Category Archives: 300-715 Implementing and Configuring Cisco Identity Services Engine (300-715 SISE)

300-715 Implementing and Configuring Cisco Identity Services Engine (300-715 SISE) Question and Answers

What is the maximum number of PSN nodes supported in a medium-sized deployment?

A. two B. three C. five D. eight Answer: Option C. Explanation:  Reference: https://www.cisco.com/c/en/us/td/docs/security/ise/2-6/install_guide/b_ise_InstallationGuide26/b_ise_InstallationGuide_26_chapter_00.pdf Show AnswerDiscussion The post What is the maximum number of PSN nodes supported in a medium-sized deployment? appeared first on Majanto.

An organization has a fully distributed Cisco ISE deployment. When implementing probes, an administrator must scan for unknown endpoints to learn the IP-to- MAC address bindings The scan is complete on one PSN, but the information is not available on the others. What must be done to make the information available?

A. Cisco ISE must be configured to learn the IP-MAC binding of unknown endpoints via RADIUS authentication, not via scanning. B. Cisco ISE must learn the IP-MAC binding of unknown endpoints via DHCP profiling, not via scanning. C. Scanning must be initiated from the MnT node to centrally gather the information. D. Scanning must be initiated from the… Read More »

Which two configurations are needed on a catalyst switch for it to be added as a network access device in a Cisco ISE that is being used for 802 1X authentications? (Choose two )

Refer to the exhibit. Which two configurations are needed on a catalyst switch for it to be added as a network access device in a Cisco ISE that is being used for 802 1X authentications? (Choose two ) A. Option A B. Option B C. Option C D. Option D E. Option E Answer: Option A, C. Explanation: … Read More »

An administrator is configuring a switch port for use with 802.1X. What must be done so that the port will allow voice and multiple data endpoints?

A. Connect a hub to the switch port to allow multiple devices access after authentication. B. Configure the port with the authentication host-mode multi-auth command. C. Connect the data devices to the port, then attach the phone behind them. D. Use the command authentication host-mode multi-domain on the port. Answer: Option B. Explanation:  Reference: https://networklessons.com/cisco/ccie-routing-switching-written/mac-authentication-bypass-mab Show AnswerDiscussion The… Read More »

An administrator is troubleshooting an endpoint that is supposed to bypass 802.1X and use MAB. The endpoint is bypassing 802.1X and successfully getting network access using MAB, however the endpoint cannot communicate because it cannot obtain an IP address. What is the problem?

A. The endpoint is using the wrong protocol to authenticate with Cisco ISE. B. The 802.1X timeout period is too long. C. The DHCP probe for Cisco ISE is not working as expected. D. An ACL on the port is blocking HTTP traffic. Answer: Option B. Explanation:  No answer description available for this question Show AnswerDiscussion The post… Read More »

Drag and drop the description from the left onto the protocol on the right that is used to carry out system authentication, authorization, and accounting.

Drag and drop the description from the left onto the protocol on the right that is used to carry out system authentication, authorization, and accounting. Select and Place: Answer: Explanation:  No answer description available for this question Show AnswerDiscussion The post Drag and drop the description from the left onto the protocol on the right that is used… Read More »

Which RADIUS attribute is used to dynamically assign the inactivity active timer for MAB users from the Cisco ISE node’?

A. radius-server timeout B. session-timeout C. idle-timeout D. termination-action Answer: Option C. Explanation:  No answer description available for this question Show AnswerDiscussion The post Which RADIUS attribute is used to dynamically assign the inactivity active timer for MAB users from the Cisco ISE node’? appeared first on Majanto.

Drag the descriptions on the left onto the components of 802.1X on the right.

Drag the descriptions on the left onto the components of 802.1X on the right. Select and Place: Answer: Explanation:  Authenticator – device that controls physical access to the network based on the authentication status Supplicant – software on the endpoint that communicates with EAP at layer 2 Authentication server – device that validates the identity of the endpoint… Read More »

An administrator is manually adding a device to a Cisco ISE identity group to ensure that it is able to access the network when needed without authentication Upon testing, the administrator notices that the device never hits the correct authorization policy line using the condition EndPoints LogicalProfile EQUALS static_list Why is this occurring?

A. The dynamic logical profile is overriding the statically assigned profile B. The device is changing identity groups after profiling instead ot remaining static C. The logical profile is being statically assigned instead of the identity group D. The identity group is being assigned instead of the logical profile Answer: Option C. Explanation:  No answer description available for… Read More »

What occurs when a Cisco ISE distributed deployment has two nodes and the secondary node is deregistered?

A. The secondary node restarts. B. The primary node restarts. C. Both nodes restart. D. The primary node becomes standalone. Answer: Option C. Explanation:  No answer description available for this question Show AnswerDiscussion The post What occurs when a Cisco ISE distributed deployment has two nodes and the secondary node is deregistered? appeared first on Majanto.