Labour Day Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exams65

Implementing and Configuring Cisco Identity Services Engine (SISE) Question and Answers

Implementing and Configuring Cisco Identity Services Engine (SISE)

Last Update Apr 28, 2024
Total Questions : 243

We are offering FREE 300-715 Cisco exam questions. All you do is to just go and sign up. Give your details, prepare 300-715 free exam questions and then go for complete pool of Implementing and Configuring Cisco Identity Services Engine (SISE) test questions that will help you more.

300-715 pdf

300-715 PDF

$38.5  $109.99
300-715 Engine

300-715 Testing Engine

$45.5  $129.99
300-715 PDF + Engine

300-715 PDF + Testing Engine

$59.5  $169.99
Questions 1

What are two differences between the RADIUS and TACACS+ protocols'? (Choose two.)

Options:

A.  

RADIUS is a Cisco proprietary protocol, whereas TACACS+ is an open standard protocol

B.  

TACACS+uses TCP port 49. whereas RADIUS uses UDP ports 1812 and 1813.

C.  

RADIUS offers multiprotocol support, whereas TACACS+ does not

D.  

RADIUS combines authentication and authorization, whereas TACACS+ does not

E.  

RADIUS enables encryption of all the packets, whereas with TACACS+. only the password is encrypted.

Discussion 0
Questions 2

An organization wants to split their Cisco ISE deployment to separate the device administration functionalities from the mam deployment. For this to work, the administrator must deregister any nodes that will become a part of the new deployment, but the button for this option is grayed out Which configuration is causing this behavior?

Options:

A.  

One of the nodes is an active PSN.

B.  

One of the nodes is the Primary PAN

C.  

All of the nodes participate in the PAN auto failover.

D.  

All of the nodes are actively being synched.

Discussion 0
Questions 3

An administrator adds a new network device to the Cisco ISE configuration to authenticate endpoints to the network. The RADIUS test fails after the administrator configures all of the settings in Cisco ISE and adds the proper configurations to the switch. What is the issue"?

Options:

A.  

The endpoint profile is showing as "unknown."

B.  

The endpoint does not have the appropriate credentials for network access.

C.  

The shared secret is incorrect on the switch or on Cisco ISE.

D.  

The certificate on the switch is self-signed not a CA-provided certificate.

Discussion 0
Questions 4

An organization is implementing Cisco ISE posture services and must ensure that a host-based firewall is in place on every Windows and Mac computer that attempts to access the network They have multiple vendors’ firewall applications for their devices, so the engineers creating the policies are unable to use a specific application check in order to validate the posture for this What should be done to enable this type of posture check?

Options:

A.  

Use the file registry condition to ensure that the firewal is installed and running appropriately.

B.  

Use a compound condition to look for the Windows or Mac native firewall applications.

C.  

Enable the default firewall condition to check for any vendor firewall application.

D.  

Enable the default application condition to identify the applications installed and validade the firewall app.

Discussion 0
Questions 5

An organization is adding new profiling probes to the system to improve profiling on Oseo ISE The probes must support a common network management protocol to receive information about the endpoints and the ports to which they are connected What must be configured on the network device to accomplish this goal?

Options:

A.  

ARP

B.  

SNMP

C.  

WCCP

D.  

ICMP

Discussion 0
Questions 6

What does a fully distributed Cisco ISE deployment include?

Options:

A.  

PAN and PSN on the same node while MnTs are on their own dedicated nodes.

B.  

PAN and MnT on the same node while PSNs are on their own dedicated nodes.

C.  

All Cisco ISE personas on their own dedicated nodes.

D.  

All Cisco ISE personas are sharing the same node.

Discussion 0
Questions 7

Which two ports do network devices typically use for CoA? (Choose two)

Options:

A.  

443

B.  

19005

C.  

8080

D.  

3799

E.  

1700

Discussion 0
Questions 8

A user reports that the RADIUS accounting packets are not being seen on the Cisco ISE server.

Which command is the user missing in the switch’s configuration?

Options:

A.  

radius-server vsa send accounting

B.  

aaa accounting network default start-stop group radius

C.  

aaa accounting resource default start-stop group radius

D.  

aaa accounting exec default start-stop group radios

Discussion 0
Questions 9

An engineer is configuring a dedicated SSID for onboarding devices. Which SSID type accomplishes this configuration?

Options:

A.  

dual

B.  

hidden

C.  

broadcast

D.  

guest

Discussion 0
Questions 10

An engineer tests Cisco ISE posture services on the network and must configure the compliance module to automatically download and install on endpoints Which action accomplishes this task for VPN users?

Options:

A.  

Create a Cisco AnyConnect configuration and Client Provisioning policy within Cisco ISE.

B.  

Configure the compliance module to be downloaded from within the posture policy.

C.  

Push the compliance module from Cisco FTD prior to attempting posture.

D.  

Use a compound posture condition to check for the compliance module and download if needed.

Discussion 0
Questions 11

An administrator enables the profiling service for Cisco ISE to use for authorization policies while in closed mode. When the endpoints connect, they receive limited access so that the profiling probes can gather information and Cisco ISE can assign the correct profiles. They are using the default values within Cisco ISE. but the devices do not change their access due to the new profile. What is the problem'?

Options:

A.  

In closed mode, profiling does not work unless CDP is enabled.

B.  

The profiling probes are not able to collect enough information to change the device profile

C.  

The profiler feed is not downloading new information so the profiler is inactive

D.  

The default profiler configuration is set to No CoA for the reauthentication setting

Discussion 0
Questions 12

During BYOD flow, from where does a Microsoft Windows PC download the Network Setup Assistant?

Options:

A.  

Cisco App Store

B.  

Microsoft App Store

C.  

Cisco ISE directly

D.  

Native OTA functionality

Discussion 0
Questions 13

What is a function of client provisioning?

Options:

A.  

It ensures an application process is running on the endpoint.

B.  

It checks a dictionary' attribute with a value.

C.  

It ensures that endpoints receive the appropriate posture agents

D.  

It checks the existence date and versions of the file on a client.

Discussion 0
Questions 14

An administrator is configuring posture with Cisco ISE and wants to check that specific services are present on the workstations that are attempting to access the network. What must be configured to accomplish this goal?

Options:

A.  

Create a registry posture condition using a non-OPSWAT API version.

B.  

Create an application posture condition using a OPSWAT API version.

C.  

Create a compound posture condition using a OPSWAT API version.

D.  

Create a service posture condition using a non-OPSWAT API version.

Discussion 0
Questions 15

An organization wants to implement 802.1X and is debating whether to use PEAP-MSCHAPv2 or PEAP-EAP-TLS for authentication. Drag the characteristics on the left to the corresponding protocol on the right.

Options:

Discussion 0
Questions 16

Which two features should be used on Cisco ISE to enable the TACACS+ feature? (Choose two )

Options:

A.  

External TACACS Servers

B.  

Device Admin Service

C.  

Device Administration License

D.  

Server Sequence

E.  

Command Sets

Discussion 0
Questions 17

An administrator wants to configure network device administration and is trying to decide whether to use TACACS* or RADIUS. A reliable protocol must be used that can check command authorization Which protocol meets these requirements and why?

Options:

A.  

TACACS+ because it runs over TCP

B.  

RADIUS because it runs over UDP

C.  

RADIUS because it runs over TCP.

D.  

TACACS+ because it runs over UDP

Discussion 0
Questions 18

What happens when an internal user is configured with an external identity store for authentication, but an engineer uses the Cisco ISE admin portal to select an internal identity store as the identity source?

Options:

A.  

Authentication is redirected to the internal identity source.

B.  

Authentication is redirected to the external identity source.

C.  

Authentication is granted.

D.  

Authentication fails.

Discussion 0
Questions 19

An engineer needs to configure a compliance policy on Cisco ISE to ensure that the latest encryption software is running on the C drive of all endpoints. Drag and drop the configuration steps from the left into the sequence on the right to accomplish this task.

Options:

Discussion 0
Questions 20

An organization wants to standardize the 802 1X configuration on their switches and remove static ACLs on the switch ports while allowing Cisco ISE to communicate to the switch what access to provide What must be configured to accomplish this task?

Options:

A.  

security group tag within the authorization policy

B.  

extended access-list on the switch for the client

C.  

port security on the switch based on the client's information

D.  

dynamic access list within the authorization profile

Discussion 0
Questions 21

What is the deployment mode when two Cisco ISE nodes are configured in an environment?

Options:

A.  

distributed

B.  

active

C.  

standalone

D.  

standard

Discussion 0
Questions 22

Which two endpoint compliance statuses are possible? (Choose two.)

Options:

A.  

unknown

B.  

known

C.  

invalid

D.  

compliant

E.  

valid

Discussion 0
Questions 23

A laptop was stolen and a network engineer added it to the block list endpoint identity group What must be done on a new Cisco ISE deployment to redirect the laptop and restrict access?

Options:

A.  

Select DenyAccess within the authorization policy.

B.  

Ensure that access to port 8443 is allowed within the ACL.

C.  

Ensure that access to port 8444 is allowed within the ACL.

D.  

Select DROP under If Auth fail within the authentication policy.

Discussion 0
Questions 24

When setting up profiling in an environment using Cisco ISE for network access control, an organization must use non-proprietary protocols for collecting the information at layer 2. Which two probes will provide this information without forwarding SPAN packets to Cisco ISE? {Choose two.)

Options:

A.  

DHCP SPAN probe

B.  

SNMP query probe

C.  

NetFlow probe

D.  

RADIUS probe

E.  

DNS probe

Discussion 0
Questions 25

An engineer is configuring Cisco ISE and needs to dynamically identify the network endpoints and ensure that endpoint access is protected. Which service should be used to accomplish this task?

Options:

A.  

Profiling

B.  

Guest access

C.  

Client provisioning

D.  

Posture

Discussion 0
Questions 26

Which two default endpoint identity groups does Cisco ISE create? (Choose two )

Options:

A.  

block list

B.  

endpoint

C.  

profiled

D.  

allow list

E.  

unknown

Discussion 0
Questions 27

A user is attempting to register a BYOD device to the Cisco ISE deployment, but needs to use the onboarding policy to request a digital certificate and provision the endpoint. What must be configured to accomplish this task?

Options:

A.  

A native supplicant provisioning policy to redirect them to the BYOD portal for onboarding

B.  

The Cisco AnyConnect provisioning policy to provision the endpoint for onboarding

C.  

The BYOD flow to ensure that the endpoint will be provisioned prior to registering

D.  

The posture provisioning policy to give the endpoint all necessary components prior to registering

Discussion 0
Questions 28

What must be configured on the WLC to configure Central Web Authentication using Cisco ISE and a WLC?

Options:

A.  

Set the NAC State option to SNMP NAC.

B.  

Set the NAC State option to RADIUS NAC.

C.  

Use the radius-server vsa send authentication command.

D.  

Use the ip access-group webauth in command.

Discussion 0
Questions 29

What is a method for transporting security group tags throughout the network?

Options:

A.  

by enabling 802.1AE on every network device

B.  

by the Security Group Tag Exchange Protocol

C.  

by embedding the security group tag in the IP header

D.  

by embedding the security group tag in the 802.1Q header

Discussion 0
Questions 30

An administrator is attempting to join a new node to the primary Cisco ISE node, but receives the error message "Node is Unreachable". What is causing this error?

Options:

A.  

The second node is a PAN node.

B.  

No administrative certificate is available for the second node.

C.  

The second node is in standalone mode.

D.  

No admin privileges are available on the second node.

Discussion 0
Questions 31

An administrator needs to connect ISE to Active Directory as an external authentication source and allow the proper ports through the firewall. Which two ports should be opened to accomplish this task? (Choose two)

Options:

A.  

TELNET 23

B.  

LDAP 389

C.  

HTTP 80

D.  

HTTPS 443

E.  

MSRPC 445

Discussion 0
Questions 32

An engineer wants to learn more about Cisco ISE and deployed a new lab with two nodes. Which two persona configurations allow the engineer to successfully test redundancy of a failed node? (Choose two.)

Options:

A.  

Configure one of the Cisco ISE nodes as the Health Check node.

B.  

Configure both nodes with the PAN and MnT personas only.

C.  

Configure one of the Cisco ISE nodes as the primary PAN and MnT personas and the other as the secondary.

D.  

Configure both nodes with the PAN, MnT, and PSN personas.

E.  

Configure one of the Cisco ISE nodes as the primary PAN and PSN personas and the other as the secondary.

Discussion 0
Questions 33

A Cisco ISE administrator needs to ensure that guest endpoint registrations are only valid for 1 day. When testing the guest policy flow, the administrator sees that the Cisco ISE does not delete the endpoint in the Guest Endpoints identity store after one day and allows access to the guest network after that period. Which configuration is causing this problem?

Options:

A.  

The RADIUS policy set for guest access is set to allow repeated authentication of the same device.

B.  

The length of access is set to 7 days in the Guest Portal Settings.

C.  

The Endpoint Purge Policy is set to 30 days for guest devices.

D.  

The Guest Account Purge Policy is set to 15 days.

Discussion 0
Questions 34

An administrator for a small network is configuring Cisco ISE to provide dynamic network access to users. Management needs Cisco ISE to not automatically trigger a CoA whenever a profile change is detected. Instead, the administrator needs to verify the new profile and manually trigger a CoA. What must be configuring in the profiler to accomplish this goal?

Options:

A.  

Port Bounce

B.  

No CoA

C.  

Session Query

D.  

Reauth

Discussion 0
Questions 35

Which two components are required for creating a Native Supplicant Profile within a BYOD flow? (Choose two)

Options:

A.  

Windows Settings

B.  

Connection Type

C.  

iOS Settings

D.  

Redirect ACL

E.  

Operating System

Discussion 0