Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Cisco 300-715 - Implementing and Configuring Cisco Identity Services Engine (SISE) v4.0 (300-715 SISE)

Page: 8 / 9
Total 303 questions

A network engineer is configuring a Cisco Wireless LAN Controller in order to find out more information about the devices that are connecting. This information must be sent to Cisco ISE to be used in authorization policies. Which profiling mechanism must be configured in the Cisco Wireless LAN Controller to accomplish this task?

A.

DNS

B.

CDP

C.

DHCP

D.

ICMP

An engineer is using Cisco ISE and configuring guest services to allow wireless devices to access the network. Which action should accomplish this task?

A.

Create the redirect ACL on the WLC and add it to the WLC policy

B.

Create the redirect ACL on the WLC and add it to the Cisco ISE policy.

C.

Create the redirect ACL on Cisco ISE and add it to the WLC policy

D.

Create the redirect ACL on Cisco ISE and add it to the Cisco ISE Policy

An adminístrator is migrating device administration access to Cisco ISE from the legacy TACACS+ solution that used only privilege 1 and 15 access levels. The organization requires more granular controls of the privileges and wants to customize access levels 2-5 to correspond with different roles and access needs. Besides defining a new shell profile in Cisco ISE. what must be done to accomplish this configuration?

A.

Enable the privilege levels in Cisco ISE

B.

Enable the privilege levels in the IOS devices.

C.

Define the command privileges for levels 2-5 in the IOS devices

D.

Define the command privileges for levels 2-5 in Cisco ISE

Which file extension is required when deploying Cisco ISE using a ZTP configuration file in Microsoft Hyper-V?

A.

.iso

B.

.txt

C.

.tar

D.

.img

Which two probes must be enabled for the ARP cache to function in the Cisco ISE profile service so that a user can reliably bind the IP address and MAC addresses of endpoints? (Choose two.)

A.

NetFlow

B.

SNMP

C.

HTTP

D.

DHCP

E.

RADIUS

A network security administrator needs a web authentication configuration when a guest user connects to the network with a wireless connection using these steps:

. An initial MAB request is sent to the Cisco ISE node.

. Cisco ISE responds with a URL redirection authorization profile if the user's MAC address is unknown in the endpoint identity store.

. The URL redirection presents the user with an AUP acceptance page when the user attempts to go to any URL.

Which authentication must the administrator configure on Cisco ISE?

A.

device registration WebAuth

B.

WLC with local WebAuth

C.

wired NAD with local WebAuth

D.

NAD with central WebAuth

Which two features should be used on Cisco ISE to enable the TACACS+ feature? (Choose two )

A.

External TACACS Servers

B.

Device Admin Service

C.

Device Administration License

D.

Server Sequence

E.

Command Sets

An engineer is starting to implement a wired 802.1X project throughout the campus. The task is for failed authentication to be logged to Cisco ISE and also have a minimal impact on the users. Which command must the engineer configure?

A.

authentication open

B.

pae dot1x enabled

C.

authentication host-mode multi-auth

D.

monitor-mode enabled

A Cisco ISE administrator needs to ensure that guest endpoint registrations are only valid for 1 day. When testing the guest policy flow, the administrator sees that the Cisco ISE does not delete the endpoint in the Guest Endpoints identity store after one day and allows access to the guest network after that period. Which configuration is causing this problem?

A.

The RADIUS policy set for guest access is set to allow repeated authentication of the same device.

B.

The length of access is set to 7 days in the Guest Portal Settings.

C.

The Endpoint Purge Policy is set to 30 days for guest devices.

D.

The Guest Account Purge Policy is set to 15 days.

Which three default endpoint identity groups does cisco ISE create? (Choose three)

A.

Unknown

B.

whitelist

C.

end point

D.

profiled

E.

blacklist