Complete list of current Q & A>> Download Implementing and Configuring Cisco Identity Services Engine (300-715) – Quiz 1 / 15 Category: Implementing and Configuring Cisco Identity Services Engine (300-715) 1. An engineer is configuring 802.1X and wants it to be transparent from the users’ point of view. The implementation should provide open authentication on the switch ports while providing strong levels of security for non-authenticated devices. Which deployment mode should be used to achieve this? A. closed B. high-impact C. low-impact D. open 2 / 15 Category: Implementing and Configuring Cisco Identity Services Engine (300-715) 2. What does a fully distributed Cisco ISE deployment include? A. PAN and MnT on the same node while PSNs are on their own dedicated nodes. B. All Cisco ISE personas are sharing the same node. C. All Cisco ISE personas on their own dedicated nodes. D. PAN and PSN on the same node while MnTs are on their own dedicated nodes. 3 / 15 Category: Implementing and Configuring Cisco Identity Services Engine (300-715) 3. An engineer is testing Cisco ISE policies in a lab environment with no support for a deployment server. In order to push supplicant profiles to the workstations for testing, firewall ports will need to be opened. From which Cisco ISE persona should this traffic be originating? A. administration B. authentication C. policy service D. monitoring 4 / 15 Category: Implementing and Configuring Cisco Identity Services Engine (300-715) 4. What is the deployment mode when two Cisco ISE nodes are configured in an environment? A. standalone B. distributed C. standard D. active 5 / 15 Category: Implementing and Configuring Cisco Identity Services Engine (300-715) 5. In a Cisco ISE split deployment model, which load is split between the nodes? A. log collection B. device admission C. AAA D. network admission 6 / 15 Category: Implementing and Configuring Cisco Identity Services Engine (300-715) 6. A network engineer is configuring a network device that needs to filter traffic based on security group tags using a security policy on a routed interface. Which command should be used to accomplish this task? A. cts role-based policy priority-static B. cts cache enable C. cts authorization list D. cts role-based enforcement 7 / 15 Category: Implementing and Configuring Cisco Identity Services Engine (300-715) 7. Which personas can a Cisco ISE node assume? A. policy service, gatekeeping, and monitoring B. administration, monitoring, and gatekeeping C. administration, policy service, and monitoring D. administration, policy service, gatekeeping 8 / 15 Category: Implementing and Configuring Cisco Identity Services Engine (300-715) 8. What occurs when a Cisco ISE distributed deployment has two nodes and the secondary node is deregistered? A. The secondary node restarts. B. The primary node restarts. C. Both nodes restart. D. The primary node becomes standalone 9 / 15 Category: Implementing and Configuring Cisco Identity Services Engine (300-715) 9. Which two features are available when the primary admin node is down and the secondary admin node has not been promoted? (Choose two.) A. new AD user 802.1X authentication B. hotspot C. posture D. guest AUP E. BYOD 10 / 15 Category: Implementing and Configuring Cisco Identity Services Engine (300-715) 10. Which supplicant(s) and server(s) are capable of supporting EAP-CHAINING? A. Cisco Secure Services Client and Cisco Access Control Server B. Cisco AnyConnect NAM and Cisco Identity Service Engine C. Cisco AnyConnect NAM and Cisco Access Control Server D. Windows Native Supplicant and Cisco Identity Service Engine 11 / 15 Category: Implementing and Configuring Cisco Identity Services Engine (300-715) 11. What is a requirement for Feed Service to work? A. TCP port 8080 must be opened between Cisco ISE and the feed server. B. Cisco ISE has access to an internal server to download feed update. C. Cisco ISE has a base license. D. Cisco ISE has Internet access to download feed update. 12 / 15 Category: Implementing and Configuring Cisco Identity Services Engine (300-715) 12. What is a method for transporting security group tags throughout the network? A. by embedding the security group tag in the 802.1Q header B. by the Security Group Tag Exchange Protocol C. by enabling 802.1AE on every network device D. by embedding the security group tag in the IP header 13 / 15 Category: Implementing and Configuring Cisco Identity Services Engine (300-715) 13. An engineer is configuring a virtual Cisco ISE deployment and needs each persona to be on a different node. Which persona should be configured with the largest amount of storage in this environment? A. Monitoring and Troubleshooting B. Policy Services C. Primary Administration D. Platform Exchange Grid 14 / 15 Category: Implementing and Configuring Cisco Identity Services Engine (300-715) 14. In a standalone Cisco ISE deployment, which two personas are configured on a node? (Choose two.) A. subscriber B. primary C. administration D. publisher E. policy service 15 / 15 Category: Implementing and Configuring Cisco Identity Services Engine (300-715) 15. A network engineer must enforce access control using special tags, without re-engineering the network design. Which feature should be configured to achieve this in a scalable manner? A. RBAC B. dACL C. SGT D. VLAN Your score is 0% Restart quiz Send feedback