Pass the Cisco CCNP Security 300-715 Questions and answers with CertsForce

Viewing page 4 out of 8 pages
Viewing questions 31-40 out of questions
Questions # 31:

Question # 31

Refer to the exhibit. In which scenario does this switch configuration apply?

Options:

A.

when allowing a hub with multiple clients connected


B.

when passing IP phone authentication


C.

when allowing multiple IP phones to be connected


D.

when preventing users with hypervisor


Expert Solution
Questions # 32:

What is a characteristic of the UDP protocol?

Options:

A.

UDP can detect when a server is down.


B.

UDP offers best-effort delivery


C.

UDP can detect when a server is slow


D.

UDP offers information about a non-existent server


Expert Solution
Questions # 33:

A network engineer needs to ensure that the access credentials are not exposed during the 802.1x authentication among components. Which two protocols should complete this task?

Options:

A.

PEAP


B.

EAP-MD5


C.

LEAP


D.

EAP-TLS


E.

EAP-TTLS


Expert Solution
Questions # 34:

An administrator connects an HP printer to a dot1x enable port, but the printer in not accessible Which feature must the administrator enable to access the printer?

Options:

A.

MAC authentication bypass


B.

change of authorization


C.

TACACS authentication


D.

RADIUS authentication


Expert Solution
Questions # 35:

What does a fully distributed Cisco ISE deployment include?

Options:

A.

PAN and PSN on the same node while MnTs are on their own dedicated nodes.


B.

PAN and MnT on the same node while PSNs are on their own dedicated nodes.


C.

All Cisco ISE personas on their own dedicated nodes.


D.

All Cisco ISE personas are sharing the same node.


Expert Solution
Questions # 36:

An administrator is configuring RADIUS on a Cisco switch with a key set to Cisc403012128 but is receiving the error “Authentication failed: 22040 Wrong password or invalid shared secret. “what must be done to address this issue?

Options:

A.

Add the network device as a NAD inside Cisco ISE using the existing key.


B.

Configure the key on the Cisco ISE instead of the Cisco switch.


C.

Use a key that is between eight and ten characters.


D.

Validate that the key is correct on both the Cisco switch as well as Cisco ISE.


Expert Solution
Questions # 37:

Drag the Cisco ISE node types from the left onto the appropriate purposes on the right.

Question # 37


Expert Solution
Questions # 38:

What should be considered when configuring certificates for BYOD?

Options:

A.

An endpoint certificate is mandatory for the Cisco ISE BYOD


B.

An Android endpoint uses EST whereas other operation systems use SCEP for enrollment


C.

The CN field is populated with the endpoint host name.


D.

The SAN field is populated with the end user name


Expert Solution
Questions # 39:

An engineer is implementing network access control using Cisco ISE and needs to separate the traffic based on the network device ID and use the IOS device sensor capability. Which probe must be used to accomplish this task?

Options:

A.

HTTP probe


B.

NetFlow probe


C.

network scan probe


D.

RADIUS probe


Expert Solution
Questions # 40:

An administrator needs to give the same level of access to the network devices when users are logging into them using TACACS+ However, the administrator must restrict certain commands based on one of three user roles that require different commands How is this accomplished without creating too many objects using Cisco ISE?

Options:

A.

Create one shell profile and multiple command sets.


B.

Create multiple shell profiles and multiple command sets.


C.

Create one shell profile and one command set.


D.

Create multiple shell profiles and one command set


Expert Solution
Viewing page 4 out of 8 pages
Viewing questions 31-40 out of questions