ExamHelpDesk

Complete list of current Q & A>>

Implementing and Configuring Cisco Identity Services Engine (300-715) – Quiz

1 / 15

Category: Implementing and Configuring Cisco Identity Services Engine (300-715)

1. An engineer is configuring 802.1X and wants it to be transparent from the users’ point of view. The implementation should provide open authentication on the switch ports while providing strong levels of security for non-authenticated devices.
Which deployment mode should be used to achieve this?

2 / 15

Category: Implementing and Configuring Cisco Identity Services Engine (300-715)

2. What does a fully distributed Cisco ISE deployment include?

3 / 15

Category: Implementing and Configuring Cisco Identity Services Engine (300-715)

3. An engineer is testing Cisco ISE policies in a lab environment with no support for a deployment server. In order to push supplicant profiles to the workstations for testing, firewall ports will need to be opened.
From which Cisco ISE persona should this traffic be originating?

4 / 15

Category: Implementing and Configuring Cisco Identity Services Engine (300-715)

4. What is the deployment mode when two Cisco ISE nodes are configured in an environment?

5 / 15

Category: Implementing and Configuring Cisco Identity Services Engine (300-715)

5. In a Cisco ISE split deployment model, which load is split between the nodes?

6 / 15

Category: Implementing and Configuring Cisco Identity Services Engine (300-715)

6. A network engineer is configuring a network device that needs to filter traffic based on security group tags using a security policy on a routed interface.
Which command should be used to accomplish this task?

7 / 15

Category: Implementing and Configuring Cisco Identity Services Engine (300-715)

7. Which personas can a Cisco ISE node assume?

8 / 15

Category: Implementing and Configuring Cisco Identity Services Engine (300-715)

8. What occurs when a Cisco ISE distributed deployment has two nodes and the secondary node is deregistered?

9 / 15

Category: Implementing and Configuring Cisco Identity Services Engine (300-715)

9. Which two features are available when the primary admin node is down and the secondary admin node has not been promoted? (Choose two.)

10 / 15

Category: Implementing and Configuring Cisco Identity Services Engine (300-715)

10. Which supplicant(s) and server(s) are capable of supporting EAP-CHAINING?

11 / 15

Category: Implementing and Configuring Cisco Identity Services Engine (300-715)

11. What is a requirement for Feed Service to work?

12 / 15

Category: Implementing and Configuring Cisco Identity Services Engine (300-715)

12. What is a method for transporting security group tags throughout the network?

13 / 15

Category: Implementing and Configuring Cisco Identity Services Engine (300-715)

13. An engineer is configuring a virtual Cisco ISE deployment and needs each persona to be on a different node.
Which persona should be configured with the largest amount of storage in this environment?

14 / 15

Category: Implementing and Configuring Cisco Identity Services Engine (300-715)

14. In a standalone Cisco ISE deployment, which two personas are configured on a node? (Choose two.)

15 / 15

Category: Implementing and Configuring Cisco Identity Services Engine (300-715)

15. A network engineer must enforce access control using special tags, without re-engineering the network design.
Which feature should be configured to achieve this in a scalable manner?

Your score is

0%

Scroll to Top