Summer Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

300-715 PDF

$49

$139.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

300-715 PDF + Testing Engine

$66.5

$189.99

3 Months Free Update

  • Exam Name: Implementing and Configuring Cisco Identity Services Engine (SISE) v4.0 (300-715 SISE)
  • Last Update: Sep 12, 2025
  • Questions and Answers: 295
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

300-715 Engine

$56

$159.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

300-715 Practice Exam Questions with Answers Implementing and Configuring Cisco Identity Services Engine (SISE) v4.0 (300-715 SISE) Certification

Question # 6

An administrator is configuring sponsored guest access using Cisco ISE Access must be restricted to the sponsor portal to ensure that only necessary employees can issue sponsored accounts and employees must be classified to do so What must be done to accomplish this task?

A.

Configure an identity-based access list in Cisco ISE to restrict the users allowed to login

B.

Edit the sponsor portal to only accept members from the selected groups

C.

Modify the sponsor groups assigned to reflect the desired user groups

D.

Create an authorization rule using the Guest Flow condition to authorize the administrators

Full Access
Question # 7

What is an advantage of TACACS+ versus RADIUS authentication when reviewing reports in Cisco ISE?

A.

TACACS+ reduces authentication latency, and RADIUS increases latency by adding additional packet headers.

B.

TACACS+ performs secure communication with IPsec, and RADIUS uses DTLS encryption.

C.

TACACS+ provides command accounting, and RADIUS combines authentication and authorization.

D.

TACACS+ uses SSL certificates, and RADIUS does not have encryption.

Full Access
Question # 8

Which two VMware features are supported on a Cisco ISE virtual appliance? (Choose two.)

A.

multivendor integration

B.

VM hardware version 7+

C.

VM snapshots

D.

OVF support

E.

VM cold migration

Full Access
Question # 9

A network engineer is configuring guest access and notices that when a guest user registers a second device for access, the first device loses access What must be done to ensure that both devices for a particular user are able to access the guest network simultaneously?

A.

Configure the sponsor group to increase the number of logins.

B.

Use a custom portal to increase the number of logins

C.

Modify the guest type to increase the number of maximum devices

D.

Create an Adaptive Network Control policy to increase the number of devices

Full Access
Question # 10

A network administrator has just added a front desk receptionist account to the Cisco ISE Guest Service sponsor group. Using the Cisco ISE Guest Sponsor Portal, which guest services can the receptionist provide?

A.

Keep track of guest user activities

B.

Configure authorization settings for guest users

C.

Create and manage guest user accounts

D.

Authenticate guest users to Cisco ISE

Full Access
Question # 11

What does a fully distributed Cisco ISE deployment include?

A.

PAN and PSN on the same node while MnTs are on their own dedicated nodes.

B.

PAN and MnT on the same node while PSNs are on their own dedicated nodes.

C.

All Cisco ISE personas on their own dedicated nodes.

D.

All Cisco ISE personas are sharing the same node.

Full Access
Question # 12

An engineer is configuring 802.1X and is testing out their policy sets. After authentication, some endpoints are given an access-reject message but are still allowed onto the network. What is causing this issue to occur?

A.

The switch port is configured with authentication event server dead action authorize vlan.

B.

The authorization results for the endpoints include a dACL allowing access.

C.

The authorization results for the endpoints include the Trusted security group tag.

D.

The switch port is configured with authentication open.

Full Access
Question # 13

In a Cisco ISE split deployment model, which load is split between the nodes?

A.

AAA

B.

network admission

C.

log collection

D.

device admission

Full Access
Question # 14

Which two endpoint compliance statuses are possible? (Choose two.)

A.

unknown

B.

known

C.

invalid

D.

compliant

E.

valid

Full Access
Question # 15

Which controller option allows a user to switch from the provisioning SSID to the employee SSID after registration?

A.

User Idle Timeout

B.

Fast SSID Change

C.

AP SSID Fallback

D.

AAA Override

Full Access
Question # 16

A network administrator must use Cisco ISE to check whether endpoints have the correct version of antivirus installed Which action must be taken to allow this capability?

A.

Configure a native supplicant profile to be used for checking the antivirus version

B.

Configure Cisco ISE to push the HostScan package to the endpoints to check for the antivirus version.

C.

Create a Cisco AnyConnect Network Visibility Module configuration profile to send the antivirus information of the endpoints to Cisco ISE.

D.

Create a Cisco AnyConnect configuration within Cisco ISE for the Compliance Module and associated configuration files

Full Access
Question # 17

300-715 question answer

Refer to the exhibit. In which scenario does this switch configuration apply?

A.

when allowing a hub with multiple clients connected

B.

when passing IP phone authentication

C.

when allowing multiple IP phones to be connected

D.

when preventing users with hypervisor

Full Access
Question # 18

Refer to the exhibit.

300-715 question answer

An engineer is configuring a client but cannot authenticate to Cisco ISE During troubleshooting, the show authentication sessions command was issued to display the authentication status of each port Which command gives additional information to help identify the problem with the authentication?

A.

show authentication sessions

B.

show authentication sessions Interface Gil/0/1 output

C.

show authentication sessions interface Gi1/0/1 details

D.

show authentication sessions output

Full Access
Question # 19

Which two events trigger a CoA for an endpoint when CoA is enabled globally for ReAuth? (Choose two.)

A.

endpoint marked as lost in My Devices Portal

B.

addition of endpoint to My Devices Portal

C.

endpoint profile transition from Apple-Device to Apple-iPhone

D.

endpoint profile transition from Unknown to Windows 10-Workstation

E.

updating of endpoint dACL.

Full Access
Question # 20

A network administrator is currently using Cisco ISE to authenticate devices and users via 802 1X There is now a need to also authorize devices and users using EAP-TLS. Which two additional components must be configured in Cisco ISE to accomplish this'? (Choose two.)

A.

Network Device Group

B.

Serial Number attribute that maps to a CA Server

C.

Common Name attribute that maps to an identity store

D.

Certificate Authentication Profile

E.

EAP Authorization Profile

Full Access
Question # 21

Which two values are compared by the binary comparison (unction in authentication that is based on Active Directory?

A.

subject alternative name and the common name

B.

MS-CHAPv2 provided machine credentials and credentials stored in Active Directory

C.

user-presented password hash and a hash stored in Active Directory

D.

user-presented certificate and a certificate stored in Active Directory

Full Access
Question # 22

An administrator needs to connect ISE to Active Directory as an external authentication source and allow the proper ports through the firewall. Which two ports should be opened to accomplish this task? (Choose two)

A.

TELNET 23

B.

LDAP 389

C.

HTTP 80

D.

HTTPS 443

E.

MSRPC 445

Full Access
Question # 23

Which two authentication protocols are supported by RADIUS but not by TACACS+? (Choose two.)

A.

MSCHAPv1

B.

PAP

C.

EAP

D.

CHAP

E.

MSCHAPV2

Full Access
Question # 24

MacOS users are complaining about having to read through wordy instructions when remediating their workstations to gam access to the network Which alternate method should be used to tell users how to remediate?

A.

URL link

B.

message text

C.

executable

D.

file distribution

Full Access
Question # 25

Which two external identity stores support EAP-TLS and PEAP-TLS? (Choose two.)

A.

Active Directory

B.

RADIUS Token

C.

Internal Database

D.

RSA SecurlD

E.

LDAP

Full Access
Question # 26

An administrator must deploy the Cisco Secure Client posture agent to employee endpoints that access a wireless network by using URL redirection in Cisco ISE. The compliance module must be downloaded from Cisco and uploaded to the Cisco ISE client provisioning resource. What must be used to upload the compliance module?

A.

Secure Client configuration

B.

agent resources from the local disk

C.

Secure Client posture profile

D.

Client Provisioning Portal

Full Access
Question # 27

A network engineer is in the predeployment discovery phase o! a Cisco ISE deployment and must discover the network. There is an existing network management system in the network. Which type of probe must be configured to gather the information?

A.

NetFlow

B.

RADIUS

C.

SNMP

D.

NMAP

Full Access
Question # 28

When configuring an authorization policy, an administrator cannot see specific Active Directory groups present in their domain to be used as a policy condition. However, other groups that are in the same domain are seen What is causing this issue?

A.

Cisco ISE only sees the built-in groups, not user created ones

B.

The groups are present but need to be manually typed as conditions

C.

Cisco ISE's connection to the AD join point is failing

D.

The groups are not added to Cisco ISE under the AD join point

Full Access
Question # 29

An engineer is configuring Central Web Authentication in Cisco ISE to provide guest access. When an authentication rule is configured in the Default Policy Set for the Wired_MAB or Wireless_MAB conditions, what must be selected for the "if user not found" setting?

A.

CONTINUE

B.

REJECT

C.

ACCEPT

D.

DROP

Full Access
Question # 30

Which port does Cisco ISE use for native supplicant provisioning of a Windows laptop?

A.

TCP 8909

B.

TCP 8905

C.

UDP 1812

D.

TCP 443

Full Access
Question # 31

An engineer is configuring Cisco ISE policies to support MAB for devices that do not have 802.1X capabilities. The engineer is configuring new endpoint identity groups as conditions to be used in the AuthZ policies, but noticed that the endpoints are not hitting the correct policies. What must be done in order to get the devices into the right policies?

A.

Manually add the MAC addresses of the devices to endpoint ID groups in the context visibility database.

B.

Create an AuthZ policy to identify Unknown devices and provide partial network access prior to profiling.

C.

Add an identity policy to dynamically add the IP address of the devices to their endpoint identity groups.

D.

Identify the non 802.1X supported device types and create custom profiles for them to profile into.

Full Access
Question # 32

The IT manager wants to provide different levels of access to network devices when users authenticate using TACACS+. The company needs specific commands to be allowed based on the Active Directory group membership of the different roles within the IT department. The solution must minimize the number of objects created in Cisco ISE. What must be created to accomplish this task?

A.

one shell profile and one command set

B.

multiple shell profiles and one command set

C.

one shell profile and multiple command sets

D.

multiple shell profiles and multiple command sets

Full Access
Question # 33

An administrator is editing a csv list of endpoints and wants to reprofile some of the devices indefinitely before importing the list into Cisco ISE. Which field and Boolean value must be changed for the devices before the list is reimported?

A.

Identity Group Assignment field and Static Assignment field set to the value FALSE

B.

Policy Assignment field and Static Assignment field set to the value TRUE

C.

Policy Assignment field and Static Assignment field set to the value FALSE

D.

Identity Group Assignment field and Static Assignment field set to the value TRUE

Full Access
Question # 34

An engineer is deploying Cisco ISE in a network that contains an existing Cisco Secure Firewall ASA. The customer requested that Cisco TrustSec be configured so that Cisco ISE and the firewall can share SGT information.

Which protocol must be configured on Cisco ISE to meet the requirement?

A.

PAC

B.

SXP

C.

RADIUS

D.

pxGrid

Full Access
Question # 35

An administrator made changes in Cisco ISE and needs to apply new permissions for endpoints that have already been authenticated by sending a CoA packet to the network devices. Which IOS command must be configured on the devices to accomplish this goal?

A.

aaa server radius dynamic-author

B.

authentication command bounce-port

C.

authentication command disable-port

D.

aaa nas port extended

Full Access
Question # 36

A network engineer must enable a profiling probe. The profiling must take details through the Active Directory. Where in the Cisco ISE interface would the engineer enable the probe?

A.

Policy > Policy Elements > Profiling

B.

Administration > Deployment > System > Profiling

C.

Policy > Deployment > System > Profiling

D.

Administration > System > Deployment > Profiling

Full Access
Question # 37

Which protocol must be allowed for a BYOD device to access the BYOD portal?

A.

HTTP

B.

SMTP

C.

HTTPS

D.

SSH

Full Access
Question # 38

Which command displays all 802 1X/MAB sessions that are active on the switch ports of a Cisco Catalyst switch?

A.

show authentication sessions output

B.

Show authentication sessions

C.

show authentication sessions interface Gi 1/0/x

D.

show authentication sessions interface Gi1/0/x output

Full Access
Question # 39

What must be configured on the WLC to configure Central Web Authentication using Cisco ISE and a WLC?

A.

Set the NAC State option to SNMP NAC.

B.

Set the NAC State option to RADIUS NAC.

C.

Use the radius-server vsa send authentication command.

D.

Use the ip access-group webauth in command.

Full Access
Question # 40

An engineer needs to configure a Cisco ISE server to issue a CoA for endpoints already authenticated to access the network. The CoA option must be enforced on a session, even if there are multiple active sessions on a port. What must be configured to accomplish this task?

A.

the Reauth CoA option in the Cisco ISE system profiling settings enabled

B.

an endpoint profiling policy with the No CoA option enabled

C.

an endpoint profiling policy with the Port Bounce CoA option enabled

D.

the Port Bounce CoA option in the Cisco ISE system profiling settings enabled

Full Access
Question # 41

A network engineer must configure a centralized Cisco ISE solution for wireless guest access with users in different time zones. The guest account activation time must be independent of the user time zone, and the guest account must be enabled automatically when the user self-registers on the guest portal. Which option in the time profile settings must be selected to meet the requirement?

A.

Select FromFirstLogin from the Account Type dropdown.

B.

Select FromCreation from the Account Type dropdown.

C.

Set the Maximum Account Duration to 1 Day.

D.

Set the Duration field to 24:00:00.

Full Access
Question # 42

An organization wants to standardize the 802 1X configuration on their switches and remove static ACLs on the switch ports while allowing Cisco ISE to communicate to the switch what access to provide What must be configured to accomplish this task?

A.

security group tag within the authorization policy

B.

extended access-list on the switch for the client

C.

port security on the switch based on the client's information

D.

dynamic access list within the authorization profile

Full Access
Question # 43

A user changes the status of a device to stolen in the My Devices Portal of Cisco ISE. The device was originally onboarded in the BYOD wireless Portal without a certificate. The device is found later, but the user cannot re-onboard the device because Cisco ISE assigned the device to the Blocklist endpoint identity group. What must the user do in the My Devices Portal to resolve this issue?

A.

Manually remove the device from the Blocklist endpoint identity group.

B.

Change the device state from Stolen to Not Registered.

C.

Change the BYOD registration attribute of the device to None.

D.

Delete the device, and then re-add the device.

Full Access
Question # 44

An engineer has been tasked with standing up a new guest portal for customers that are waiting in the lobby. There is a requirement to allow guests to use their social media logins to access the guest network to appeal to more customers What must be done to accomplish this task?

A.

Create a sponsor portal to allow guests to create accounts using their social media logins.

B.

Create a sponsored guest portal and enable social media in the external identity sources.

C.

Create a self-registered guest portal and enable the feature for social media logins

D.

Create a hotspot portal and enable social media login for network access

Full Access
Question # 45

Wireless network users authenticate to Cisco ISE using 802.1X through a Cisco Catalyst switch. An engineer must create an updated configuration to assign a security group tag to the user's traffic using inline tagging to prevent unauthenticated users from accessing a restricted server. The configurations were performed:

• configured Cisco ISE as a Cisco TrustSec AAA server

• configured the switch as a RADIUS device in Cisco ISE

• configured the wireless LAN controller as a TrustSec device in Cisco ISE

• created a security group tog for the wireless users

• created a certificate authentication profile

? created an identity source sequence

• assigned an appropriate security group tag to the wireless users

• defined security group access control lists to specify an egress policy

• enforced the access control lists on the TrustSec policy matrix in Cisco ISE

• configured TrustSec on the switch

• configured TrustSec on the wireless LAN controller

Which two actions must be taken to complete the configuration? (Choose two.)

A.

Configure Security Group Tag Exchange Protocol on the wireless LAN controller.

B.

Configure Security Group Tag Exchange Protocol to distribute IP to security group tags on Cisco ISE.

C.

Configure inline tag propagation on the switch and wireless LAN controller.

D.

Create static IP-to-SGT mapping for the restricted web server.

E.

Configure Security Group Tag Exchange Protocol on the switch.

Full Access
Question # 46

What is needed to configure wireless guest access on the network?

A.

endpoint already profiled in ISE

B.

WEBAUTH ACL for redirection

C.

valid user account in Active Directory

D.

Captive Portal Bypass turned on

Full Access
Question # 47

An engineer must use Cisco ISE to provide network access to endpoints that cannot support 802.1X. The endpoint MAC addresses must be allowlisted by configuring an endpoint identity group. These configurations were performed:

    Configured an identity group named allowlist

    Configured the endpoints to use the MAC address of incompatible 802.1X devices

    Added the endpoints to the allowlist identity group

    Configured an authentication policy for MAB users

What must be configured?

A.

Authorization profile that has the PermitAccess permission and matches the allowlist identity group

B.

Authentication profile that has the PermitAccess permission and matches the allowlist identity group

C.

Authorization policy that has the PermitAccess permission and matches the allowlist identity group

D.

Logical profile that matches the allowlist identity group based on the configured policy

Full Access
Question # 48

Refer to the exhibit.

300-715 question answer

Which two configurations are needed on a catalyst switch for it to be added as a network access device in a Cisco ISE that is being used for 802 1X authentications? (Choose two )

300-715 question answer

A.

Option A

B.

Option B

C.

Option C

D.

Option D

E.

Option E

Full Access
Question # 49

An administrator needs to add a new third party network device to be used with Cisco ISE for Guest and BYOD authorizations. Which two features must be configured under Network Device Profile to achieve this? (Choose two.)

A.

dACL

B.

TACACS

C.

URL Redirect

D.

SNMP community

E.

CoA Type

Full Access
Question # 50

A network engineer must create a guest portal for wireless guests on Cisco ISE. The guest users must not be able to create accounts; however, the portal should require a username and password to connect. Which portal type must be created in Cisco ISE to meet the requirements?

A.

Sponsored Guest Access

B.

Self Registered Guest Access

C.

Custom Guest Portal

D.

Hotspot Guest Access

Full Access
Question # 51

An engineer is implementing Cisco ISE and needs to configure 802.1X. The port settings are configured for port-based authentication. Which command should be used to complete this configuration?

A.

dot1x pae authenticator

B.

dot1x system-auth-control

C.

authentication port-control auto

D.

aaa authentication dot1x default group radius

Full Access
Question # 52

What are two components of the posture requirement when configuring Cisco ISE posture? (Choose two)

A.

updates

B.

remediation actions

C.

Client Provisioning portal

D.

conditions

E.

access policy

Full Access
Question # 53

An engineer is configuring a new Cisco ISE node. Context-sensitive information must be shared between the Cisco ISE and a Cisco ASA. Which persona must be enabled?

A.

Administration

B.

Policy Service

C.

pxGrid

D.

Monitoring

Full Access
Question # 54

A security engineer configures a Cisco Catalyst switch to use Cisco TrustSec. The engineer must define the PAC key to authenticate the switch to Cisco IISE. Drag and drop the commands from the left into sequence on the right. Not all options are used.

300-715 question answer

Full Access
Question # 55

What is a valid guest portal type?

A.

Sponsored-Guest

B.

My Devices

C.

Sponsor

D.

Captive-Guest

Full Access
Question # 56

When setting up profiling in an environment using Cisco ISE for network access control, an organization must use non-proprietary protocols for collecting the information at layer 2. Which two probes will provide this information without forwarding SPAN packets to Cisco ISE? {Choose two.)

A.

DHCP SPAN probe

B.

SNMP query probe

C.

NetFlow probe

D.

RADIUS probe

E.

DNS probe

Full Access
Question # 57

An administrator is adding network devices for a new medical building into Cisco ISE. These devices must be in a network device group that is identifying them as "Medical Switch" so that the policies can be made separately for the endpoints connecting through them. Which configuration item must be changed in the network device within Cisco ISE to accomplish this goal?

A.

Change the device type to Medical Switch.

B.

Change the device profile to Medical Switch.

C.

Change the model name to Medical Switch.

D.

Change the device location to Medical Switch.

Full Access
Question # 58

An employee logs on to the My Devices portal and marks a currently on-boarded device as ‘Lost’.

Which two actions occur within Cisco ISE as a result oí this action? (Choose two)

A.

Certificates provisioned to the device are not revoked

B.

BYOD Registration status is updated to No

C.

The device access has been denied

D.

BYOD Registration status is updated to Unknown.

E.

The device status is updated to Stolen

Full Access
Question # 59

An administrator is attempting to replace the built-in self-signed certificates on a Cisco ISE appliance. The CA is requesting some information about the appliance in order to sign the new certificate. What must be done in order to provide the CA this information?

A.

Install the Root CA and intermediate CA.

B.

Generate the CSR.

C.

Download the intermediate server certificate.

D.

Download the CA server certificate.

Full Access
Question # 60

300-715 question answer

Refer to the exhibit Which component must be configured to apply the SGACL?

A.

egress router

B.

host

C.

secure server

D.

ingress router

Full Access
Question # 61

While configuring Cisco TrustSec on Cisco IOS devices the engineer must set the CTS device ID and password in order for the devices to authenticate with each other. However after this is complete the devices are not able to property authenticate What issue would cause this to happen even if the device ID and passwords are correct?

A.

The device aliases are not matching

B.

The 5GT mappings have not been defined

C.

The devices are missing the configuration cts credentials trustsec verify 1

D.

EAP-FAST is not enabled

Full Access
Question # 62

A Cisco ISE administrator needs to ensure that guest endpoint registrations are only valid for one day When testing the guest policy flow, the administrator sees that the Cisco ISE does not delete the endpoint in the Guest Endpoints identity store after one day and allows access to the guest network after that period. Which configuration is causing this problem?

A.

The Endpoint Purge Policy is set to 30 days for guest devices

B.

The RADIUS policy set for guest access is set to allow repeated authentication of the same device

C.

The length of access is set to 7 days in the Guest Portal Settings

D.

The Guest Account Purge Policy is set to 15 days

Full Access
Question # 63

A network administrator must configura endpoints using an 802 1X authentication method with EAP identity certificates that are provided by the Cisco ISE When the endpoint presents the identity certificate to Cisco ISE to validate the certificate, endpoints must be authorized to connect to the network Which EAP type must be configured by the network administrator to complete this task?

A.

EAP-PEAP-MSCHAPv2

B.

EAP-TTLS

C.

EAP-FAST

D.

EAP-TLS

Full Access
Question # 64

Which two actions occur when a Cisco ISE server device administrator logs in to a device? (Choose two)

A.

The device queries the internal identity store

B.

The Cisco ISE server queries the internal identity store

C.

The device queries the external identity store

D.

The Cisco ISE server queries the external identity store.

E.

The device queries the Cisco ISE authorization server

Full Access
Question # 65

Drag and drop the configuration steps from the left into the sequence on the right to install two Cisco ISE nodes in a distributed deployment.

Full Access
Question # 66

An administrator is configuring the Native Supplicant Profile to be used with the Cisco ISE posture agents and needs to test the connection using wired devices to determine which profile settings are available. Which two configuration settings should be used to accomplish this task? (Choose two.)

A.

authentication mode

B.

proxy host/IP

C.

certificate template

D.

security

E.

allowed protocol

Full Access
Question # 67

Which default endpoint identity group does an endpoint that does not match any profile in Cisco ISE become a member of?

A.

Endpoint

B.

unknown

C.

blacklist

D.

white list

E.

profiled

Full Access
Question # 68

A Cisco device has a port configured in multi-authentication mode and is accepting connections only from hosts assigned the SGT of SGT_0422048549 The VLAN trunk link supports a maximum of 8 VLANS What is the reason for these restrictions?

A.

The device is performing inline tagging without acting as a SXP speaker

B.

The device is performing mime tagging while acting as a SXP speaker

C.

The IP subnet addresses are dynamically mapped to an SGT.

D.

The IP subnet addresses are statically mapped to an SGT

Full Access
Question # 69

An organization is hosting a conference and must make guest accounts for several of the speakers attending. The conference ended two days early but the guest accounts are still being used to access the network. What must be configured to correct this?

A.

Create an authorization rule denying sponsored guest access.

B.

Navigate to the Guest Portal and delete the guest accounts.

C.

Create an authorization rule denying guest access.

D.

Navigate to the Sponsor Portal and suspend the guest accounts.

Full Access
Question # 70

What is a function of client provisioning?

A.

It ensures an application process is running on the endpoint.

B.

It checks a dictionary' attribute with a value.

C.

It ensures that endpoints receive the appropriate posture agents

D.

It checks the existence date and versions of the file on a client.

Full Access
Question # 71

An engineer is configuring Cisco ISE for guest services They would like to have any unregistered guests redirected to the guest portal for authentication then have a CoA provide them with full access to the network that is segmented via firewalls Why is the given configuration failing to accomplish this goal?

A.

The Guest Flow condition is not in the line that gives access to the quest portal

B.

The Network_Access_Authentication_Passed condition will not work with guest services for portal access.

C.

The Permit Access result is not set to restricted access in its policy line

D.

The Guest Portal and Guest Access policy lines are in the wrong order

Full Access
Question # 72

An administrator is responsible for configuring network access for a temporary network printer. The administrator must only use the printer MAC address 50:89:65: 18:8: AB for authentication. Which authentication method will accomplish the task?

A.

Posturing

B.

Profiling

C.

MAB

D.

802.1x

Full Access
Question # 73

A company is attempting to improve their BYOD policies and restrict access based on certain criteria. The company's subnets are organized by building. Which attribute should be used in order to gain access based on location?

A.

static group assignment

B.

IP address

C.

device registration status

D.

MAC address

Full Access
Question # 74

An administrator replaced a PSN in the distributed Cisco ISE environment. When endpoints authenticate to it, the devices are not getting the right profiles or attributes and as a result, are not hitting the correct policies. This was working correctly on the previous PSN. Which action must be taken to ensure the endpoints get identified?

A.

Verify that the MnT node is tracking the session.

B.

Verify the shared secret used between the switch and the PSN.

C.

Verify that the profiling service is running on the new PSN.

D.

Verify that the authentication request the PSN is receiving is not malformed.

Full Access
Question # 75

A network administrator is setting up wireless guest access and has been unsuccessful in testing client access. The endpoint is able to connect to the SSID but is unable to grant access to the guest network through the guest portal. What must be done to identify the problem?

A.

Use context visibility to verify posture status.

B.

Use the endpoint ID to execute a session trace.

C.

Use the identity group to validate the authorization rules.

D.

Use traceroute to ensure connectivity.

Full Access
Question # 76

A network administrator is configuring a new access switch to use with Cisco ISE for network access control. There is a need to use a centralized server for the reauthentication timers. What must be configured in order to accomplish this task?

A.

Configure Cisco ISE to replace the switch configuration with new timers.

B.

Configure Cisco ISE to block access after a certain period of time.

C.

Issue the authentication timer reauthenticate server command on the switch.

D.

Issue the authentication periodic command on the switch.

Full Access
Question # 77

An organization wants to implement 802.1X and is debating whether to use PEAP-MSCHAPv2 or PEAP-EAP-TLS for authentication. Drag the characteristics on the left to the corresponding protocol on the right.

Full Access
Question # 78

A network administrator notices that after a company-wide shut down, many users cannot connect their laptops to the corporate SSID. What must be done to permit access in a timely manner?

A.

Authenticate the user's system to the secondary Cisco ISE node and move this user to the primary with the renewed certificate.

B.

Connect this system as a guest user and then redirect the web auth protocol to log in to the network.

C.

Add a certificate issue from the CA server, revoke the expired certificate, and add the new certificate in system.

D.

Allow authentication for expired certificates within the EAP-TLS section under the allowed protocols.

Full Access
Question # 79

An ISE administrator must change the inactivity timer for MAB endpoints to terminate the authentication session whenever a switch port that is connected to an IP phone does not detect packets from the device for 30 minutes. Which action must be taken to accomplish this task?

A.

Add the authentication timer reauthenticate server command to the switchport.

B.

Add the authentication timer inactivity 3600 command to the switchport.

C.

Change the idle-timeout on the Radius server to 3600 seconds for IP Phone endpoints.

D.

Configure the session-timeout to be 3600 seconds on Cisco ISE.

Full Access
Question # 80

A network engineer is configuring a network device that needs to filter traffic based on security group tags using a security policy on a routed into this task?

A.

cts authorization list

B.

cts role-based enforcement

C.

cts cache enable

D.

cts role-based policy priority-static

Full Access
Question # 81

An engineer is configuring a guest password policy and needs to ensure that the password complexity requirements are set to mitigate brute force attacks. Which two requirement complete this policy? (Choose two)

A.

minimum password length

B.

active username limit

C.

access code control

D.

gpassword expiration period

E.

username expiration date

Full Access
Question # 82

Which nodes are supported in a distributed Cisco ISE deployment?

A.

Policy Service nodes tor automatic failover

B.

Administration nodes for session failover

C.

Monitoring nodes for PxGrid services

D.

Policy Service nodes for session failover

Full Access
Question # 83

An engineer deploys Cisco ISE and must configure Active Directory to then use information from Active Directory in an authorization policy. Which two components must be configured, in addition to Active Directory groups, to achieve this goat? (Choose two )

A.

Active Directory External Identity Sources

B.

Library Condition for External Identity. External Groups

C.

Identity Source Sequences

D.

LDAP External Identity Sources

E Library Condition for Identity Group: User Identity Group

Full Access
Question # 84

An administrator is troubleshooting an endpoint that is supposed to bypass 802 1X and use MAB. The endpoint is bypassing 802.1X and successfully getting network access using MAB. however the endpoint cannot communicate because it cannot obtain an IP address. What is the problem?

A.

The DHCP probe for Cisco ISE is not working as expected.

B.

The 802.1 X timeout period is too long.

C.

The endpoint is using the wrong protocol to authenticate with Cisco ISE.

D.

An AC I on the port is blocking HTTP traffic

Full Access
Question # 85

A network engineer needs to deploy 802.1x using Cisco ISE in a wired network environment where thin clients download their system image upon bootup using PXE. For which mode must the switch ports be configured?

A.

closed

B.

restricted

C.

monitor

D.

low-impact

Full Access
Question # 86

Which statement about configuring certificates for BYOD is true?

A.

An Android endpoint uses EST, whereas other operating systems use SCEP for enrollment

B.

The SAN field is populated with the end user name.

C.

An endpoint certificate is mandatory for the Cisco ISE BYOD

D.

The CN field is populated with the endpoint host name

Full Access
Question # 87

An engineer is creating a new authorization policy to give the endpoints access to VLAN 310 upon successful authentication The administrator tests the 802.1X authentication for the endpoint and sees that it is authenticating successfully What must be done to ensure that the endpoint is placed into the correct VLAN?

A.

Configure the switchport access vlan 310 command on the switch port

B.

Ensure that the security group is not preventing the endpoint from being in VLAN 310

C.

Add VLAN 310 in the common tasks of the authorization profile

D.

Ensure that the endpoint is using The correct policy set

Full Access
Question # 88

Which supplicant(s) and server(s) are capable of supporting EAP-CHAINING?

A.

Cisco AnyConnect NAM and Cisco Identity Service Engine

B.

Cisco AnyConnect NAM and Cisco Access Control Server

C.

Cisco Secure Services Client and Cisco Access Control Server

D.

Windows Native Supplicant and Cisco Identity Service Engine

Full Access