Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Cisco 300-715 - Implementing and Configuring Cisco Identity Services Engine (SISE) v4.0 (300-715 SISE)

Page: 6 / 9
Total 299 questions

An engineer deploys Cisco ISE and must configure Active Directory to then use information from Active Directory in an authorization policy. Which two components must be configured, in addition to Active Directory groups, to achieve this goat? (Choose two )

A.

Active Directory External Identity Sources

B.

Library Condition for External Identity. External Groups

C.

Identity Source Sequences

D.

LDAP External Identity SourcesE Library Condition for Identity Group: User Identity Group

What must be configured on the WLC to configure Central Web Authentication using Cisco ISE and a WLC?

A.

Set the NAC State option to SNMP NAC.

B.

Set the NAC State option to RADIUS NAC.

C.

Use the radius-server vsa send authentication command.

D.

Use the ip access-group webauth in command.

Which two features should be used on Cisco ISE to enable the TACACS+ feature? (Choose two )

A.

External TACACS Servers

B.

Device Admin Service

C.

Device Administration License

D.

Server Sequence

E.

Command Sets

TION NO: 33

Which portal is used to customize the settings for a user to log in and download the compliance module?

A.

Client Profiling

B.

Client Endpoint

C.

Client Provisioning

D.

Client Guest

An engineer is configuring 802.1X and wants it to be transparent from the users' point of view. The implementation should provide open authentication on the switch ports while providing strong levels of security for non-authenticated devices. Which deployment mode should be used to achieve this?

A.

closed

B.

low-impact

C.

open

D.

high-impact

How is policy services node redundancy achieved in a deployment?

A.

by enabling VIP

B.

by utilizing RADIUS server list on the NAD

C.

by creating a node group

D.

by deploying both primary and secondary node

NO: 37

In which two ways can users and endpoints be classified for TrustSec?

(Choose Two.)

A.

VLAN

B.

SXP

C.

dynamic

D.

QoS

E.

SGACL

An administrator is configuring a Cisco ISE posture agent in the client provisioning policy and needs to ensure that the posture policies that interact with clients are monitored, and end users are required to comply with network usage rules Which two resources must be added in Cisco ISE to accomplish this goal? (Choose two)

A.

AnyConnect

B.

Supplicant

C.

Cisco ISE NAC

D.

PEAP

E.

Posture Agent

Which use case validates a change of authorization?

A.

An authenticated, wired EAP-capable endpoint is discovered

B.

An endpoint profiling policy is changed for authorization policy.

C.

An endpoint that is disconnected from the network is discovered

D.

Endpoints are created through device registration for the guests

Refer to the exhibit:

Which command is typed within the CU of a switch to view the troubleshooting output?

A.

show authentication sessions mac 000e.84af.59af details

B.

show authentication registrations

C.

show authentication interface gigabitethemet2/0/36

D.

show authentication sessions method