Exams > Cisco > 300-715: Implementing and Configuring Cisco Identity Services Engine (300-715 SISE)
300-715: Implementing and Configuring Cisco Identity Services Engine (300-715 SISE)
Page 6 out of 19 pages Questions 51-60 out of 184 questions
Question#51

Which use case validates a change of authorization?

  • A. An endpoint that is disconnected from the network is discovered.
  • B. Endpoints are created through device registration for the guests.
  • C. An endpoint profiling policy is changed for authorization policy.
  • D. An authenticated, wired EAP-capable endpoint is discovered.
Discover Answer Hide Answer

C
Reference:
https://www.cisco.com/c/en/us/td/docs/security/ise/1-2/user_guide/ise_user_guide/ise_prof_pol.html

Question#52

Which default endpoint identity group does an endpoint that does not match any profile in Cisco ISE become a member of?

  • A. block list
  • B. unknown
  • C. allow list
  • D. profiled
  • E. endpoint
Discover Answer Hide Answer

B
Reference:
https://www.cisco.com/en/US/docs/security/ise/1.0/user_guide/ise10_man_identities.html

Question#53

What service can be enabled on the Cisco ISE node to identify the types of devices connecting to a network?

  • A. profiling
  • B. central web authentication
  • C. MAB
  • D. posture
Discover Answer Hide Answer

A
Reference:
https://www.cisco.com/c/en/us/td/docs/security/ise/2-1/admin_guide/b_ise_admin_guide_21/b_ise_admin_guide_20_chapter_010100.html

Question#54

Which two probes must be enabled for the ARP cache to function in the Cisco ISE profiling service so that a user can reliably bind the IP addresses and MAC addresses of endpoints? (Choose two.)

  • A. SNMP
  • B. HTTP
  • C. RADIUS
  • D. DHCP
  • E. NetFlow
Discover Answer Hide Answer

CD
Reference:
https://www.cisco.com/c/en/us/td/docs/security/ise/2-1/admin_guide/b_ise_admin_guide_21/b_ise_admin_guide_20_chapter_010100.html

Question#55

Which two events trigger a CoA for an endpoint when CoA is enabled globally for ReAuth? (Choose two.)

  • A. addition of endpoint to My Devices Portal
  • B. endpoint marked as lost in My Devices Portal
  • C. updating of endpoint dACL
  • D. endpoint profile transition from Apple-device to Apple-iPhone
  • E. endpoint profile transition from Unknown to Windows10-Workstation
Discover Answer Hide Answer

DE

Question#56

What is a requirement for Feed Service to work?

  • A. TCP port 8080 must be opened between Cisco ISE and the feed server.
  • B. Cisco ISE has access to an internal server to download feed update.
  • C. Cisco ISE has a base license.
  • D. Cisco ISE has Internet access to download feed update.
Discover Answer Hide Answer

B

Question#57

What is a method for transporting security group tags throughout the network?

  • A. by embedding the security group tag in the 802.1Q header
  • B. by the Security Group Tag Exchange Protocol
  • C. by enabling 802.1AE on every network device
  • D. by embedding the security group tag in the IP header
Discover Answer Hide Answer

B

Question#58

An engineer is configuring a virtual Cisco ISE deployment and needs each persona to be on a different node.
Which persona should be configured with the largest amount of storage in this environment?

  • A. Monitoring and Troubleshooting
  • B. Policy Services
  • C. Primary Administration
  • D. Platform Exchange Grid
Discover Answer Hide Answer

A

Question#59

In a standalone Cisco ISE deployment, which two personas are configured on a node? (Choose two.)

  • A. subscriber
  • B. primary
  • C. administration
  • D. publisher
  • E. policy service
Discover Answer Hide Answer

CE

Question#60

A network engineer must enforce access control using special tags, without re-engineering the network design.
Which feature should be configured to achieve this in a scalable manner?

  • A. RBAC
  • B. dACL
  • C. SGT
  • D. VLAN
Discover Answer Hide Answer

C
Reference:
https://www.cisco.com/c/dam/en/us/solutions/collateral/enterprise-networks/trustsec/branch-segmentation.pdf

chevron rightPrevious Nextchevron right