Category Archives: 300-715 Implementing and Configuring Cisco Identity Services Engine (300-715 SISE)

300-715 Implementing and Configuring Cisco Identity Services Engine (300-715 SISE) Question and Answers

Which are two characteristics of TACACS+? (Choose two.)

A. It separates authorization and authentication functions. B. It combines authorization and authentication functions. C. It uses UDP port 49. D. It encrypts the password only. E. It uses TCP port 49. Answer: Option A, E. Explanation:  Reference: https://www.cisco.com/c/en/us/support/docs/security-vpn/remote-authentication-dial-user-service-radius/13838-10.html Show AnswerDiscussion The post Which are two characteristics of TACACS+? (Choose two.) appeared first on Majanto.

Which two features must be used on Cisco ISE to enable the TACACS+ feature? (Choose two.)

A. Command Sets B. Server Sequence C. Device Administration License D. External TACACS Servers E. Device Admin Service Answer: Option C, E. Explanation:  No answer description available for this question Show AnswerDiscussion The post Which two features must be used on Cisco ISE to enable the TACACS+ feature? (Choose two.) appeared first on Majanto.

What are two components of the posture requirement when configuring Cisco ISE posture? (Choose two.)

A. Client Provisioning portal B. remediation actions C. updates D. access policy E. conditions Answer: Option B, E. Explanation:  No answer description available for this question Show AnswerDiscussion The post What are two components of the posture requirement when configuring Cisco ISE posture? (Choose two.) appeared first on Majanto.

Which two ports do network devices typically use for CoA? (Choose two.)

A. 19005 B. 443 C. 3799 D. 8080 E. 1700 Answer: Option C, E. Explanation:  Reference: https://documentation.meraki.com/MR/Encryption_and_Authentication/Change_of_Authorization_with_RADIUS_(CoA)_on_MR_Access_Points Show AnswerDiscussion The post Which two ports do network devices typically use for CoA? (Choose two.) appeared first on Majanto.

Which use case validates a change of authorization?

A. An endpoint that is disconnected from the network is discovered. B. Endpoints are created through device registration for the guests. C. An endpoint profiling policy is changed for authorization policy. D. An authenticated, wired EAP-capable endpoint is discovered. Answer: Option C. Explanation:  Reference: https://www.cisco.com/c/en/us/td/docs/security/ise/1-2/user_guide/ise_user_guide/ise_prof_pol.html Show AnswerDiscussion The post Which use case validates a change of authorization? appeared… Read More »

What sends the redirect ACL that is configured in the authorization profile back to the Cisco WLC?

A. State attribute B. Class attribute C. Event D. Cisco-av-pair Answer: Option D. Explanation:  Reference: https://community.cisco.com/t5/network-access-control/ise-airespace-acl-wlc-problem/td-p/2110491 Show AnswerDiscussion The post What sends the redirect ACL that is configured in the authorization profile back to the Cisco WLC? appeared first on Majanto.

What is needed to configure wireless guest access on the network?

A. endpoint already profiled in ISE B. WEBAUTH ACL for redirection C. Captive Portal Bypass turned on D. valid user account in Active Directory Answer: Option C. Explanation:  No answer description available for this question Show AnswerDiscussion The post What is needed to configure wireless guest access on the network? appeared first on Majanto.