300-715 Exam Questions

Total 152 Questions

Last Updated Exam : 16-Dec-2024

Which port does Cisco ISE use for native supplicant provisioning of a Windows laptop?


A.

TCP 8909


B.

TCP 8905


C.

UDP 1812


D.

TCP 443





A.
  

TCP 8909



Which two task types are included in the Cisco ISE common tasks support for TACACS+ profiles?
(Choose two.)


A.

Firepower


B.

WLC


C.

IOS


D.

ASA


E.

Shell





B.
  

WLC



E.
  

Shell



TACACS+ ProfileTACACS+ profiles control the initial login session of the device administrator. A session refers to each individual authentication, authorization, or accounting request. A session authorization request to a network device elicits an ISE response. The response includes a token that is interpreted by the network device, which limits the commands that may be executed for the duration of a session. The authorization policy for a device administration access service can contain a single shell profile and multiple command sets. The TACACS+ profile definitions are split into two components:
✑ Common tasks ✑ Custom attributes
There are two views in the TACACS+ Profiles page (Work Centers > Device Administration
> Policy Elements > Results > TACACS Profiles)—Task Attribute View and Raw View. Common tasks can be entered using the Task Attribute View and custom attributes can be created in the Task Attribute View as well as the Raw View.
The Common Tasks section allows you to select and configure the frequently used attributes for a profile. The attributes that are included here are those defined by the TACACS+ protocol draft specifications. However, the values can be used in the authorization of requests from other services. In the Task Attribute View, the ISE administrator can set the privileges that will be assigned to the device administrator. The common task types are:
✑ Shell ✑ WLC ✑ Nexus ✑ Generic
The Custom Attributes section allows you to configure additional attributes. It provides a list of attributes that are not recognized by the Common Tasks section. Each definition consists of the attribute name, an indication of whether the attribute is mandatory or optional, and the value for the attribute. In the Raw View, you can enter the mandatory attributes using a equal to (=) sign between the attribute name and its value and optional attributes are entered using an asterisk (*) between the attribute name and its value. The attributes entered in the Raw View are reflected in the Custom Attributes section in the Task Attribute View and vice versa. The Raw View is also used to copy paste the attribute list (for example, another product's attribute list) from the clipboard onto ISE. Custom attributes can be defined for nonshell services.

Which interface-level command is needed to turn on 802 1X authentication?


A.

Dofl1x pae authenticator


B.

dot1x system-auth-control


C.

authentication host-mode single-host


D.

aaa server radius dynamic-author





A.
  

Dofl1x pae authenticator



What service can be enabled on the Cisco ISE node to identity the types of devices connecting to a network?


A.

MAB


B.

profiling


C.

posture


D.

central web authentication





B.
  

profiling



Which two features are available when the primary admin node is down and the secondary admin node has not been promoted? ()


A.

hotspot


B.

new AD user 802 1X authentication


C.

posture


D.

BYOD


E.

guest AUP





B.
  

new AD user 802 1X authentication



C.
  

posture



If a user reports a device lost or stolen, which portal should be used to prevent the device from accessing the network while still providing information about why the device is blocked?


A.

Client Provisioning


B.

Guest


C.

BYOD


D.

Blacklist





D.
  

Blacklist



https://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/Borderless_Networks/Unified_A ccess/BYOD_Design_Guide/Managing_Lost_or_Stolen_Device.html#90273
The Blacklist identity group is system generated and maintained by ISE to prevent access to lost or stolen devices. In this design guide, two authorization profiles are used to enforce the permissions for wireless and wired devices within the Blacklist:
✑ Blackhole WiFi Access ✑ Blackhole Wired Access

What must be configured on the Cisco ISE authentication policy for unknown MAC addresses/identities for successful authentication?


A.

pass


B.

reject


C.

drop


D.

continue





D.
  

continue



How is policy services node redundancy achieved in a deployment?


A.

by enabling VIP


B.

by utilizing RADIUS server list on the NAD


C.

by creating a node group


D.

by deploying both primary and secondary node





C.
  

by creating a node group



Which two events trigger a CoA for an endpoint when CoA is enabled globally for ReAuth? (Choose two.)


A.

endpoint marked as lost in My Devices Portal


B.

addition of endpoint to My Devices Portal


C.

endpoint profile transition from Apple-Device to Apple-iPhone


D.

endpoint profile transition from Unknown to Windows 10-Workstation


E.

updating of endpoint dACL.





C.
  

endpoint profile transition from Apple-Device to Apple-iPhone



D.
  

endpoint profile transition from Unknown to Windows 10-Workstation



What sends the redirect ACL that is configured in the authorization profile back to the Cisco WLC?


A.

Cisco-av-pair


B.

Class attribute


C.

Event


D.

State attribute





A.
  

Cisco-av-pair




Page 3 out of 16 Pages
Previous