Big Black Friday Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exams65

ExamsBrite Dumps

Implementing and Configuring Cisco Identity Services Engine (SISE) v4.0 (300-715 SISE) Question and Answers

Implementing and Configuring Cisco Identity Services Engine (SISE) v4.0 (300-715 SISE)

Last Update Nov 30, 2025
Total Questions : 299

We are offering FREE 300-715 Cisco exam questions. All you do is to just go and sign up. Give your details, prepare 300-715 free exam questions and then go for complete pool of Implementing and Configuring Cisco Identity Services Engine (SISE) v4.0 (300-715 SISE) test questions that will help you more.

300-715 pdf

300-715 PDF

$40.25  $114.99
300-715 Engine

300-715 Testing Engine

$47.25  $134.99
300-715 PDF + Engine

300-715 PDF + Testing Engine

$61.25  $174.99
Questions 1

A security engineer configures a Cisco Catalyst switch to use Cisco TrustSec. The engineer must define the PAC key to authenticate the switch to Cisco IISE. Drag and drop the commands from the left into sequence on the right. Not all options are used.

Options:

Discussion 0
Questions 2

Which profiling probe collects the user-agent string?

Options:

A.  

DHCP

B.  

AD

C.  

HTTP

D.  

NMAP

Discussion 0
Questions 3

A network engineer is configuring a Cisco Wireless LAN Controller in order to find out more information about the devices that are connecting. This information must be sent to Cisco ISE to be used in authorization policies. Which profiling mechanism must be configured in the Cisco Wireless LAN Controller to accomplish this task?

Options:

A.  

DNS

B.  

CDP

C.  

DHCP

D.  

ICMP

Discussion 0
Questions 4

A network administrator is configuring a new access switch to use with Cisco ISE for network access control. There is a need to use a centralized server for the reauthentication timers. What must be configured in order to accomplish this task?

Options:

A.  

Configure Cisco ISE to replace the switch configuration with new timers.

B.  

Configure Cisco ISE to block access after a certain period of time.

C.  

Issue the authentication timer reauthenticate server command on the switch.

D.  

Issue the authentication periodic command on the switch.

Discussion 0
Questions 5

An engineer is configuring TACACS+ within Cisco ISE for use with a non-Cisco network device. They need to send special attributes in the Access-Accept response to ensure that the users are given the appropriate access. What must be configured to accomplish this'?

Options:

A.  

dACLs to enforce the various access policies for the users

B.  

custom access conditions for defining the different roles

C.  

shell profiles with custom attributes that define the various roles

D.  

TACACS+ command sets to provide appropriate access

Discussion 0
Questions 6

An administrator adds a new network device to the Cisco ISE configuration to authenticate endpoints to the network. The RADIUS test fails after the administrator configures all of the settings in Cisco ISE and adds the proper configurations to the switch. What is the issue"?

Options:

A.  

The endpoint profile is showing as "unknown."

B.  

The endpoint does not have the appropriate credentials for network access.

C.  

The shared secret is incorrect on the switch or on Cisco ISE.

D.  

The certificate on the switch is self-signed not a CA-provided certificate.

Discussion 0
Questions 7

A security administrator is using Cisco ISE to create a BYOD onboarding solution for all employees who use personal devices on the corporate network. The administrator generates a Certificate Signing Request and signs the request using an external Certificate Authority server. Which certificate usage option must be selected when importing the certificate into ISE?

Options:

A.  

RADIUS

B.  

DLTS

C.  

Portal

D.  

Admin

Discussion 0
Questions 8

An administrator is attempting to replace the built-in self-signed certificates on a Cisco ISE appliance. The CA is requesting some information about the appliance in order to sign the new certificate. What must be done in order to provide the CA this information?

Options:

A.  

Install the Root CA and intermediate C

A.  

B.  

Generate the CSR.

C.  

Download the intermediate server certificate.

D.  

Download the CA server certificate.

Discussion 0
Questions 9

Which two external identity stores support EAP-TLS and PEAP-TLS? (Choose two.)

Options:

A.  

Active Directory

B.  

RADIUS Token

C.  

Internal Database

D.  

RSA SecurlD

E.  

LDAP

Discussion 0
Questions 10

What is a characteristic of the UDP protocol?

Options:

A.  

UDP can detect when a server is down.

B.  

UDP offers best-effort delivery

C.  

UDP can detect when a server is slow

D.  

UDP offers information about a non-existent server

Discussion 0
Questions 11

An administrator plans to use Cisco ISE to deploy posture policies to assess Microsoft Windows endpoints that run Cisco Secure Client. The administrator wants to minimize the occurrence of messages related to unknown posture profiles if Cisco ISE fails to determine the posture of the endpoint. Secure Client is deployed to all the endpoints. and all the required Cisco ISE authentication, authorization, and posture policy configurations were performed. Which action must be taken next to complete the configuration?

Options:

A.  

Install the latest version of the Secure Client client on the endpoints.

B.  

Enable Cisco ISE posture on Secure Client configuration.

C.  

Configure a native supplicant on the endpoints to support the posture policies.

D.  

Install the compliance module on the endpoints.

Discussion 0
Questions 12

What gives Cisco ISE an option to scan endpoints for vulnerabilities?

Options:

A.  

authorization policy

B.  

authentication policy

C.  

authentication profile

D.  

authorization profile

Discussion 0
Questions 13

Which two actions must be verified to confirm that the internet is accessible via guest access when configuring a guest portal? (Choose two.)

Options:

A.  

The guest device successfully associates with the correct SSID.

B.  

The guest user gets redirected to the authentication page when opening a browser.

C.  

The guest device has internal network access on the WLAN.

D.  

The guest device can connect to network file shares.

E.  

Cisco ISE sends a CoA upon successful guest authentication.

Discussion 0
Questions 14

A network security administrator wants to integrate Cisco ISE with Active Directory. Which configuration action must the security administrator take to accomplish the task?

Options:

A.  

Remove Cisco ISE user account from the domain.

B.  

Remove the ISE machine account from the domain.

C.  

Join Cisco ISE to the Active Directory domain.

D.  

Search Active Directory to see if admin user account exists.

Discussion 0
Questions 15

What is a difference between RADIUS and TACACS+?

Options:

A.  

RADIUS uses connection-oriented transport, and TACACS+ uses best-effort delivery.

B.  

RADIUS offers multiprotocol support, and TACACS+ supports only IP traffic.

C.  

RADIUS combines authentication and authorization functions, and TACACS+ separates them.

D.  

RADIUS supports command accounting, and TACACS+ does not.

Discussion 0
Questions 16

An engineer is assigned to enhance security across the campus network. The task is to enable MAB across all access switches in the network. Which command must be entered on the switch to enable MAB?

Options:

A.  

Switch# authentication port-control auto

B.  

Switch{conflg)# mab

C.  

Switch{config-lf) # mab

D.  

Switch(config)# authentication port-control auto

Discussion 0
Questions 17

A Cisco device has a port configured in multi-authentication mode and is accepting connections only from hosts assigned the SGT of SGT_0422048549 The VLAN trunk link supports a maximum of 8 VLANS What is the reason for these restrictions?

Options:

A.  

The device is performing inline tagging without acting as a SXP speaker

B.  

The device is performing mime tagging while acting as a SXP speaker

C.  

The IP subnet addresses are dynamically mapped to an SGT.

D.  

The IP subnet addresses are statically mapped to an SGT

Discussion 0
Questions 18

A network engineer must enforce access control using special tags, without re-engineering the network design. Which feature should be configured to achieve this in a scalable manner?

Options:

A.  

SGT

B.  

dACL

C.  

VLAN

D.  

RBAC

Discussion 0
Questions 19

Which two authentication protocols are supported by RADIUS but not by TACACS+? (Choose two.)

Options:

A.  

MSCHAPv1

B.  

PAP

C.  

EAP

D.  

CHAP

E.  

MSCHAPV2

Discussion 0
Questions 20

An engineer is working with a distributed deployment of Cisco ISE and needs to configure various network probes to collect a set of attributes from the used to accomplish this task?

Options:

A.  

policy service

B.  

monitoring

C.  

pxGrid

D.  

primary policy administrator

Discussion 0
Questions 21

A Cisco ISE engineer is creating a certificate authentication profile to be used with machine authentication for the network. The engineer wants to be able to compare the user-presented certificate with a certificate stored in Active Directory. What must be done to accomplish this?

Options:

A.  

Configure the user-presented password hash and a hash stored in Active Directory for comparison

B.  

Add the subject alternative name and the common name to the CAP.

C.  

Enable the option for performing binary comparison.

D.  

Use MS-CHAPv2 since it provides machine credentials and matches them to credentials stored in Active Directory

Discussion 0
Questions 22

A network engineer is configuring Cisco TrustSec and needs to ensure that the Security Group Tag is being transmitted between two devices Where in the Layer 2 frame should this be verified?

Options:

A.  

CMD filed

B.  

802.1Q filed

C.  

Payload

D.  

802.1 AE header

Discussion 0
Questions 23

An administrator is editing a csv list of endpoints and wants to reprofile some of the devices indefinitely before importing the list into Cisco ISE. Which field and Boolean value must be changed for the devices before the list is reimported?

Options:

A.  

Identity Group Assignment field and Static Assignment field set to the value FALSE

B.  

Policy Assignment field and Static Assignment field set to the value TRUE

C.  

Policy Assignment field and Static Assignment field set to the value FALSE

D.  

Identity Group Assignment field and Static Assignment field set to the value TRUE

Discussion 0
Questions 24

What is the maximum number of PSN nodes supported in a medium-sized deployment?

Options:

A.  

three

B.  

five

C.  

two

D.  

eight

Discussion 0
Questions 25

An administrator has added a new Cisco ISE PSN to their distributed deployment. Which two features must the administrator enable to accept authentication requests and profile the endpoints correctly, and add them to their respective endpoint identity groups? (Choose two )

Options:

A.  

Session Services

B.  

Endpoint Attribute Filter

C.  

Posture Services

D.  

Profiling Services

E.  

Radius Service

Discussion 0
Questions 26

What service can be enabled on the Cisco ISE node to identity the types of devices connecting to a network?

Options:

A.  

MAB

B.  

profiling

C.  

posture

D.  

central web authentication

Discussion 0
Questions 27

A Cisco ISE administrator must authenticate users against Microsoft Active Directory. The solution must meet these requirements:

    Users and computers must be authenticated.

    User groups must be retrieved during authentication.

Which protocol must be added to the allowed protocols on the policy to authenticate the users?

Options:

A.  

EAP-GTC

B.  

EAP-TLS

C.  

LEAP

D.  

MS-CHAPv2

Discussion 0
Questions 28

Which personas can a Cisco ISE node assume'?

Options:

A.  

policy service, gatekeeping, and monitoring

B.  

administration, policy service, and monitoring

C.  

administration, policy service, gatekeeping

D.  

administration, monitoring, and gatekeeping

Discussion 0
Questions 29

Drag the descriptions on the left onto the components of 802.1X on the right.

Options:

Discussion 0
Questions 30

An organization wants to enable web-based guest access for both employees and visitors The goal is to use a single portal for both user types Which two authentication methods should be used to meet this requirement? (Choose two )

Options:

A.  

LDAP

B.  

802 1X

C.  

Certificate-based

D.  

LOCAL

E.  

MAC based

Discussion 0
Questions 31

Which type of identity store allows for creating single-use access credentials in Cisco ISE?

Options:

A.  

OpenLDAP

B.  

Local

C.  

PKI

D.  

RSA SecurID

Discussion 0
Questions 32

Refer to the exhibit.

An organization recently implemented network device administration using Cisco ISE. Upon testing the ability to access all of the required devices, a user in the Cisco ISE group IT Admins is attempting to login to a device in their organization's finance department but is unable to. What is the problem?

Options:

A.  

The IT training rule is taking precedence over the IT Admins rule.

B.  

The authorization conditions wrongly allow IT Admins group no access to finance devices.

C.  

The finance location is not a condition in the policy set.

D.  

The authorization policy doesn't correctly grant them access to the finance devices.

Discussion 0
Questions 33

Which default "guest type" is included with Cisco ISE?

Options:

A.  

visitors

B.  

sponsor

C.  

guest

D.  

contractor

Discussion 0
Questions 34

An engineer is configuring Cisco ISE to reprofile endpoints based only on new requests of INIT-REBOOT and SELECTING message types. Which probe should be used to accomplish this task?

Options:

A.  

MMAP

B.  

DNS

C.  

DHCP

D.  

RADIUS

Discussion 0
Questions 35

NO: 184

An engineer builds a five-node distributed Cisco ISE deployment The first two deployed nodes are responsible for the primary and secondary administration and monitoring personas Which persona configuration is necessary to have the remaining three Cisco ISE nodes serve as dedicated nodes in the Cisco ISE cube that is responsible only for handling the RADIUS and TACACS+ authentication requests, identity lookups, and policy evaluation?

A)

B)

C)

D)

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

Discussion 0
Questions 36

Which RADIUS attribute is used to dynamically assign the inactivity active timer for MAB users from the Cisco ISE node'?

Options:

A.  

radius-server timeout

B.  

session-timeout

C.  

idle-timeout

D.  

termination-action

Discussion 0
Questions 37

An administrator enables the profiling service for Cisco ISE to use for authorization policies while in closed mode. When the endpoints connect, they receive limited access so that the profiling probes can gather information and Cisco ISE can assign the correct profiles. They are using the default values within Cisco ISE. but the devices do not change their access due to the new profile. What is the problem'?

Options:

A.  

In closed mode, profiling does not work unless CDP is enabled.

B.  

The profiling probes are not able to collect enough information to change the device profile

C.  

The profiler feed is not downloading new information so the profiler is inactive

D.  

The default profiler configuration is set to No CoA for the reauthentication setting

Discussion 0
Questions 38

Which CLI command must be configured on the switchport to immediately run the MAB process if a non-802.1X capable endpoint connects to the port?

Options:

A.  

authentication order mab dot1x

B.  

authentication fallback

C.  

dot1x pae authenticator

D.  

access-session port-control auto

Discussion 0
Questions 39

An engineer is configuring a new Cisco ISE node. Context-sensitive information must be shared between the Cisco ISE and a Cisco ASA. Which persona must be enabled?

Options:

A.  

Administration

B.  

Policy Service

C.  

pxGrid

D.  

Monitoring

Discussion 0
Questions 40

What allows an endpoint to obtain a digital certificate from Cisco ISE during a BYOD flow?

Options:

A.  

Network Access Control

B.  

My Devices Portal

C.  

Application Visibility and Control

D.  

Supplicant Provisioning Wizard

Discussion 0
Questions 41

An engineer is using Cisco ISE and configuring guest services to allow wireless devices to access the network. Which action should accomplish this task?

Options:

A.  

Create the redirect ACL on the WLC and add it to the WLC policy

B.  

Create the redirect ACL on the WLC and add it to the Cisco ISE policy.

C.  

Create the redirect ACL on Cisco ISE and add it to the WLC policy

D.  

Create the redirect ACL on Cisco ISE and add it to the Cisco ISE Policy

Discussion 0
Questions 42

Refer to the exhibit.

Which switch configuration change will allow only one voice and one data endpoint on each port?

Options:

A.  

Multi-auth to multi-domain

B.  

Mab to dot1x

C.  

Auto to manual

D.  

Multi-auth to single-auth

Discussion 0
Questions 43

An engineer is configuring web authentication using non-standard ports and needs the switch to redirect traffic to the correct port. Which command should be used to accomplish this task?

Options:

A.  

permit tcp any any eq

B.  

aaa group server radius proxy

C.  

ip http port

D.  

aaa group server radius

Discussion 0
Questions 44

A network engineer must configure a policy rule to check the endpoint. The policy must ensure disk encryption is enabled and the appropriate antivirus software version is installed. Which configuration must the engineer apply to the rule?

Options:

A.  

dictionary simple condition

B.  

simple posture condition

C.  

dictionary compound condition

D.  

compound posture condition

Discussion 0
Questions 45

An engineer is configuring Central Web Authentication in Cisco ISE to provide guest access. When an authentication rule is configured in the Default Policy Set for the Wired_MAB or Wireless_MAB conditions, what must be selected for the "if user not found" setting?

Options:

A.  

CONTINUE

B.  

REJECT

C.  

ACCEPT

D.  

DROP

Discussion 0
Questions 46

A policy is being created in order to provide device administration access to the switches on a network. There is a requirement to ensure that if the session is not actively being used, after 10 minutes, it will be disconnected. Which task must be configured in order to meet this requirement?

Options:

A.  

session timeout

B.  

idle time

C.  

monitor

D.  

set attribute as

Discussion 0
Questions 47

An engineer is deploying a new Cisco ISE environment for a company. The company wants the deployment to use TACACS+. The engineer verifies that Cisco ISE has a Device Administration license. What must be configured to enable TACACS+ operations?

Options:

A.  

Device Administration Work Center

B.  

Device Admin service

C.  

Device Administration Deployment settings

D.  

Device Admin Policy Sets settings

Discussion 0
Questions 48

Which action must be taken before configuring the Secure Client Agent profile when creating the Secure Client configuration for ISE posture services?

Options:

A.  

Create a posture remediation condition policy for the Agent profile.

B.  

Configure the posture policy for Secure Client posturing module.

C.  

Create a posture condition that references the Secure Client package.

D.  

Upload the Secure Client packages and the Secure Client compliance modules.

Discussion 0
Questions 49

Which two responses from the RADIUS server to NAS are valid during the authentication process? (Choose two)

Options:

A.  

access-response

B.  

access-request

C.  

access-reserved

D.  

access-accept

E.  

access-challenge

Discussion 0
Questions 50

An engineer is configuring sponsored guest access and needs to limit each sponsored guest to a maximum of two devices. There are other guest services in production that rely on the default guest types. How should this configuration change be made without disrupting the other guest services currently offering three or more guest devices per user?

Options:

A.  

Create an ISE identity group to add users to and limit the number of logins via the group configuration.

B.  

Create a new guest type and set the maximum number of devices sponsored guests can register

C.  

Create an LDAP login for each guest and tag that in the guest portal for authentication.

D.  

Create a new sponsor group and adjust the settings to limit the devices for each guest.

Discussion 0
Questions 51

What is needed to configure wireless guest access on the network?

Options:

A.  

endpoint already profiled in ISE

B.  

WEBAUTH ACL for redirection

C.  

valid user account in Active Directory

D.  

Captive Portal Bypass turned on

Discussion 0
Questions 52

What must be configured on the Cisco ISE authentication policy for unknown MAC addresses/identities for successful authentication?

Options:

A.  

pass

B.  

reject

C.  

drop

D.  

continue

Discussion 0
Questions 53

An engineer is enabling a newly configured wireless SSID for tablets and needs visibility into which other types of devices are connecting to it. What must be done on the Cisco WLC to provide this information to Cisco ISE9

Options:

A.  

enable IP Device Tracking

B.  

enable MAC filtering

C.  

enable Fast Transition

D.  

enable mDNS snooping

Discussion 0
Questions 54

An engineer needs to configure a Cisco ISE server to issue a CoA for endpoints already authenticated to access the network. The CoA option must be enforced on a session, even if there are multiple active sessions on a port. What must be configured to accomplish this task?

Options:

A.  

the Reauth CoA option in the Cisco ISE system profiling settings enabled

B.  

an endpoint profiling policy with the No CoA option enabled

C.  

an endpoint profiling policy with the Port Bounce CoA option enabled

D.  

the Port Bounce CoA option in the Cisco ISE system profiling settings enabled

Discussion 0
Questions 55

Refer to the exhibit. In which scenario does this switch configuration apply?

Options:

A.  

when allowing a hub with multiple clients connected

B.  

when passing IP phone authentication

C.  

when allowing multiple IP phones to be connected

D.  

when preventing users with hypervisor

Discussion 0
Questions 56

During BYOD flow, from where does a Microsoft Windows PC download the Network Setup Assistant?

Options:

A.  

Cisco App Store

B.  

Microsoft App Store

C.  

Cisco ISE directly

D.  

Native OTA functionality

Discussion 0
Questions 57

An engineer must configure Cisco ISE to provide internet access for guests in which guests are required to enter a code to gain network access. Which action accomplishes the goal?

Options:

A.  

Configure the hotspot portal for guest access and require an access code.

B.  

Configure the sponsor portal with a single account and use the access code as the password.

C.  

Configure the self-registered guest portal to allow guests to create a personal access code.

D.  

Create a BYOD policy that bypasses the authentication of the user and authorizes access codes.

Discussion 0
Questions 58

A network engineer must create a guest portal for wireless guests on Cisco ISE. The guest users must not be able to create accounts; however, the portal should require a username and password to connect. Which portal type must be created in Cisco ISE to meet the requirements?

Options:

A.  

Sponsored Guest Access

B.  

Self Registered Guest Access

C.  

Custom Guest Portal

D.  

Hotspot Guest Access

Discussion 0
Questions 59

An administrator must deploy the Cisco Secure Client posture agent to employee endpoints that access a wireless network by using URL redirection in Cisco ISE. The compliance module must be downloaded from Cisco and uploaded to the Cisco ISE client provisioning resource. What must be used to upload the compliance module?

Options:

A.  

Secure Client configuration

B.  

agent resources from the local disk

C.  

Secure Client posture profile

D.  

Client Provisioning Portal

Discussion 0
Questions 60

An engineer is configuring web authentication and needs to allow specific protocols to permit DNS traffic. Which type of access list should be used for this configuration?

Options:

A.  

reflexive ACL

B.  

extended ACL

C.  

standard ACL

D.  

numbered ACL

Discussion 0
Questions 61

There is a need within an organization for a new policy to be created in Cisco ISE. It must validate that a specific anti-virus application is not only installed, but running on a machine before it is allowed access to the network. Which posture condition should the administrator configure in order for this policy to work?

Options:

A.  

file

B.  

registry

C.  

application

D.  

service

Discussion 0
Questions 62

A company is attempting to improve their BYOD policies and restrict access based on certain criteria. The company's subnets are organized by building. Which attribute should be used in order to gain access based on location?

Options:

A.  

static group assignment

B.  

IP address

C.  

device registration status

D.  

MAC address

Discussion 0
Questions 63

An administrator is configuring a new profiling policy within Cisco ISE The organization has several endpoints that are the same device type and all have the same Block ID in their MAC address. The profiler does not currently have a profiling policy created to categorize these endpoints. therefore a custom profiling policy must be created Which condition must the administrator use in order to properly profile an ACME Al Connector endpoint for network access with MAC address ?

Options:

A.  

MAC_OUI_STARTSWITH_

B.  

CDP_cdpCacheDevicelD_CONTAINS_

C.  

MAC_MACAddress_CONTAINS_

D.  

Radius Called Station-ID STARTSWITH

Discussion 0
Questions 64

An administrator made changes in Cisco ISE and needs to apply new permissions for endpoints that have already been authenticated by sending a CoA packet to the network devices. Which IOS command must be configured on the devices to accomplish this goal?

Options:

A.  

aaa server radius dynamic-author

B.  

authentication command bounce-port

C.  

authentication command disable-port

D.  

aaa nas port extended

Discussion 0
Questions 65

A Cisco ISE administrator needs to ensure that guest endpoint registrations are only valid for 1 day. When testing the guest policy flow, the administrator sees that the Cisco ISE does not delete the endpoint in the Guest Endpoints identity store after one day and allows access to the guest network after that period. Which configuration is causing this problem?

Options:

A.  

The RADIUS policy set for guest access is set to allow repeated authentication of the same device.

B.  

The length of access is set to 7 days in the Guest Portal Settings.

C.  

The Endpoint Purge Policy is set to 30 days for guest devices.

D.  

The Guest Account Purge Policy is set to 15 days.

Discussion 0
Questions 66

Wireless network users authenticate to Cisco ISE using 802.1X through a Cisco Catalyst switch. An engineer must create an updated configuration to assign a security group tag to the user's traffic using inline tagging to prevent unauthenticated users from accessing a restricted server. The configurations were performed:

• configured Cisco ISE as a Cisco TrustSec AAA server

• configured the switch as a RADIUS device in Cisco ISE

• configured the wireless LAN controller as a TrustSec device in Cisco ISE

• created a security group tog for the wireless users

• created a certificate authentication profile

■ created an identity source sequence

• assigned an appropriate security group tag to the wireless users

• defined security group access control lists to specify an egress policy

• enforced the access control lists on the TrustSec policy matrix in Cisco ISE

• configured TrustSec on the switch

• configured TrustSec on the wireless LAN controller

Which two actions must be taken to complete the configuration? (Choose two.)

Options:

A.  

Configure Security Group Tag Exchange Protocol on the wireless LAN controller.

B.  

Configure Security Group Tag Exchange Protocol to distribute IP to security group tags on Cisco ISE.

C.  

Configure inline tag propagation on the switch and wireless LAN controller.

D.  

Create static IP-to-SGT mapping for the restricted web server.

E.  

Configure Security Group Tag Exchange Protocol on the switch.

Discussion 0
Questions 67

An engineer is configuring the remote access VPN to use Cisco ISE for AAA and needs to conduct posture checks on the connecting endpoints After the endpoint connects, it receives its initial authorization result and continues onto the compliance scan What must be done for this AAA configuration to allow compliant access to the network?

Options:

A.  

Configure the posture authorization so it defaults to unknown status

B.  

Fix the CoA port number

C.  

Ensure that authorization only mode is not enabled

D.  

Enable dynamic authorization within the AAA server group

Discussion 0
Questions 68

A network engineer must enable a profiling probe. The profiling must take details through the Active Directory. Where in the Cisco ISE interface would the engineer enable the probe?

Options:

A.  

Policy > Policy Elements > Profiling

B.  

Administration > Deployment > System > Profiling

C.  

Policy > Deployment > System > Profiling

D.  

Administration > System > Deployment > Profiling

Discussion 0
Questions 69

Refer to the exhibit. An engineer must configure BYOD in Cisco ISE. A single SSID must be used to allow BYOD devices to connect to the network. These configurations have been performed on Wireless LAN Controller already:

RADIUS server

BYOD-Dot1x SSID

Which two configurations must be done in Cisco ISE to meet the requirement? (Choose two.)

Options:

A.  

FlexConnect ACL

B.  

External identity source

C.  

Authentication policy

D.  

Redirect ACL

E.  

Profiling policy

Discussion 0
Questions 70

An administrator must block access to BYOD endpoints that were onboarded without a certificate and have been reported as stolen in the Cisco ISE My Devices Portal. Which condition must be used when configuring an authorization policy that sets DenyAccess permission?

Options:

A.  

Endpoint Identity Group is Blocklist, and the BYOD state is Registered.

B.  

Endpoint Identify Group is Blocklist, and the BYOD state is Pending.

C.  

Endpoint Identity Group is Blocklist, and the BYOD state is Lost.

D.  

Endpoint Identity Group is Blocklist, and the BYOD state is Reinstate.

Discussion 0
Questions 71

An administrator is configuring a new profiling policy in Cisco ISE for a printer type that is missing from the profiler feed The logical profile Printers must be used in the authorization rule and the rule must be hit. What must be done to ensure that this configuration will be successful^

Options:

A.  

Create a new logical profile for the new printer policy

B.  

Enable the EndPoints:EndPointPolicy condition in the authorization policy.

C.  

Add the new profiling policy to the logical profile Printers.

D.  

Modify the profiler conditions to ensure that it goes into the correct logical profile

Discussion 0
Questions 72

Which two ports do network devices typically use for CoA? (Choose two)

Options:

A.  

443

B.  

19005

C.  

8080

D.  

3799

E.  

1700

Discussion 0
Questions 73

An engineer is configuring a posture policy for Windows 10 endpoints and wants to ensure that users in each AD group have different conditions to meet to be compliant. What must be done to accomplish this task?

Options:

A.  

identify The users groups needed for different policies and create service conditions to map each one to its posture requirement

B.  

Configure a simple condition for each AD group and use it in the posture policy for each use case

C.  

Use the authorization policy within the policy set to group each AD group with their respective posture policy

D.  

Change the posture requirements to use an AD group lor each use case then use those requirements in the posture policy

Discussion 0
Questions 74

Drag and drop the description from the left onto the protocol on the right that is used to carry out system authentication, authentication, and accounting.

Options:

Discussion 0
Questions 75

What must be configured on the WLC to configure Central Web Authentication using Cisco ISE and a WLC?

Options:

A.  

Set the NAC State option to SNMP NAC.

B.  

Set the NAC State option to RADIUS NAC.

C.  

Use the radius-server vsa send authentication command.

D.  

Use the ip access-group webauth in command.

Discussion 0
Questions 76

Which two fields are available when creating an endpoint on the context visibility page of Cisco IS? (Choose two)

Options:

A.  

Policy Assignment

B.  

Endpoint Family

C.  

Identity Group Assignment

D.  

Security Group Tag

E.  

IP Address

Discussion 0
Questions 77

When creating a policy within Cisco ISE for network access control, the administrator wants to allow different access restrictions based upon the wireless SSID to which the device is connecting. Which policy condition must be used in order to accomplish this?

Options:

A.  

Network Access NetworkDeviceName CONTAINS

B.  

DEVICE Device Type CONTAINS

C.  

Radius Called-Station-ID CONTAINS

D.  

Airespace Airespace-Wlan-ld CONTAINS

Discussion 0
Questions 78

An engineer is creating a new authorization policy to give the endpoints access to VLAN 310 upon successful authentication The administrator tests the 802.1X authentication for the endpoint and sees that it is authenticating successfully What must be done to ensure that the endpoint is placed into the correct VLAN?

Options:

A.  

Configure the switchport access vlan 310 command on the switch port

B.  

Ensure that the security group is not preventing the endpoint from being in VLAN 310

C.  

Add VLAN 310 in the common tasks of the authorization profile

D.  

Ensure that the endpoint is using The correct policy set

Discussion 0
Questions 79

The Cisco Wireless LAN Controller and guest portal must be set up in Cisco ISE. These configurations were performed:

• configured all the required Cisco Wireless LAN Controller configurations

• added the wireless controller to Cisco ISE network devices

• created an endpoint identity group

• configured credentials to be sent by email

• configured the SMTP server

• configured an authorization profile with redirection to the guest portal and redirected the access control list

• configured an authentication policy for MAB users

• created an authorization policy

Which two components would be required to complete the configuration? (Choose two.)

Options:

A.  

sponsor group

B.  

hotspot guest portal

C.  

sponsor portal

D.  

self-registered guest portal

E.  

guest type

Discussion 0
Questions 80

On which port does Cisco ISE present the Admin certificate for posture and client provisioning?

Options:

A.  

TCP/8000

B.  

TCP/8080

C.  

TCP/8905

D.  

TCP/8999

Discussion 0
Questions 81

Which two task types are included in the Cisco ISE common tasks support for TACACS+ profiles?

(Choose two.)

Options:

A.  

Firepower

B.  

WLC

C.  

IOS

D.  

ASA

E.  

Shell

Discussion 0
Questions 82

What is a valid guest portal type?

Options:

A.  

Sponsored-Guest

B.  

My Devices

C.  

Sponsor

D.  

Captive-Guest

Discussion 0
Questions 83

Which Cisco ISE service allows an engineer to check the compliance of endpoints before connecting to the network?

Options:

A.  

personas

B.  

qualys

C.  

nexpose

D.  

posture

Discussion 0
Questions 84

What is the Microsoft security policy recommendation (or fast user switching in Cisco ISE?

Options:

A.  

Disable BYOD posture agent.

B.  

Enable fast user switching.

C.  

Disable fast user switching.

D.  

Enable Cisco Secure Client posture agent.

Discussion 0
Questions 85

Which nodes are supported in a distributed Cisco ISE deployment?

Options:

A.  

Policy Service nodes for session failover

B.  

Monitoring nodes for PxGrid services

C.  

Administration nodes for session failover

D.  

Policy Service nodes for automatic failover

Discussion 0
Questions 86

An administrator must provide network access to legacy Windows endpoints with a specific device type and operating system version using Cisco ISE profiler services. The ISE profiler services and access switches must be configured to identify endpoints using the dhcp-class-identifier and parameters-request-list attributes from the DHCP traffic. These configurations were performed:

    enabled the DHCP probe in Cisco ISE

    configured the Cisco ISE PSN interface to receive DHCP packets

    configured the attributes in custom profiling conditions

    configured a custom profiling policy

    configured an authorization rule with permit access

Which action completes the configuration?

Options:

A.  

Configure the switches to send copies of the DHCP traffic to the Cisco ISE PSN.

B.  

Configure the Cisco ISE PSN interface to receive SPAN DHCP traffic.

C.  

Configure the switches to relay DHCP packets to the Cisco ISE PSN.

D.  

Enable the DHCP SPAN probe in Cisco ISE primary server.

Discussion 0
Questions 87

Which two methods should a sponsor select to create bulk guest accounts from the sponsor portal? (Choose two )

Options:

A.  

Random

B.  

Monthly

C.  

Daily

D.  

Imported

E.  

Known

Discussion 0
Questions 88

An engineer is configuring 802.1X and is testing out their policy sets. After authentication, some endpoints are given an access-reject message but are still allowed onto the network. What is causing this issue to occur?

Options:

A.  

The switch port is configured with authentication event server dead action authorize vlan.

B.  

The authorization results for the endpoints include a dACL allowing access.

C.  

The authorization results for the endpoints include the Trusted security group tag.

D.  

The switch port is configured with authentication open.

Discussion 0
Questions 89

The security team identified a rogue endpoint with MAC address 00:46:91:02:28:4A attached to the network. Which action must security engineer take within Cisco ISE to effectively

restrict network access for this endpoint?

Options:

A.  

Configure access control list on network switches to block traffic.

B.  

Create authentication policy to force reauthentication.

C.  

Add MAC address to the endpoint quarantine list.

D.  

Implement authentication policy to deny access.

Discussion 0