New Year Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the Cisco CCNP Security 300-715 Questions and answers with CertsForce

Viewing page 7 out of 9 pages
Viewing questions 61-70 out of questions
Questions # 61:

When planning for the deployment of Cisco ISE, an organization's security policy dictates that they must use network access authentication via RADIUS. It also states that the deployment provide an adequate amount of security and visibility for the hosts on the network. Why should the engineer configure MAB in this situation?

Options:

A.

The Cisco switches only support MAB.


B.

MAB provides the strongest form of authentication available.


C.

The devices in the network do not have a supplicant.


D.

MAB provides user authentication.


Expert Solution
Questions # 62:

What are two components of the posture requirement when configuring Cisco ISE posture? (Choose two)

Options:

A.

updates


B.

remediation actions


C.

Client Provisioning portal


D.

conditions


E.

access policy


Expert Solution
Questions # 63:

An engineer is working with a distributed deployment of Cisco ISE and needs to configure various network probes to collect a set of attributes from the endpoints on the network. Which node should be used to accomplish this task?

Options:

A.

PSN


B.

primary PAN


C.

pxGrid


D.

MnT


Expert Solution
Questions # 64:

Which advanced option within a WLAN must be enabled to trigger Central Web Authentication for Wireless users on AireOS controller?

Options:

A.

DHCP server


B.

static IP tunneling


C.

override Interface ACL


D.

AAA override


Expert Solution
Questions # 65:

An administrator is configuring posture with Cisco ISE and wants to check that specific services are present on the workstations that are attempting to access the network. What must be configured to accomplish this goal?

Options:

A.

Create a registry posture condition using a non-OPSWAT API version.


B.

Create an application posture condition using a OPSWAT API version.


C.

Create a compound posture condition using a OPSWAT API version.


D.

Create a service posture condition using a non-OPSWAT API version.


Expert Solution
Questions # 66:

Drag the steps to configure a Cisco ISE node as a primary administration node from the left into the correct order on the night.

Question # 66


Expert Solution
Questions # 67:

What is a requirement for Feed Service to work?

Options:

A.

TCP port 3080 must be opened between Cisco ISE and the feed server


B.

Cisco ISE has a base license.


C.

Cisco ISE has access to an internal server to download feed update


D.

Cisco ISE has Internet access to download feed update


Expert Solution
Questions # 68:

A Cisco ISE server sends a CoA to a NAD after a user logs in successfully using CWA Which action does the CoA perform?

Options:

A.

It terminates the client session


B.

It applies the downloadable ACL provided in the CoA


C.

It applies new permissions provided in the CoA to the client session.


D.

It triggers the NAD to reauthenticate the client


Expert Solution
Questions # 69:

Which two actions must be verified to confirm that the internet is accessible via guest access when configuring a guest portal? (Choose two.)

Options:

A.

The guest device successfully associates with the correct SSID.


B.

The guest user gets redirected to the authentication page when opening a browser.


C.

The guest device has internal network access on the WLAN.


D.

The guest device can connect to network file shares.


E.

Cisco ISE sends a CoA upon successful guest authentication.


Expert Solution
Questions # 70:

A user changes the status of a device to stolen in the My Devices Portal of Cisco ISE. The device was originally onboarded in the BYOD wireless Portal without a certificate. The device is found later, but the user cannot re-onboard the device because Cisco ISE assigned the device to the Blocklist endpoint identity group. What must the user do in the My Devices Portal to resolve this issue?

Options:

A.

Manually remove the device from the Blocklist endpoint identity group.


B.

Change the device state from Stolen to Not Registered.


C.

Change the BYOD registration attribute of the device to None.


D.

Delete the device, and then re-add the device.


Expert Solution
Viewing page 7 out of 9 pages
Viewing questions 61-70 out of questions