300-715 Exam Questions

Total 152 Questions

Last Updated Exam : 16-Dec-2024

During BYOD flow, from where does a Microsoft Windows PC download the Network Setup Assistant?


A.

Cisco App Store


B.

Microsoft App Store


C.

Cisco ISE directly


D.

Native OTA functionality





C.
  

Cisco ISE directly



Which portal is used to customize the settings for a user to log in and download the compliance module?


A.

Client Profiling


B.

Client Endpoint


C.

Client Provisioning


D.

Client Guest





C.
  

Client Provisioning



Which two fields are available when creating an endpoint on the context visibility page of Cisco IS? (Choose two )


A.

Policy Assignment


B.

Endpoint Family


C.

Identity Group Assignment


D.

Security Group Tag


E.

IP Address





A.
  

Policy Assignment



C.
  

Identity Group Assignment



Which term refers to an endpoint agent that tries to join an 802 1X-enabled network?


A.

EAP server


B.

supplicant


C.

client


D.

authenticator





D.
  

authenticator



Which permission is common to the Active Directory Join and Leave operations?


A.

Create a Cisco ISE machine account in the domain if the machine account does not already exist


B.

Remove the Cisco ISE machine account from the domain.


C.

Set attributes on the Cisco ISE machine account


D.

Search Active Directory to see if a Cisco ISE machine account already ex.sts.





D.
  

Search Active Directory to see if a Cisco ISE machine account already ex.sts.



In which two ways can users and endpoints be classified for TrustSec?
(Choose Two.)


A.

VLAN


B.

SXP


C.

dynamic


D.

QoS


E.

SGACL





A.
  

VLAN



E.
  

SGACL



What are two components of the posture requirement when configuring Cisco ISE posture? (Choose two)


A.

updates


B.

remediation actions


C.

Client Provisioning portal


D.

conditions


E.

access policy





B.
  

remediation actions



D.
  

conditions



What is a method for transporting security group tags throughout the network?


A.

by enabling 802.1AE on every network device


B.

by the Security Group Tag Exchange Protocol


C.

by embedding the security group tag in the IP header


D.

by embedding the security group tag in the 802.1Q header





B.
  

by the Security Group Tag Exchange Protocol



What is a characteristic of the UDP protocol?


A.

UDP can detect when a server is down


B.

UDP offers best-effort delivery


C.

UDP can detect when a server is slow


D.

UDP offers information about a non-existent server





B.
  

UDP offers best-effort delivery



Which statement about configuring certificates for BYOD is true?


A.

An Android endpoint uses EST, whereas other operating systems use SCEP for enrollment


B.

The SAN field is populated with the end user name.


C.

An endpoint certificate is mandatory for the Cisco ISE BYOD


D.

The CN field is populated with the endpoint host name





C.
  

An endpoint certificate is mandatory for the Cisco ISE BYOD




Page 2 out of 16 Pages
Previous