Set attributes on the Cisco ISE machine account

D.  

Search Active Directory to see if a Cisco ISE machine account already ex.sts.

Discussion 0
Questions 16

An administrator is configuring the Native Supplicant Profile to be used with the Cisco ISE posture agents and needs to test the connection using wired devices to determine which profile settings are available. Which two configuration settings should be used to accomplish this task? (Choose two.)

Options:

A.  

authentication mode

B.  

proxy host/IP

C.  

certificate template

D.  

security

E.  

allowed protocol

Discussion 0
Questions 17

A network administrator changed a Cisco ISE deployment from pilot to production and noticed that the JVM memory utilization increased significantly. The administrator suspects this is due to replication between the nodes What must be configured to minimize performance degradation?

Options:

A.  

Review the profiling policies for any misconfiguration

B.  

Enable the endpoint attribute filter

C.  

Change the reauthenticate interval.

D.  

Ensure that Cisco ISE is updated with the latest profiler feed update

Discussion 0
Questions 18

Select and Place

Options:

Discussion 0
Questions 19

An administrator is troubleshooting an endpoint that is supposed to bypass 802 1X and use MAB. The endpoint is bypassing 802.1X and successfully getting network access using MAB. however the endpoint cannot communicate because it cannot obtain an IP address. What is the problem?

Options:

A.  

The DHCP probe for Cisco ISE is not working as expected.

B.  

The 802.1 X timeout period is too long.

C.  

The endpoint is using the wrong protocol to authenticate with Cisco ISE.

D.  

An AC I on the port is blocking HTTP traffic

Discussion 0
Questions 20

Which two events trigger a CoA for an endpoint when CoA is enabled globally for ReAuth? (Choose two.)

Options:

A.  

endpoint marked as lost in My Devices Portal

B.  

addition of endpoint to My Devices Portal

C.  

endpoint profile transition from Apple-Device to Apple-iPhone

D.  

endpoint profile transition from Unknown to Windows 10-Workstation

E.  

updating of endpoint dACL.

Discussion 0
Questions 21

A Cisco ISE engineer is creating a certificate authentication profile to be used with machine authentication for the network. The engineer wants to be able to compare the user-presented certificate with a certificate stored in Active Directory. What must be done to accomplish this?

Options:

A.  

Configure the user-presented password hash and a hash stored in Active Directory for comparison

B.  

Add the subject alternative name and the common name to the CAP.

C.  

Enable the option for performing binary comparison.

D.  

Use MS-CHAPv2 since it provides machine credentials and matches them to credentials stored in Active Directory

Discussion 0
Questions 22

What is needed to configure wireless guest access on the network?

Options:

A.  

endpoint already profiled in ISE

B.  

WEBAUTH ACL for redirection

C.  

valid user account in Active Directory

D.  

Captive Portal Bypass turned on

Discussion 0
Questions 23

Refer to the exhibit.

An organization recently implemented network device administration using Cisco ISE. Upon testing the ability to access all of the required devices, a user in the Cisco ISE group IT Admins is attempting to login to a device in their organization's finance department but is unable to. What is the problem?

Options:

A.  

The IT training rule is taking precedence over the IT Admins rule.

B.  

The authorization conditions wrongly allow IT Admins group no access to finance devices.

C.  

The finance location is not a condition in the policy set.

D.  

The authorization policy doesn't correctly grant them access to the finance devices.

Discussion 0
Questions 24

An engineer needs to configure a compliance policy on Cisco ISE to ensure that the latest encryption software is running on the C drive of all endpoints. Drag and drop the configuration steps from the left into the sequence on the right to accomplish this task.

Options:

Discussion 0
Questions 25

Refer to the exhibit:

Which command is typed within the CU of a switch to view the troubleshooting output?

Options:

A.  

show authentication sessions mac 000e.84af.59af details

B.  

show authentication registrations

C.  

show authentication interface gigabitethemet2/0/36

D.  

show authentication sessions method

Discussion 0
Questions 26

Which two ports must be open between Cisco ISE and the client when you configure posture on Cisco ISE? (Choose two).

Options:

A.  

TCP 8443

B.  

TCP 8906

C.  

TCP 443

D.  

TCP 80

E.  

TCP 8905

Discussion 0
Questions 27

An engineer must use Cisco ISE to provide network access to endpoints that cannot support 802.1X. The endpoint MAC addresses must be allowlisted by configuring an endpoint identity group. These configurations were performed:

• configured an identity group named allowlist

• configured the endpoints to use the MAC address of incompatible 802.1X devices

• added the endpoints to the allowlist identity group

• configured an authentication policy for MAB users

What must be configured?

Options:

A.  

authorization profile that has the PermitAccess permission and matches the allowlist identity group

B.  

logical profile that matches the allowlist identity group based on the configured policy

C.  

authentication profile that has the PermitAccess permission and matches the allowlist identity group authorization policy that has the PermitAccess permission and matches the allowlist identity group

D.  

authorization policy that has the PermitAccess permission and matches the allowtist identity group

Discussion 0
Questions 28

An engineer must configure Cisco ISE to provide internet access for guests in which guests are required to enter a code to gain network access. Which action accomplishes the goal?

Options:

A.  

Configure the hotspot portal for guest access and require an access code.

B.  

Configure the sponsor portal with a single account and use the access code as the password.

C.  

Configure the self-registered guest portal to allow guests to create a personal access code.

D.  

Create a BYOD policy that bypasses the authentication of the user and authorizes access codes.

Discussion 0
Questions 29

Refer to the exhibit.

Which two configurations are needed on a catalyst switch for it to be added as a network access device in a Cisco ISE that is being used for 802 1X authentications? (Choose two )

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

E.  

Option E

Discussion 0
Questions 30

Which personas can a Cisco ISE node assume'?

Options:

A.  

policy service, gatekeeping, and monitoring

B.  

administration, policy service, and monitoring

C.  

administration, policy service, gatekeeping

D.  

administration, monitoring, and gatekeeping

Discussion 0
Questions 31

What service can be enabled on the Cisco ISE node to identity the types of devices connecting to a network?

Options:

A.  

MAB

B.  

profiling

C.  

posture

D.  

central web authentication

Discussion 0
Questions 32

Refer to the exhibit.

Which switch configuration change will allow only one voice and one data endpoint on each port?

Options:

A.  

Multi-auth to multi-domain

B.  

Mab to dot1x

C.  

Auto to manual

D.  

Multi-auth to single-auth

Discussion 0
Questions 33

A network administrator is configuring a secondary cisco ISE node from the backup configuration of the primary cisco ISE node to create a high availability pair The Cisco ISE CA certificates and keys must be manually backed up from the primary Cisco ISE and copied into the secondary Cisco ISE Which command most be issued for this to work?

Options:

A.  

copy certificate Ise

B.  

application configure Ise

C.  

certificate configure Ise

D.  

Import certificate Ise

Discussion 0
Questions 34

An engineer is configuring sponsored guest access and needs to limit each sponsored guest to a maximum of two devices. There are other guest services in production that rely on the default guest types. How should this configuration change be made without disrupting the other guest services currently offering three or more guest devices per user?

Options:

A.  

Create an ISE identity group to add users to and limit the number of logins via the group configuration.

B.  

Create a new guest type and set the maximum number of devices sponsored guests can register

C.  

Create an LDAP login for each guest and tag that in the guest portal for authentication.

D.  

Create a new sponsor group and adjust the settings to limit the devices for each guest.

Discussion 0
Questions 35

What is a function of client provisioning?

Options:

A.  

Client provisioning ensures that endpoints receive the appropriate posture agents.

B.  

Client provisioning checks a dictionary attribute with a value.

C.  

Client provisioning ensures an application process is running on the endpoint.

D.  

Client provisioning checks the existence, date, and versions of the file on a client.

Discussion 0
Questions 36

Which supplicant(s) and server(s) are capable of supporting EAP-CHAINING?

Options:

A.  

Cisco AnyConnect NAM and Cisco Identity Service Engine

B.  

Cisco AnyConnect NAM and Cisco Access Control Server

C.  

Cisco Secure Services Client and Cisco Access Control Server

D.  

Windows Native Supplicant and Cisco Identity Service Engine

Discussion 0
Questions 37

An engineer is testing Cisco ISE policies in a lab environment with no support for a deployment server. In order to push supplicant profiles to the workstations for testing, firewall ports will need to be opened. From which Cisco ISE persona should this traffic be originating?

Options:

A.  

monitoring

B.  

policy service

C.  

administration

D.  

authentication

Discussion 0
Questions 38

What allows an endpoint to obtain a digital certificate from Cisco ISE during a BYOD flow?

Options:

A.  

Network Access Control

B.  

My Devices Portal

C.  

Application Visibility and Control

D.  

Supplicant Provisioning Wizard

Discussion 0
Questions 39

An administrator is adding network devices for a new medical building into Cisco ISE. These devices must be in a network device group that is identifying them as "Medical Switch" so that the policies can be made separately for the endpoints connecting through them. Which configuration item must be changed in the network device within Cisco ISE to accomplish this goal?

Options:

A.  

Change the device type to Medical Switch.

B.  

Change the device profile to Medical Switch.

C.  

Change the model name to Medical Switch.

D.  

Change the device location to Medical Switch.

Discussion 0
Questions 40

A user changes the status of a device to stolen in the My Devices Portal of Cisco ISE. The device was originally onboarded in the BYOD wireless Portal without a certificate. The device is found later, but the user cannot re-onboard the device because Cisco ISE assigned the device to the Blocklist endpoint identity group. What must the user do in the My Devices Portal to resolve this issue?

Options:

A.  

Manually remove the device from the Blocklist endpoint identity group.

B.  

Change the device state from Stolen to Not Registered.

C.  

Change the BYOD registration attribute of the device to None.

D.  

Delete the device, and then re-add the device.

Discussion 0
Questions 41

Which three default endpoint identity groups does cisco ISE create? (Choose three)

Options:

A.  

Unknown

B.  

whitelist

C.  

end point

D.  

profiled

E.  

blacklist

Discussion 0
Questions 42

An engineer is designing a new distributed deployment for Cisco ISE in the network and is considering failover options for the admin nodes. There is a need to ensure that an admin node is available for configuration of policies at all times. What is the requirement to enable this feature?

Options:

A.  

one primary admin and one secondary admin node in the deployment

B.  

one policy services node and one secondary admin node

C.  

one policy services node and one monitoring and troubleshooting node

D.  

one primary admin node and one monitoring and troubleshooting node

Discussion 0
Questions 43

Which two external identity stores are supported by Cisco ISE for password types? (Choose two.)

Options:

A.  

LDAP

B.  

OBDC

C.  

RADIUS Token Server

D.  

TACACS+ Token Server

E.  

SOL

Discussion 0
Questions 44

Which compliance status is set when a matching posture policy has been defined for that endpomt. but all the mandatory requirements during posture assessment are not met?

Options:

A.  

unauthorized

B.  

untrusted

C.  

non-compliant

D.  

unknown

Discussion 0
Questions 45

When configuring an authorization policy, an administrator cannot see specific Active Directory groups present in their domain to be used as a policy condition. However, other groups that are in the same domain are seen What is causing this issue?

Options:

A.  

Cisco ISE only sees the built-in groups, not user created ones

B.  

The groups are present but need to be manually typed as conditions

C.  

Cisco ISE's connection to the AD join point is failing

D.  

The groups are not added to Cisco ISE under the AD join point

Discussion 0
Questions 46

An organization wants to implement 802.1X and is debating whether to use PEAP-MSCHAPv2 or PEAP-EAP-TLS for authentication. Drag the characteristics on the left to the corresponding protocol on the right.

Options:

Discussion 0
Questions 47

A Cisco device has a port configured in multi-authentication mode and is accepting connections only from hosts assigned the SGT of SGT_0422048549 The VLAN trunk link supports a maximum of 8 VLANS What is the reason for these restrictions?

Options:

A.  

The device is performing inline tagging without acting as a SXP speaker

B.  

The device is performing mime tagging while acting as a SXP speaker

C.  

The IP subnet addresses are dynamically mapped to an SGT.

D.  

The IP subnet addresses are statically mapped to an SGT

Discussion 0
Questions 48

A network engineer must configure a centralized Cisco ISE solution for wireless guest access with users in different time zones. The guest account activation time must be independent of the user time zone, and the guest account must be enabled automatically when the user self-registers on the guest portal. Which option in the time profile settings must be selected to meet the requirement?

Options:

A.  

Select FromFirstLogin from the Account Type dropdown.

B.  

Select FromCreation from the Account Type dropdown.

C.  

Set the Maximum Account Duration to 1 Day.

D.  

Set the Duration field to 24:00:00.

Discussion 0
Questions 49

A Cisco ISE server sends a CoA to a NAD after a user logs in successfully using CWA Which action does the CoA perform?

Options:

A.  

It terminates the client session

B.  

It applies the downloadable ACL provided in the CoA

C.  

It applies new permissions provided in the CoA to the client session.

D.  

It triggers the NAD to reauthenticate the client

Discussion 0
Questions 50

A network engineer must configure a centralized Cisco ISE solution for wireless guest access with users in different time zones. The guest account activation time must be independent of the user time zone, and the guest account must be enabled automatically when the user self-registers on the guest portal.

Which option in the time profile settings must be selected to meet the requirement?

Options:

A.  

Select FromFirstLogin from the Account Type dropdown.

B.  

Select FromCreation from the Account Type dropdown.

C.  

Set the Maximum Account Duration to 1 Day.

D.  

Set the Duration field to 24:00:00.

Discussion 0
Questions 51

A network engineer is in the predeployment discovery phase o! a Cisco ISE deployment and must discover the network. There is an existing network management system in the network. Which type of probe must be configured to gather the information?

Options:

A.  

NetFlow

B.  

RADIUS

C.  

SNMP

D.  

NMAP

Discussion 0
Questions 52

A network administrator must configura endpoints using an 802 1X authentication method with EAP identity certificates that are provided by the Cisco ISE When the endpoint presents the identity certificate to Cisco ISE to validate the certificate, endpoints must be authorized to connect to the network Which EAP type must be configured by the network administrator to complete this task?

Options:

A.  

EAP-PEAP-MSCHAPv2

B.  

EAP-TTLS

C.  

EAP-FAST

D.  

EAP-TLS

Discussion 0
Questions 53

Which advanced option within a WLAN must be enabled to trigger Central Web Authentication for Wireless users on AireOS controller?

Options:

A.  

DHCP server

B.  

static IP tunneling

C.  

override Interface ACL

D.  

AAA override

Discussion 0
Questions 54

A network security engineer needs to configure 802.1X port authentication to allow a single host to be authenticated for data and another single host to be authenticated for voice. Which command should the engineer run on the interface to accomplish this goal?

Options:

A.  

authentication host-mode single-host

B.  

authentication host-mode multi-auth

C.  

authentication host-mode multi-host

D.  

authentication host-mode multi-domain

Discussion 0
Questions 55

An engineer is tasked with placing a guest access anchor controller in the DMZ. Which two ports or port sets must be opened up on the firewall to accomplish this task? (Choose two.)

Options:

A.  

UDP port 1812 RADIUS

B.  

TCP port 161

C.  

TCP port 514

D.  

UDP port 79

E.  

UDP port 16666

Discussion 0
Questions 56

An engineer is designing a BYOD environment utilizing Cisco ISE for devices that do not support native supplicants Which portal must the security engineer configure to accomplish this task?

Options:

A.  

MDM

B.  

Client provisioning

C.  

My devices

D.  

BYOD

Discussion 0
Questions 57

Which two values are compared by the binary comparison (unction in authentication that is based on Active Directory?

Options:

A.  

subject alternative name and the common name

B.  

MS-CHAPv2 provided machine credentials and credentials stored in Active Directory

C.  

user-presented password hash and a hash stored in Active Directory

D.  

user-presented certificate and a certificate stored in Active Directory

Discussion 0
Questions 58

A network engineer must enable a profiling probe. The profiling must take details through the Active Directory. Where in the Cisco ISE interface would the engineer enable the probe?

Options:

A.  

Policy > Policy Elements > Profiling

B.  

Administration > Deployment > System > Profiling

C.  

Policy > Deployment > System > Profiling

D.  

Administration > System > Deployment > Profiling

Discussion 0
Questions 59

Which two Cisco ISE deployment models require two nodes configured with dedicated PAN and MnT personas? (Choose two.)

Options:

A.  

three PSN nodes

B.  

seven PSN nodes with one PxGrid node

C.  

five PSN nodes with one PxGrid node

D.  

two PSN nodes with one PxGrid node

E.  

six PSN nodes

Discussion 0
Questions 60

What is a characteristic of the UDP protocol?

Options:

A.  

UDP can detect when a server is down.

B.  

UDP offers best-effort delivery

C.  

UDP can detect when a server is slow

D.  

UDP offers information about a non-existent server

Discussion 0
Questions 61

An engineer is deploying a new Cisco ISE environment for a company. The company wants the deployment to use TACACS+. The engineer verifies that Cisco ISE has a Device Administration license. What must be configured to enable TACACS+ operations?

Options:

A.  

Device Administration Work Center

B.  

Device Admin service

C.  

Device Administration Deployment settings

D.  

Device Admin Policy Sets settings

Discussion 0
Questions 62

Which two roles are taken on by the administration person within a Cisco ISE distributed environment? (Choose two.)

Options:

A.  

backup

B.  

secondary

C.  

standby

D.  

primary

E.  

active

Discussion 0
Questions 63

An administrator must block access to BYOD endpoints that were onboarded without a certificate and have been reported as stolen in the Cisco ISE My Devices Portal. Which condition must be used when configuring an authorization policy that sets DenyAccess permission?

Options:

A.  

Endpoint Identity Group is Blocklist, and the BYOD state is Registered.

B.  

Endpoint Identify Group is Blocklist, and the BYOD state is Pending.

C.  

Endpoint Identity Group is Blocklist, and the BYOD state is Lost.

D.  

Endpoint Identity Group is Blocklist, and the BYOD state is Reinstate.

Discussion 0
Questions 64

Which CLI command must be configured on the switchport to immediately run the MAB process if a non-802.1X capable endpoint connects to the port?

Options:

A.  

authentication order mab dot1x

B.  

authentication fallback

C.  

dot1x pae authenticator

D.  

access-session port-control auto

Discussion 0
Questions 65

Which two external identity stores support EAP-TLS and PEAP-TLS? (Choose two.)

Options:

A.  

Active Directory

B.  

RADIUS Token

C.  

Internal Database

D.  

RSA SecurlD

E.  

LDAP

Discussion 0
Questions 66

What are two differences of TACACS+ compared to RADIUS? (Choose two.)

Options:

A.  

TACACS+ uses a connectionless transport protocol, whereas RADIUS uses a connection-oriented transport protocol.

B.  

TACACS+ encrypts the full packet payload, whereas RADIUS only encrypts the password.

C.  

TACACS+ only encrypts the password, whereas RADIUS encrypts the full packet payload.

D.  

TACACS+ uses a connection-oriented transport protocol, whereas RADIUS uses a connectionless transport protocol.

E.  

TACACS+ supports multiple sessions per user, whereas RADIUS supports one session per user.

Discussion 0
Questions 67

Which Cisco ISE deployment model provides redundancy by having every node in the deployment configured with the Administration. Policy Service, and Monitoring personas to protect from a complete node failure?

Options:

A.  

distributed

B.  

dispersed

C.  

two-node

D.  

hybrid

Discussion 0
Questions 68

What is a restriction of a standalone Cisco ISE node deployment?

Options:

A.  

Only the Policy Service persona can be disabled on the node.

B.  

The domain name of the node cannot be changed after installation.

C.  

Personas are enabled by default and cannot be edited on the node.

D.  

The hostname of the node cannot be changed after installation.

Discussion 0
Questions 69

An engineer has been tasked with standing up a new guest portal for customers that are waiting in the lobby. There is a requirement to allow guests to use their social media logins to access the guest network to appeal to more customers What must be done to accomplish this task?

Options:

A.  

Create a sponsor portal to allow guests to create accounts using their social media logins.

B.  

Create a sponsored guest portal and enable social media in the external identity sources.

C.  

Create a self-registered guest portal and enable the feature for social media logins

D.  

Create a hotspot portal and enable social media login for network access

Discussion 0
Questions 70

During BYOD flow, from where does a Microsoft Windows PC download the Network Setup Assistant?

Options:

A.  

Cisco App Store

B.  

Microsoft App Store

C.  

Cisco ISE directly

D.  

Native OTA functionality

Discussion 0
Questions 71

In a Cisco ISE split deployment model, which load is split between the nodes?

Options:

A.  

AAA

B.  

network admission

C.  

log collection

D.  

device admission

Discussion 0
Questions 72

What is a valid status of an endpoint attribute during the device registration process?

Options:

A.  

block listed

B.  

pending

C.  

unknown

D.  

DenyAccess

Discussion 0
Questions 73

Which two fields are available when creating an endpoint on the context visibility page of Cisco IS? (Choose two)

Options:

A.  

Policy Assignment

B.  

Endpoint Family

C.  

Identity Group Assignment

D.  

Security Group Tag

E.  

IP Address

Discussion 0
Questions 74

An administrator connects an HP printer to a dot1x enable port, but the printer in not accessible Which feature must the administrator enable to access the printer?

Options:

A.  

MAC authentication bypass

B.  

change of authorization

C.  

TACACS authentication

D.  

RADIUS authentication

Discussion 0
Questions 75

Refer to the exhibit Which component must be configured to apply the SGACL?

Options:

A.  

egress router

B.  

host

C.  

secure server

D.  

ingress router

Discussion 0
Questions 76

Which use case validates a change of authorization?

Options:

A.  

An authenticated, wired EAP-capable endpoint is discovered

B.  

An endpoint profiling policy is changed for authorization policy.

C.  

An endpoint that is disconnected from the network is discovered

D.  

Endpoints are created through device registration for the guests

Discussion 0
Questions 77

Wireless network users authenticate to Cisco ISE using 802.1X through a Cisco Catalyst switch. An engineer must create an updated configuration to assign a security group tag to the user's traffic using inline tagging to prevent unauthenticated users from accessing a restricted server. The configurations were performed:

• configured Cisco ISE as a Cisco TrustSec AAA server

• configured the switch as a RADIUS device in Cisco ISE

• configured the wireless LAN controller as a TrustSec device in Cisco ISE

• created a security group tog for the wireless users

• created a certificate authentication profile

■ created an identity source sequence

• assigned an appropriate security group tag to the wireless users

• defined security group access control lists to specify an egress policy

• enforced the access control lists on the TrustSec policy matrix in Cisco ISE

• configured TrustSec on the switch

• configured TrustSec on the wireless LAN controller

Which two actions must be taken to complete the configuration? (Choose two.)

Options:

A.  

Configure Security Group Tag Exchange Protocol on the wireless LAN controller.

B.  

Configure Security Group Tag Exchange Protocol to distribute IP to security group tags on Cisco ISE.

C.  

Configure inline tag propagation on the switch and wireless LAN controller.

D.  

Create static IP-to-SGT mapping for the restricted web server.

E.  

Configure Security Group Tag Exchange Protocol on the switch.

Discussion 0
Questions 78

An administrator enables the profiling service for Cisco ISE to use for authorization policies while in closed mode. When the endpoints connect, they receive limited access so that the profiling probes can gather information and Cisco ISE can assign the correct profiles. They are using the default values within Cisco ISE. but the devices do not change their access due to the new profile. What is the problem'?

Options:

A.  

In closed mode, profiling does not work unless CDP is enabled.

B.  

The profiling probes are not able to collect enough information to change the device profile

C.  

The profiler feed is not downloading new information so the profiler is inactive

D.  

The default profiler configuration is set to No CoA for the reauthentication setting

Discussion 0
Questions 79

What must be configured on the WLC to configure Central Web Authentication using Cisco ISE and a WLC?

Options:

A.  

Set the NAC State option to SNMP NAC.

B.  

Set the NAC State option to RADIUS NAC.

C.  

Use the radius-server vsa send authentication command.

D.  

Use the ip access-group webauth in command.

Discussion 0
Questions 80

A network engineer must enforce access control using special tags, without re-engineering the network design. Which feature should be configured to achieve this in a scalable manner?

Options:

A.  

SGT

B.  

dACL

C.  

VLAN

D.  

RBAC

Discussion 0
Questions 81

A network engineer must create a guest portal for wireless guests on Cisco ISE. The guest users must not be able to create accounts; however, the portal should require a username and password to connect. Which portal type must be created in Cisco ISE to meet the requirements?

Options:

A.  

Sponsored Guest Access

B.  

Self Registered Guest Access

C.  

Custom Guest Portal

D.  

Hotspot Guest Access

Discussion 0
Questions 82

An engineer is working on a switch and must tag packets with SGT values such that it learns via SXP. Which command must be entered to meet this requirement?

Options:

A.  

ip source guard

B.  

ip dhcp snooping

C.  

ip device tracking maximum

D.  

ip arp inspection

Discussion 0
Questions 83

An engineer is configuring 802.1X and wants it to be transparent from the users' point of view. The implementation should provide open authentication on the switch ports while providing strong levels of security for non-authenticated devices. Which deployment mode should be used to achieve this?

Options:

A.  

closed

B.  

low-impact

C.  

open

D.  

high-impact

Discussion 0
Questions 84

During a 802 1X deployment, an engineer must identify failed authentications without causing problems for the connected endpoint. Which command will successfully achieve this''

Options:

A.  

dot1x system-auth-control

B.  

dot1x pae authenticator

C.  

authentication open

D.  

authentication port-control auto

Discussion 0
Questions 85

An engineer is configuring a virtual Cisco ISE deployment and needs each persona to be on a different node. Which persona should be configured with the largest amount of storage in this environment?

Options:

A.  

policy Services

B.  

Primary Administration

C.  

Monitoring and Troubleshooting

D.  

Platform Exchange Grid

Discussion 0
Questions 86

An engineer is creating a new authorization policy to give the endpoints access to VLAN 310 upon successful authentication The administrator tests the 802.1X authentication for the endpoint and sees that it is authenticating successfully What must be done to ensure that the endpoint is placed into the correct VLAN?

Options:

A.  

Configure the switchport access vlan 310 command on the switch port

B.  

Ensure that the security group is not preventing the endpoint from being in VLAN 310

C.  

Add VLAN 310 in the common tasks of the authorization profile

D.  

Ensure that the endpoint is using The correct policy set

Discussion 0
Questions 87

A network administrator is setting up wireless guest access and has been unsuccessful in testing client access. The endpoint is able to connect to the SSID but is unable to grant access to the guest network through the guest portal. What must be done to identify the problem?

Options:

A.  

Use context visibility to verify posture status.

B.  

Use the endpoint ID to execute a session trace.

C.  

Use the identity group to validate the authorization rules.

D.  

Use traceroute to ensure connectivity.

Discussion 0
Questions 88

When setting up profiling in an environment using Cisco ISE for network access control, an organization must use non-proprietary protocols for collecting the information at layer 2. Which two probes will provide this information without forwarding SPAN packets to Cisco ISE? {Choose two.)

Options:

A.  

DHCP SPAN probe

B.  

SNMP query probe

C.  

NetFlow probe

D.  

RADIUS probe

E.  

DNS probe

Discussion 0