Test Online Free Cisco 300-715 Exam Questions and Answers
Practice a live sample before buying full access. This page keeps the free 300-715 question set organized by page so visitors and search engines can reach the canonical -questions.html URL directly.
An engineer is configuring posture assessment for their network access control and needs to use an agent that supports using service conditions as conditions for the assessment. The agent should be run as a background process to avoid user interruption but when it is run. the user can see it .
What is the problem?
Answer:
Question 32Selectable Answer
An administrator is configuring cisco ISE lo authenticate users logging into network devices using TACACS+ The administrator is not seeing any oí the authentication in the TACACS+ live logs .
Which action ensures the users are able to log into the network devices?
Users in an organization report issues about having to remember multiple usernames and passwords. The network administrator wants the existing Cisco ISE deployment to utilize an external identity source to alleviate this issue .
Which two requirements must be met to implement this change? (Choose two.)
Answer:
Question 34Selectable Answer
Refer to the exhibit.
In which scenario does this switch configuration apply?
An engineer is configuring sponsored guest access and needs to limit each sponsored guest to a maximum of two devices. There are other guest services in production that rely on the default guest types .
How should this configuration change be made without disrupting the other guest services currently offering three or more guest devices per user?
Answer:
Question 36Selectable Answer
Refer to the exhibit.
Which two configurations are needed on a catalyst switch for it to be added as a network access device in a Cisco ISE that is being used for 802 1X authentications? (Choose two)
Answer:
Question 37Written Answer
DRAG DROP
Drag the steps to configure a Cisco ISE node as a primary administration node from the left into the correct order on the night.
Answer:
Explanation:
https://www.cisco.com/c/en/us/td/docs/security/ise/2-4/admin_guide/b_ise_admin_guide_24/b_ise_admin_guide_24_new_chapter_011.html
Step 1
Choose Administration > System > Deployment.
The Register button will be disabled initially. To enable this button, you must configure a Primary PAN.
Step 2
Check the check box next to the current node, and click Edit.
Step 3
Click Make Primary to configure your Primary PAN.
Step 4
Enter data on the General Settings tab.
Step 5
Click Save to save the node configuration.
Question 38Selectable Answer
An administrator is configuring sponsored guest access using Cisco ISE Access must be restricted to the sponsor portal to ensure that only necessary employees can issue sponsored accounts and employees must be classified to do so.
What must be done to accomplish this task?
Answer:
Question 39Selectable Answer
An engineer has been tasked with standing up a new guest portal for customers that are waiting in the lobby. There is a requirement to allow guests to use their social media logins to access the guest network to appeal to more customers.
What must be done to accomplish this task?
Answer:
Question 40Selectable Answer
An engineer is using the low-impact mode for a phased deployment of Cisco ISE and is trying to connect to the network prior to authentication .
Which access will be denied in this?
Answer:
Question 41Selectable Answer
MacOS users are complaining about having to read through wordy instructions when remediating their workstations to gam access to the network.
Which alternate method should be used to tell users how to remediate?
If a user reports a device lost or stolen, which portal should be used to prevent the device from accessing the network while still providing information about why the device is blocked?
Answer: Explanation:
https://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/Borderless_Networks/Unified_Access/BYOD_Design_Guide/Managing_Lost_or_Stolen_Device.html#90273
The Blacklist identity group is system generated and maintained by ISE to prevent access to lost or stolen devices.
In this design guide, two authorization profiles are used to enforce the permissions for wireless and wired devices within the Blacklist:
✑ Blackhole WiFi Access
✑ Blackhole Wired Access