Big Halloween Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the Cisco CCNP Security 300-715 Questions and answers with CertsForce

Viewing page 6 out of 9 pages
Viewing questions 51-60 out of questions
Questions # 51:

During a 802 1X deployment, an engineer must identify failed authentications without causing problems for the connected endpoint. Which command will successfully achieve this''

Options:

A.

dot1x system-auth-control


B.

dot1x pae authenticator


C.

authentication open


D.

authentication port-control auto


Expert Solution
Questions # 52:

An organization wants to enable web-based guest access for both employees and visitors The goal is to use a single portal for both user types Which two authentication methods should be used to meet this requirement? (Choose two )

Options:

A.

LDAP


B.

802 1X


C.

Certificate-based


D.

LOCAL


E.

MAC based


Expert Solution
Questions # 53:

In which two ways can users and endpoints be classified for TrustSec?

(Choose Two.)

Options:

A.

VLAN


B.

SXP


C.

dynamic


D.

QoS


E.

SGACL


Expert Solution
Questions # 54:

An engineer is migrating users from MAB to 802.1X on the network. This must be done during normal business hours with minimal impact to users. Which CoA method should be used?

Options:

A.

Port Bounce


B.

Port Shutdown


C.

Session Termination


D.

Session Reauthentication


Expert Solution
Questions # 55:

A policy is being created in order to provide device administration access to the switches on a network. There is a requirement to ensure that if the session is not actively being used, after 10 minutes, it will be disconnected. Which task must be configured in order to meet this requirement?

Options:

A.

session timeout


B.

idle time


C.

monitor


D.

set attribute as


Expert Solution
Questions # 56:

An organization wants to standardize the 802 1X configuration on their switches and remove static ACLs on the switch ports while allowing Cisco ISE to communicate to the switch what access to provide What must be configured to accomplish this task?

Options:

A.

security group tag within the authorization policy


B.

extended access-list on the switch for the client


C.

port security on the switch based on the client's information


D.

dynamic access list within the authorization profile


Expert Solution
Questions # 57:

Refer to the exhibit.

Question # 57

Which switch configuration change will allow only one voice and one data endpoint on each port?

Options:

A.

Multi-auth to multi-domain


B.

Mab to dot1x


C.

Auto to manual


D.

Multi-auth to single-auth


Expert Solution
Questions # 58:

Which RADIUS attribute is used to dynamically assign the inactivity active timer for MAB users from the Cisco ISE node'?

Options:

A.

radius-server timeout


B.

session-timeout


C.

idle-timeout


D.

termination-action


Expert Solution
Questions # 59:

What is an advantage of using EAP-TLS over EAP-MS-CHAPv2 for client authentication?

Options:

A.

EAP-TLS uses a username and password for authentication to enhance security, while EAP-MS-CHAPv2 does not.


B.

EAP-TLS secures the exchange of credentials, while EAP-MS-CHAPv2 does not.


C.

EAP-TLS uses a device certificate for authentication to enhance security, while EAP-MS-CHAPv2 does not.


D.

EAP-TLS uses multiple forms of authentication, while EAP-MS-CHAPv2 only uses one.


Expert Solution
Questions # 60:

A network engineer must enable a profiling probe. The profiling must take details through the Active Directory. Where in the Cisco ISE interface would the engineer enable the probe?

Options:

A.

Policy > Policy Elements > Profiling


B.

Administration > Deployment > System > Profiling


C.

Policy > Deployment > System > Profiling


D.

Administration > System > Deployment > Profiling


Expert Solution
Viewing page 6 out of 9 pages
Viewing questions 51-60 out of questions