Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: cramtreat

300-715 Implementing and Configuring Cisco Identity Services Engine (SISE) v4.0 (300-715 SISE) Questions and Answers

Questions 4

A network engineer is configuring guest access and notices that when a guest user registers a second device for access, the first device loses access What must be done to ensure that both devices for a particular user are able to access the guest network simultaneously?

Options:

A.

Configure the sponsor group to increase the number of logins.

B.

Use a custom portal to increase the number of logins

C.

Modify the guest type to increase the number of maximum devices

D.

Create an Adaptive Network Control policy to increase the number of devices

Buy Now
Questions 5

What does a fully distributed Cisco ISE deployment include?

Options:

A.

PAN and PSN on the same node while MnTs are on their own dedicated nodes.

B.

PAN and MnT on the same node while PSNs are on their own dedicated nodes.

C.

All Cisco ISE personas on their own dedicated nodes.

D.

All Cisco ISE personas are sharing the same node.

Buy Now
Questions 6

An engineer is deploying a new guest WLAN for a company. The company wants this WLAN to use a sponsored guest portal for secure guest access. The wireless LAN controller must direct the guests to a web page on Cisco ISE for authentication. Which type of authentication must be configured for the guest portal in Cisco ISE?

Options:

A.

EWA

B.

DWA

C.

CWA

D.

web portal

Buy Now
Questions 7

What is the difference between how RADIUS and TACACS+ handle encryption?

Options:

A.

RADIUS encrypts only the username and password fields, whereas TACACS+ encrypts the entire packet.

B.

RADIUS encrypts the entire packet, whereas TACACS+ only encrypts the password field.

C.

RADIUS only encrypts the password field, whereas TACACS+ encrypts the payload of packet.

D.

RADIUS encrypts the entire packet, whereas TACACS+ encrypts only the username and password fields.

Buy Now
Questions 8

An administrator needs to connect ISE to Active Directory as an external authentication source and allow the proper ports through the firewall. Which two ports should be opened to accomplish this task? (Choose two)

Options:

A.

TELNET 23

B.

LDAP 389

C.

HTTP 80

D.

HTTPS 443

E.

MSRPC 445

Buy Now
Questions 9

An engineer is configuring Cisco ISE to reprofile endpoints based only on new requests of INIT-REBOOT and SELECTING message types. Which probe should be used to accomplish this task?

Options:

A.

MMAP

B.

DNS

C.

DHCP

D.

RADIUS

Buy Now
Questions 10

An engineer needs to export a file in CSV format, encrypted with the password C1$c0438563935, and contains users currently configured in Cisco ISE. Drag and drop the steps from the left into the sequence on the right to complete this task.

Options:

Buy Now
Questions 11

Which protocol must be allowed for a BYOD device to access the BYOD portal?

Options:

A.

HTTP

B.

SMTP

C.

HTTPS

D.

SSH

Buy Now
Questions 12

Refer to the exhibit Which component must be configured to apply the SGACL?

Options:

A.

egress router

B.

host

C.

secure server

D.

ingress router

Buy Now
Questions 13

A network administrator adds network access devices to Cisco ISE. After a security breach, the management team mandates that all network devices must comply with certain standards. All network devices must authenticate through Cisco ISE. Some devices use nondefault CoA ports.

What must be configured in Cisco ISE?

Options:

A.

Network device profile with a port specified

B.

Network access manager with a port specified

C.

Network device group with a port specified

D.

Network device with a port specified

Buy Now
Questions 14

An administrator is attempting to replace the built-in self-signed certificates on a Cisco ISE appliance. The CA is requesting some information about the appliance in order to sign the new certificate. What must be done in order to provide the CA this information?

Options:

A.

Install the Root CA and intermediate CA.

B.

Generate the CSR.

C.

Download the intermediate server certificate.

D.

Download the CA server certificate.

Buy Now
Questions 15

A network engineer is configuring Cisco TrustSec and needs to ensure that the Security Group Tag is being transmitted between two devices Where in the Layer 2 frame should this be verified?

Options:

A.

CMD filed

B.

802.1Q filed

C.

Payload

D.

802.1 AE header

Buy Now
Questions 16

Which two endpoint compliance statuses are possible? (Choose two.)

Options:

A.

unknown

B.

known

C.

invalid

D.

compliant

E.

valid

Buy Now
Questions 17

Select and Place

Options:

Buy Now
Questions 18

An engineer is configuring web authentication and needs to allow specific protocols to permit DNS traffic. Which type of access list should be used for this configuration?

Options:

A.

reflexive ACL

B.

extended ACL

C.

standard ACL

D.

numbered ACL

Buy Now
Questions 19

When setting up profiling in an environment using Cisco ISE for network access control, an organization must use non-proprietary protocols for collecting the information at layer 2. Which two probes will provide this information without forwarding SPAN packets to Cisco ISE? {Choose two.)

Options:

A.

DHCP SPAN probe

B.

SNMP query probe

C.

NetFlow probe

D.

RADIUS probe

E.

DNS probe

Buy Now
Questions 20

Which two external identity stores are supported by Cisco ISE for password types? (Choose two.)

Options:

A.

LDAP

B.

OBDC

C.

RADIUS Token Server

D.

TACACS+ Token Server

E.

SOL

Buy Now
Questions 21

Which port does Cisco ISE use for native supplicant provisioning of a Windows laptop?

Options:

A.

TCP 8909

B.

TCP 8905

C.

UDP 1812

D.

TCP 443

Buy Now
Questions 22

An engineer is configuring web authentication using non-standard ports and needs the switch to redirect traffic to the correct port. Which command should be used to accomplish this task?

Options:

A.

permit tcp any any eq

B.

aaa group server radius proxy

C.

ip http port

D.

aaa group server radius

Buy Now
Questions 23

Which Cisco ISE deployment model provides redundancy by having every node in the deployment configured with the Administration. Policy Service, and Monitoring personas to protect from a complete node failure?

Options:

A.

distributed

B.

dispersed

C.

two-node

D.

hybrid

Buy Now
Questions 24

What must match between Cisco ISE and the network access device to successfully authenticate endpoints?

Options:

A.

SNMP version

B.

shared secret

C.

certificate

D.

profile

Buy Now
Questions 25

A network engineer must create a guest portal for wireless guests on Cisco ISE. The guest users must not be able to create accounts; however, the portal should require a username and password to connect. Which portal type must be created in Cisco ISE to meet the requirements?

Options:

A.

Sponsored Guest Access

B.

Self Registered Guest Access

C.

Custom Guest Portal

D.

Hotspot Guest Access

Buy Now
Questions 26

An administrator must block access to BYOD endpoints that were onboarded without a certificate and have been reported as stolen in the Cisco ISE My Devices Portal. Which condition must be used when configuring an authorization policy that sets DenyAccess permission?

Options:

A.

Endpoint Identity Group is Blocklist, and the BYOD state is Registered.

B.

Endpoint Identify Group is Blocklist, and the BYOD state is Pending.

C.

Endpoint Identity Group is Blocklist, and the BYOD state is Lost.

D.

Endpoint Identity Group is Blocklist, and the BYOD state is Reinstate.

Buy Now
Questions 27

What allows an endpoint to obtain a digital certificate from Cisco ISE during a BYOD flow?

Options:

A.

Network Access Control

B.

My Devices Portal

C.

Application Visibility and Control

D.

Supplicant Provisioning Wizard

Buy Now
Questions 28

What is a method for transporting security group tags throughout the network?

Options:

A.

by enabling 802.1AE on every network device

B.

by the Security Group Tag Exchange Protocol

C.

by embedding the security group tag in the IP header

D.

by embedding the security group tag in the 802.1Q header

Buy Now
Questions 29

Which two default endpoint identity groups does Cisco ISE create? (Choose two )

Options:

A.

block list

B.

endpoint

C.

profiled

D.

allow list

E.

unknown

Buy Now
Questions 30

An engineer is assigned to enhance security across the campus network. The task is to enable MAB across all access switches in the network. Which command must be entered on the switch to enable MAB?

Options:

A.

Switch(config-if)# mab

B.

Switch(config)# mab

C.

Switch# authentication port-control auto

D.

Switch(config)# authentication port-control auto

Buy Now
Questions 31

A network administrator is setting up wireless guest access and has been unsuccessful in testing client access. The endpoint is able to connect to the SSID but is unable to grant access to the guest network through the guest portal. What must be done to identify the problem?

Options:

A.

Use context visibility to verify posture status.

B.

Use the endpoint ID to execute a session trace.

C.

Use the identity group to validate the authorization rules.

D.

Use traceroute to ensure connectivity.

Buy Now
Questions 32

A Cisco ISE server sends a CoA to a NAD after a user logs in successfully using CWA Which action does the CoA perform?

Options:

A.

It terminates the client session

B.

It applies the downloadable ACL provided in the CoA

C.

It applies new permissions provided in the CoA to the client session.

D.

It triggers the NAD to reauthenticate the client

Buy Now
Questions 33

The IT manager wants to provide different levels of access to network devices when users authenticate using TACACS+. The company needs specific commands to be allowed based on the Active Directory group membership of the different roles within the IT department. The solution must minimize the number of objects created in Cisco ISE. What must be created to accomplish this task?

Options:

A.

one shell profile and one command set

B.

multiple shell profiles and one command set

C.

one shell profile and multiple command sets

D.

multiple shell profiles and multiple command sets

Buy Now
Questions 34

What is the default port used by Cisco ISE for NetFlow version 9 probe?

Options:

A.

UDP 9996

B.

UDP 9997

C.

UDP 9998

D.

UDP 9999

Buy Now
Questions 35

A user changes the status of a device to stolen in the My Devices Portal of Cisco ISE. The device was originally onboarded in the BYOD wireless Portal without a certificate. The device is found later, but the user cannot re-onboard the device because Cisco ISE assigned the device to the Blocklist endpoint identity group. What must the user do in the My Devices Portal to resolve this issue?

Options:

A.

Manually remove the device from the Blocklist endpoint identity group.

B.

Change the device state from Stolen to Not Registered.

C.

Change the BYOD registration attribute of the device to None.

D.

Delete the device, and then re-add the device.

Buy Now
Questions 36

Which two roles are taken on by the administration person within a Cisco ISE distributed environment? (Choose two.)

Options:

A.

backup

B.

secondary

C.

standby

D.

primary

E.

active

Buy Now
Questions 37

A policy is being created in order to provide device administration access to the switches on a network. There is a requirement to ensure that if the session is not actively being used, after 10 minutes, it will be disconnected. Which task must be configured in order to meet this requirement?

Options:

A.

session timeout

B.

idle time

C.

monitor

D.

set attribute as

Buy Now
Questions 38

What is a function of client provisioning?

Options:

A.

It ensures an application process is running on the endpoint.

B.

It checks a dictionary' attribute with a value.

C.

It ensures that endpoints receive the appropriate posture agents

D.

It checks the existence date and versions of the file on a client.

Buy Now
Questions 39

When planning for the deployment of Cisco ISE, an organization's security policy dictates that they must use network access authentication via RADIUS. It also states that the deployment provide an adequate amount of security and visibility for the hosts on the network. Why should the engineer configure MAB in this situation?

Options:

A.

The Cisco switches only support MAB.

B.

MAB provides the strongest form of authentication available.

C.

The devices in the network do not have a supplicant.

D.

MAB provides user authentication.

Buy Now
Questions 40

Refer to the exhibit. In which scenario does this switch configuration apply?

Options:

A.

when allowing a hub with multiple clients connected

B.

when passing IP phone authentication

C.

when allowing multiple IP phones to be connected

D.

when preventing users with hypervisor

Buy Now
Questions 41

Which two components are required for creating a Native Supplicant Profile within a BYOD flow? (Choose two)

Options:

A.

Windows Settings

B.

Connection Type

C.

iOS Settings

D.

Redirect ACL

E.

Operating System

Buy Now
Questions 42

During a 802 1X deployment, an engineer must identify failed authentications without causing problems for the connected endpoint. Which command will successfully achieve this''

Options:

A.

dot1x system-auth-control

B.

dot1x pae authenticator

C.

authentication open

D.

authentication port-control auto

Buy Now
Questions 43

An engineer is enabling a newly configured wireless SSID for tablets and needs visibility into which other types of devices are connecting to it. What must be done on the Cisco WLC to provide this information to Cisco ISE9

Options:

A.

enable IP Device Tracking

B.

enable MAC filtering

C.

enable Fast Transition

D.

enable mDNS snooping

Buy Now
Questions 44

An administrator is manually adding a device to a Cisco ISE identity group to ensure that it is able to access the network when needed without authentication Upon testing, the administrator notices that the device never hits the correct authorization policy line using the condition EndPoints LogicalProfile EQUALS static_list Why is this occurring?

Options:

A.

The dynamic logical profile is overriding the statically assigned profile

B.

The device is changing identity groups after profiling instead ot remaining static

C.

The logical profile is being statically assigned instead of the identity group

D.

The identity group is being assigned instead of the logical profile

Buy Now
Questions 45

Which permission is common to the Active Directory Join and Leave operations?

Options:

A.

Create a Cisco ISE machine account in the domain if the machine account does not already exist

B.

Remove the Cisco ISE machine account from the domain.

C.

Set attributes on the Cisco ISE machine account

D.

Search Active Directory to see if a Cisco ISE machine account already ex.sts.

Buy Now
Questions 46

An engineer is implementing Cisco ISE and needs to configure 802.1X. The port settings are configured for port-based authentication. Which command should be used to complete this configuration?

Options:

A.

dot1x pae authenticator

B.

dot1x system-auth-control

C.

authentication port-control auto

D.

aaa authentication dot1x default group radius

Buy Now
Questions 47

Which file extension is required when deploying Cisco ISE using a ZTP configuration file in Microsoft Hyper-V?

Options:

A.

.iso

B.

.txt

C.

.tar

D.

.img

Buy Now
Questions 48

Which RADIUS attribute is used to dynamically assign the inactivity active timer for MAB users from the Cisco ISE node'?

Options:

A.

radius-server timeout

B.

session-timeout

C.

idle-timeout

D.

termination-action

Buy Now
Questions 49

An engineer is starting to implement a wired 802.1X project throughout the campus. The task is to ensure that the authentication procedure is disabled on the ports but still allows all endpoints to connect to the network. Which port-control option must the engineer configure?

Options:

A.

pae-disabled

B.

force-unauthorized

C.

auto

D.

force-authorized

Buy Now
Questions 50

Which statement about configuring certificates for BYOD is true?

Options:

A.

An Android endpoint uses EST, whereas other operating systems use SCEP for enrollment

B.

The SAN field is populated with the end user name.

C.

An endpoint certificate is mandatory for the Cisco ISE BYOD

D.

The CN field is populated with the endpoint host name

Buy Now
Questions 51

When configuring Active Directory groups, what does the Cisco ISE use to resolve ambiguous group names?

Options:

A.

MIB

B.

TGT

C.

OMAB

D.

SID

Buy Now
Questions 52

An administrator is configuring sponsored guest access using Cisco ISE Access must be restricted to the sponsor portal to ensure that only necessary employees can issue sponsored accounts and employees must be classified to do so What must be done to accomplish this task?

Options:

A.

Configure an identity-based access list in Cisco ISE to restrict the users allowed to login

B.

Edit the sponsor portal to only accept members from the selected groups

C.

Modify the sponsor groups assigned to reflect the desired user groups

D.

Create an authorization rule using the Guest Flow condition to authorize the administrators

Buy Now
Questions 53

An engineer must use Cisco ISE to provide network access to endpoints that cannot support 802.1X. The endpoint MAC addresses must be allowlisted by configuring an endpoint identity group. These configurations were performed:

    Configured an identity group named allowlist

    Configured the endpoints to use the MAC address of incompatible 802.1X devices

    Added the endpoints to the allowlist identity group

    Configured an authentication policy for MAB users

What must be configured?

Options:

A.

Authorization profile that has the PermitAccess permission and matches the allowlist identity group

B.

Authentication profile that has the PermitAccess permission and matches the allowlist identity group

C.

Authorization policy that has the PermitAccess permission and matches the allowlist identity group

D.

Logical profile that matches the allowlist identity group based on the configured policy

Buy Now
Questions 54

An organization wants to standardize the 802 1X configuration on their switches and remove static ACLs on the switch ports while allowing Cisco ISE to communicate to the switch what access to provide What must be configured to accomplish this task?

Options:

A.

security group tag within the authorization policy

B.

extended access-list on the switch for the client

C.

port security on the switch based on the client's information

D.

dynamic access list within the authorization profile

Buy Now
Questions 55

A network administrator is configuring a secondary cisco ISE node from the backup configuration of the primary cisco ISE node to create a high availability pair The Cisco ISE CA certificates and keys must be manually backed up from the primary Cisco ISE and copied into the secondary Cisco ISE Which command most be issued for this to work?

Options:

A.

copy certificate Ise

B.

application configure Ise

C.

certificate configure Ise

D.

Import certificate Ise

Buy Now
Questions 56

An administrator needs to allow guest devices to connect to a private network without requiring usernames and passwords. Which two features must be configured to allow for this? (Choose two.)

Options:

A.

hotspot guest portal

B.

device registration WebAuth

C.

central WebAuth

D.

local WebAuth

E.

self-registered guest portal

Buy Now
Questions 57

An organization is implementing Cisco ISE posture services and must ensure that a host-based firewall is in place on every Windows and Mac computer that attempts to access the network They have multiple vendors’ firewall applications for their devices, so the engineers creating the policies are unable to use a specific application check in order to validate the posture for this What should be done to enable this type of posture check?

Options:

A.

Use the file registry condition to ensure that the firewal is installed and running appropriately.

B.

Use a compound condition to look for the Windows or Mac native firewall applications.

C.

Enable the default firewall condition to check for any vendor firewall application.

D.

Enable the default application condition to identify the applications installed and validade the firewall app.

Buy Now
Questions 58

Which are two characteristics of TACACS+? (Choose two)

Options:

A.

It uses TCP port 49.

B.

It combines authorization and authentication functions.

C.

It separates authorization and authentication functions.

D.

It encrypts the password only.

E.

It uses UDP port 49.

Buy Now
Questions 59

An engineer is configuring the remote access VPN to use Cisco ISE for AAA and needs to conduct posture checks on the connecting endpoints After the endpoint connects, it receives its initial authorization result and continues onto the compliance scan What must be done for this AAA configuration to allow compliant access to the network?

Options:

A.

Configure the posture authorization so it defaults to unknown status

B.

Fix the CoA port number

C.

Ensure that authorization only mode is not enabled

D.

Enable dynamic authorization within the AAA server group

Buy Now
Questions 60

Which RADIUS attribute is used to dynamically assign the Inactivity active timer for MAB users from the Cisco ISE node?

Options:

A.

session timeout

B.

idle timeout

C.

radius-server timeout

D.

termination-action

Buy Now
Questions 61

An administrator is configuring posture with Cisco ISE and wants to check that specific services are present on the workstations that are attempting to access the network. What must be configured to accomplish this goal?

Options:

A.

Create a registry posture condition using a non-OPSWAT API version.

B.

Create an application posture condition using a OPSWAT API version.

C.

Create a compound posture condition using a OPSWAT API version.

D.

Create a service posture condition using a non-OPSWAT API version.

Buy Now
Questions 62

Drag the Cisco ISE node types from the left onto the appropriate purposes on the right.

Options:

Buy Now
Questions 63

An administrator is adding network devices for a new medical building into Cisco ISE. These devices must be in a network device group that is identifying them as "Medical Switch" so that the policies can be made separately for the endpoints connecting through them. Which configuration item must be changed in the network device within Cisco ISE to accomplish this goal?

Options:

A.

Change the device type to Medical Switch.

B.

Change the device profile to Medical Switch.

C.

Change the model name to Medical Switch.

D.

Change the device location to Medical Switch.

Buy Now
Questions 64

Which two ports do network devices typically use for CoA? (Choose two)

Options:

A.

443

B.

19005

C.

8080

D.

3799

E.

1700

Buy Now
Questions 65

An engineer is testing Cisco ISE policies in a lab environment with no support for a deployment server. In order to push supplicant profiles to the workstations for testing, firewall ports will need to be opened. From which Cisco ISE persona should this traffic be originating?

Options:

A.

monitoring

B.

policy service

C.

administration

D.

authentication

Buy Now
Questions 66

An organization is migrating its current guest network to Cisco ISE and has 1000 guest users in the current database There are no resources to enter this information into the Cisco ISE database manually. What must be done to accomplish this task effciently?

Options:

A.

Use a CSV file to import the guest accounts

B.

Use SOL to link me existing database to Ctsco ISE

C.

Use a JSON fie to automate the migration of guest accounts

D.

Use an XML file to change the existing format to match that of Cisco ISE

Buy Now
Questions 67

What are two differences of TACACS+ compared to RADIUS? (Choose two.)

Options:

A.

TACACS+ uses a connectionless transport protocol, whereas RADIUS uses a connection-oriented transport protocol.

B.

TACACS+ encrypts the full packet payload, whereas RADIUS only encrypts the password.

C.

TACACS+ only encrypts the password, whereas RADIUS encrypts the full packet payload.

D.

TACACS+ uses a connection-oriented transport protocol, whereas RADIUS uses a connectionless transport protocol.

E.

TACACS+ supports multiple sessions per user, whereas RADIUS supports one session per user.

Buy Now
Questions 68

What does the dot1x system-auth-control command do?

Options:

A.

causes a network access switch not to track 802.1x sessions

B.

globally enables 802.1x

C.

enables 802.1x on a network access device interface

D.

causes a network access switch to track 802.1x sessions

Buy Now
Questions 69

An engineer is configuring a dedicated SSID for onboarding devices. Which SSID type accomplishes this configuration?

Options:

A.

dual

B.

hidden

C.

broadcast

D.

guest

Buy Now
Questions 70

What is a difference between RADIUS and TACACS+?

Options:

A.

RADIUS uses connection-oriented transport, and TACACS+ uses best-effort delivery.

B.

RADIUS offers multiprotocol support, and TACACS+ supports only IP traffic.

C.

RADIUS combines authentication and authorization functions, and TACACS+ separates them.

D.

RADIUS supports command accounting, and TACACS+ does not.

Buy Now
Questions 71

An engineer is configuring sponsored guest access and needs to limit each sponsored guest to a maximum of two devices. There are other guest services in production that rely on the default guest types. How should this configuration change be made without disrupting the other guest services currently offering three or more guest devices per user?

Options:

A.

Create an ISE identity group to add users to and limit the number of logins via the group configuration.

B.

Create a new guest type and set the maximum number of devices sponsored guests can register

C.

Create an LDAP login for each guest and tag that in the guest portal for authentication.

D.

Create a new sponsor group and adjust the settings to limit the devices for each guest.

Buy Now
Questions 72

A company manager is hosting a conference. Conference participants must connect to an open guest SSID and only use a preassigned code that they enter into the guest portal prior to gaining access to the network. How should the manager configure Cisco ISE to accomplish this goal?

Options:

A.

Create entries in the guest identity group for all participants.

B.

Create an access code to be entered in the AUP page.

C.

Create logins for each participant to give them sponsored access.

D.

Create a registration code to be entered on the portal splash page.

Buy Now
Questions 73

An engineer needs to configure a new certificate template in the Cisco ISE Internal Certificate Authority to prevent BYOD devices from needing to re-enroll when their MAC address changes. Which option must be selected in the Subject Alternative Name field?

Options:

A.

Common Name and GUID

B.

MAC Address and GUID

C.

Distinguished Name

D.

Common Name

Buy Now
Questions 74

An engineer is tasked with placing a guest access anchor controller in the DMZ. Which two ports or port sets must be opened up on the firewall to accomplish this task? (Choose two.)

Options:

A.

UDP port 1812 RADIUS

B.

TCP port 161

C.

TCP port 514

D.

UDP port 79

E.

UDP port 16666

Buy Now
Questions 75

An engineer has been tasked with standing up a new guest portal for customers that are waiting in the lobby. There is a requirement to allow guests to use their social media logins to access the guest network to appeal to more customers What must be done to accomplish this task?

Options:

A.

Create a sponsor portal to allow guests to create accounts using their social media logins.

B.

Create a sponsored guest portal and enable social media in the external identity sources.

C.

Create a self-registered guest portal and enable the feature for social media logins

D.

Create a hotspot portal and enable social media login for network access

Buy Now
Questions 76

An engineer must organize endpoints in a Cisco ISE identity management store to improve the operational management of IP phone endpoints. The endpoints must meet these requirements:

• classify endpoints for finance, sales, and marketing departments

• tag each endpoint as profiled

Which action organizes the endpoints?

Options:

A.

Create an endpoint identity group for each department with the IP phone parent group.

B.

Create an endpoint identity group for each department with the profiled parent group.

C.

Add a tag for the endpoints of each department and add an endpoint to profiled group.

D.

Add a tag for the endpoints of each department and use the identity group filter.

Buy Now
Questions 77

Refer to the exhibit.

A network engineers configuring the switch to accept downloadable ACLs from a Cisco ISC server Which two commands should be run to complete the configuration? (Choose two)

Options:

A.

aaa authorization auth-proxy default group radius

B.

radius server vsa sand authentication

C.

radius-server attribute 8 include-in-access-req

D.

ip device tracking

E.

dot1x system-auth-control

Buy Now
Questions 78

An engineer wants to learn more about Cisco ISE and deployed a new lab with two nodes. Which two persona configurations allow the engineer to successfully test redundancy of a failed node? (Choose two.)

Options:

A.

Configure one of the Cisco ISE nodes as the Health Check node.

B.

Configure both nodes with the PAN and MnT personas only.

C.

Configure one of the Cisco ISE nodes as the primary PAN and MnT personas and the other as the secondary.

D.

Configure both nodes with the PAN, MnT, and PSN personas.

E.

Configure one of the Cisco ISE nodes as the primary PAN and PSN personas and the other as the secondary.

Buy Now
Questions 79

A Cisco ISE administrator needs to ensure that guest endpoint registrations are only valid for 1 day. When testing the guest policy flow, the administrator sees that the Cisco ISE does not delete the endpoint in the Guest Endpoints identity store after one day and allows access to the guest network after that period. Which configuration is causing this problem?

Options:

A.

The RADIUS policy set for guest access is set to allow repeated authentication of the same device.

B.

The length of access is set to 7 days in the Guest Portal Settings.

C.

The Endpoint Purge Policy is set to 30 days for guest devices.

D.

The Guest Account Purge Policy is set to 15 days.

Buy Now
Questions 80

An administrator has added a new Cisco ISE PSN to their distributed deployment. Which two features must the administrator enable to accept authentication requests and profile the endpoints correctly, and add them to their respective endpoint identity groups? (Choose two )

Options:

A.

Session Services

B.

Endpoint Attribute Filter

C.

Posture Services

D.

Profiling Services

E.

Radius Service

Buy Now
Questions 81

What is an advantage of TACACS+ versus RADIUS authentication when reviewing reports in Cisco ISE?

Options:

A.

TACACS+ reduces authentication latency, and RADIUS increases latency by adding additional packet headers.

B.

TACACS+ performs secure communication with IPsec, and RADIUS uses DTLS encryption.

C.

TACACS+ provides command accounting, and RADIUS combines authentication and authorization.

D.

TACACS+ uses SSL certificates, and RADIUS does not have encryption.

Buy Now
Questions 82

On which port does Cisco ISE present the Admin certificate for posture and client provisioning?

Options:

A.

TCP/8000

B.

TCP/8080

C.

TCP/8905

D.

TCP/8999

Buy Now
Questions 83

An organization wants to improve their BYOD processes to have Cisco ISE issue certificates to the BYOD endpoints. Currently, they have an active certificate authority and do not want to replace it with Cisco ISE. What must be configured within Cisco ISE to accomplish this goal?

Options:

A.

Create a certificate signing request and have the root certificate authority sign it.

B.

Add the root certificate authority to the trust store and enable it for authentication.

C.

Create an SCEP profile to link Cisco ISE with the root certificate authority.

D.

Add an OCSP profile and configure the root certificate authority as secondary.

Buy Now
Questions 84

An engineer is deploying Cisco ISE in a network that contains an existing Cisco Secure Firewall ASA. The customer requested that Cisco TrustSec be configured so that Cisco ISE and the firewall can share SGT information.

Which protocol must be configured on Cisco ISE to meet the requirement?

Options:

A.

PAC

B.

SXP

C.

RADIUS

D.

pxGrid

Buy Now
Questions 85

Drag the steps to configure a Cisco ISE node as a primary administration node from the left into the correct order on the night.

Options:

Buy Now
Questions 86

Wireless network users authenticate to Cisco ISE using 802.1X through a Cisco Catalyst switch. An engineer must create an updated configuration to assign a security group tag to the user's traffic using inline tagging to prevent unauthenticated users from accessing a restricted server. The configurations were performed:

• configured Cisco ISE as a Cisco TrustSec AAA server

• configured the switch as a RADIUS device in Cisco ISE

• configured the wireless LAN controller as a TrustSec device in Cisco ISE

• created a security group tog for the wireless users

• created a certificate authentication profile

■ created an identity source sequence

• assigned an appropriate security group tag to the wireless users

• defined security group access control lists to specify an egress policy

• enforced the access control lists on the TrustSec policy matrix in Cisco ISE

• configured TrustSec on the switch

• configured TrustSec on the wireless LAN controller

Which two actions must be taken to complete the configuration? (Choose two.)

Options:

A.

Configure Security Group Tag Exchange Protocol on the wireless LAN controller.

B.

Configure Security Group Tag Exchange Protocol to distribute IP to security group tags on Cisco ISE.

C.

Configure inline tag propagation on the switch and wireless LAN controller.

D.

Create static IP-to-SGT mapping for the restricted web server.

E.

Configure Security Group Tag Exchange Protocol on the switch.

Buy Now
Questions 87

Which two actions must be verified to confirm that the internet is accessible via guest access when configuring a guest portal? (Choose two.)

Options:

A.

The guest device successfully associates with the correct SSID.

B.

The guest user gets redirected to the authentication page when opening a browser.

C.

The guest device has internal network access on the WLAN.

D.

The guest device can connect to network file shares.

E.

Cisco ISE sends a CoA upon successful guest authentication.

Buy Now
Questions 88

Refer to the exhibit.

An engineer is configuring a client but cannot authenticate to Cisco ISE During troubleshooting, the show authentication sessions command was issued to display the authentication status of each port Which command gives additional information to help identify the problem with the authentication?

Options:

A.

show authentication sessions

B.

show authentication sessions Interface Gil/0/1 output

C.

show authentication sessions interface Gi1/0/1 details

D.

show authentication sessions output

Buy Now
Exam Code: 300-715
Exam Name: Implementing and Configuring Cisco Identity Services Engine (SISE) v4.0 (300-715 SISE)
Last Update: Aug 17, 2025
Questions: 295
300-715 pdf

300-715 PDF

$33.25  $94.99
300-715 Engine

300-715 Testing Engine

$38.5  $109.99
300-715 PDF + Engine

300-715 PDF + Testing Engine

$50.75  $144.99