Pass the Cisco CCNP Security 300-715 Questions and answers with CertsForce

Viewing page 1 out of 9 pages
Viewing questions 1-10 out of questions
Questions # 1:

An administrator is attempting to join a new node to the primary Cisco ISE node, but receives the error message "Node is Unreachable". What is causing this error?

Options:

A.

The second node is a PAN node.


B.

No administrative certificate is available for the second node.


C.

The second node is in standalone mode.


D.

No admin privileges are available on the second node.


Expert Solution
Questions # 2:

A company is attempting to improve their BYOD policies and restrict access based on certain criteria. The company's subnets are organized by building. Which attribute should be used in order to gain access based on location?

Options:

A.

static group assignment


B.

IP address


C.

device registration status


D.

MAC address


Expert Solution
Questions # 3:

An administrator plans to use Cisco ISE to deploy posture policies to assess Microsoft Windows endpoints that run Cisco Secure Client. The administrator wants to minimize the occurrence of messages related to unknown posture profiles if Cisco ISE fails to determine the posture of the endpoint. Secure Client is deployed to all the endpoints. and all the required Cisco ISE authentication, authorization, and posture policy configurations were performed. Which action must be taken next to complete the configuration?

Options:

A.

Install the latest version of the Secure Client client on the endpoints.


B.

Enable Cisco ISE posture on Secure Client configuration.


C.

Configure a native supplicant on the endpoints to support the posture policies.


D.

Install the compliance module on the endpoints.


Expert Solution
Questions # 4:

What sends the redirect ACL that is configured in the authorization profile back to the Cisco WLC?

Options:

A.

Cisco-av-pair


B.

Class attribute


C.

Event


D.

State attribute


Expert Solution
Questions # 5:

Which two external identity stores support EAP-TLS and PEAP-TLS? (Choose two.)

Options:

A.

Active Directory


B.

RADIUS Token


C.

Internal Database


D.

RSA SecurlD


E.

LDAP


Expert Solution
Questions # 6:

An enterprise uses a separate PSN for each of its four remote sites. Recently, a user reported receiving an "EAP-TLS authentication failed" message when moving between remote sites. Which configuration must be applied on Cisco ISE?

Options:

A.

Use a third-party certificate on the network device.


B.

Add the device to all PSN nodes in the deployment.


C.

Renew the expired certificate on one of the PSN.


D.

Configure an authorization profile for the end users.


Expert Solution
Questions # 7:

An engineer is implementing Cisco ISE and needs to configure 802.1X. The port settings are configured for port-based authentication. Which command should be used to complete this configuration?

Options:

A.

dot1x pae authenticator


B.

dot1x system-auth-control


C.

authentication port-control auto


D.

aaa authentication dot1x default group radius


Expert Solution
Questions # 8:

A network engineer needs to deploy 802.1x using Cisco ISE in a wired network environment where thin clients download their system image upon bootup using PXE. For which mode must the switch ports be configured?

Options:

A.

closed


B.

restricted


C.

monitor


D.

low-impact


Expert Solution
Questions # 9:

A Cisco ISE administrator must restrict specific endpoints from accessing the network while in closed mode. The requirement is to have Cisco ISE centrally store the endpoints to restrict access from. What must be done to accomplish this task''

Options:

A.

Add each MAC address manually to a blocklist identity group and create a policy denying access


B.

Create a logical profile for each device's profile policy and block that via authorization policies.


C.

Create a profiling policy for each endpoint with the cdpCacheDeviceld attribute.


D.

Add each IP address to a policy denying access.


Expert Solution
Questions # 10:

What service can be enabled on the Cisco ISE node to identity the types of devices connecting to a network?

Options:

A.

MAB


B.

profiling


C.

posture


D.

central web authentication


Expert Solution
Viewing page 1 out of 9 pages
Viewing questions 1-10 out of questions