New Year Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmaspas7

Easiest Solution 2 Pass Your Certification Exams

300-715 Cisco Implementing and Configuring Cisco Identity Services Engine (SISE) v4.0 (300-715 SISE) Free Practice Exam Questions (2025 Updated)

Prepare effectively for your Cisco 300-715 Implementing and Configuring Cisco Identity Services Engine (SISE) v4.0 (300-715 SISE) certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 2 / 5
Total 299 questions

Which CLI command must be configured on the switchport to immediately run the MAB process if a non-802.1X capable endpoint connects to the port?

A.

authentication order mab dot1x

B.

authentication fallback

C.

dot1x pae authenticator

D.

access-session port-control auto

An engineer must use Cisco ISE to provide network access to endpoints that cannot support 802.1X. The endpoint MAC addresses must be allowlisted by configuring an endpoint identity group. These configurations were performed:

    Configured an identity group named allowlist

    Configured the endpoints to use the MAC address of incompatible 802.1X devices

    Added the endpoints to the allowlist identity group

    Configured an authentication policy for MAB users

What must be configured?

A.

Authorization profile that has the PermitAccess permission and matches the allowlist identity group

B.

Authentication profile that has the PermitAccess permission and matches the allowlist identity group

C.

Authorization policy that has the PermitAccess permission and matches the allowlist identity group

D.

Logical profile that matches the allowlist identity group based on the configured policy

When creating a policy within Cisco ISE for network access control, the administrator wants to allow different access restrictions based upon the wireless SSID to which the device is connecting. Which policy condition must be used in order to accomplish this?

A.

Network Access NetworkDeviceName CONTAINS

B.

DEVICE Device Type CONTAINS

C.

Radius Called-Station-ID CONTAINS

D.

Airespace Airespace-Wlan-ld CONTAINS

Which two ports do network devices typically use for CoA? (Choose two)

A.

443

B.

19005

C.

8080

D.

3799

E.

1700

A security engineer configures a Cisco Catalyst switch to use Cisco TrustSec. The engineer must define the PAC key to authenticate the switch to Cisco IISE. Drag and drop the commands from the left into sequence on the right. Not all options are used.

Refer to the exhibit.

Which switch configuration change will allow only one voice and one data endpoint on each port?

A.

Multi-auth to multi-domain

B.

Mab to dot1x

C.

Auto to manual

D.

Multi-auth to single-auth

A user reports that the RADIUS accounting packets are not being seen on the Cisco ISE server.

Which command is the user missing in the switch’s configuration?

A.

radius-server vsa send accounting

B.

aaa accounting network default start-stop group radius

C.

aaa accounting resource default start-stop group radius

D.

aaa accounting exec default start-stop group radios

In a standalone Cisco ISE deployment, which two personas are configured on a node? (Choose two )

A.

publisher

B.

administration

C.

primary

D.

policy service

E.

subscriber

A network administrator must configura endpoints using an 802 1X authentication method with EAP identity certificates that are provided by the Cisco ISE When the endpoint presents the identity certificate to Cisco ISE to validate the certificate, endpoints must be authorized to connect to the network Which EAP type must be configured by the network administrator to complete this task?

A.

EAP-PEAP-MSCHAPv2

B.

EAP-TTLS

C.

EAP-FAST

D.

EAP-TLS

Using the SAK Active Directory Federation Services server. The configurations were performed:

• created a new SAML Identity provider profile in Cisco ISE

• exported the service provider Information

• configured all the required Active Directory Federation Services configurations

• Imported the Active Directory Federation Services metadata

• configured groups in the new SAML identity

• added attributes to the new SAML identity provider profile

• configured Advanced Settings in the new SAML identity provider profile

Which two actions must be taken to complete the configuration? (Choose two.)

A.

Allow Kerberos single sign-on on the Sponsor portal.

B.

Configure the Sponsor portal HTTPS port for Active Directory Federation Services integration.

C.

Customize the Sponsor portal pages for Integration with Active Directory Federation Services.

D.

Add SAML identity provider groups in Sponsor Group Members.

E.

Configure an identity source sequence in the Sponsor portal.

A laptop was stolen and a network engineer added it to the block list endpoint identity group What must be done on a new Cisco ISE deployment to redirect the laptop and restrict access?

A.

Select DenyAccess within the authorization policy.

B.

Ensure that access to port 8443 is allowed within the ACL.

C.

Ensure that access to port 8444 is allowed within the ACL.

D.

Select DROP under If Auth fail within the authentication policy.

A Cisco ISE engineer is creating a certificate authentication profile to be used with machine authentication for the network. The engineer wants to be able to compare the user-presented certificate with a certificate stored in Active Directory. What must be done to accomplish this?

A.

Configure the user-presented password hash and a hash stored in Active Directory for comparison

B.

Add the subject alternative name and the common name to the CAP.

C.

Enable the option for performing binary comparison.

D.

Use MS-CHAPv2 since it provides machine credentials and matches them to credentials stored in Active Directory

What is a valid guest portal type?

A.

Sponsored-Guest

B.

My Devices

C.

Sponsor

D.

Captive-Guest

Which permission is common to the Active Directory Join and Leave operations?

A.

Create a Cisco ISE machine account in the domain if the machine account does not already exist

B.

Remove the Cisco ISE machine account from the domain.

C.

Set attributes on the Cisco ISE machine account

D.

Search Active Directory to see if a Cisco ISE machine account already ex.sts.

An administrator has added a new Cisco ISE PSN to their distributed deployment. Which two features must the administrator enable to accept authentication requests and profile the endpoints correctly, and add them to their respective endpoint identity groups? (Choose two )

A.

Session Services

B.

Endpoint Attribute Filter

C.

Posture Services

D.

Profiling Services

E.

Radius Service

NO: 37

In which two ways can users and endpoints be classified for TrustSec?

(Choose Two.)

A.

VLAN

B.

SXP

C.

dynamic

D.

QoS

E.

SGACL

An administrator must deploy the Cisco Secure Client posture agent to employee endpoints that access a wireless network by using URL redirection in Cisco ISE. The compliance module must be downloaded from Cisco and uploaded to the Cisco ISE client provisioning resource. What must be used to upload the compliance module?

A.

Secure Client configuration

B.

agent resources from the local disk

C.

Secure Client posture profile

D.

Client Provisioning Portal

An engineer is configuring ISE for network device administration and has devices that support both protocols. What are two benefits of choosing TACACS+ over RADUs for these devices? (Choose two.)

A.

TACACS+ is FIPS compliant while RADIUS is not

B.

TACACS+ is designed for network access control while RADIUS is designed for role-based access.

C.

TACACS+ uses secure EAP-TLS while RADIUS does not.

D.

TACACS+ provides the ability to authorize specific commands while RADIUS does not

E.

TACACS+ encrypts the entire payload being sent while RADIUS only encrypts the password.

What occurs when a Cisco ISE distributed deployment has two nodes and the secondary node is deregistered?

A.

The primary node restarts

B.

The secondary node restarts.

C.

The primary node becomes standalone

D.

Both nodes restart.

What is the maximum number of PSN nodes supported in a medium-sized deployment?

A.

three

B.

five

C.

two

D.

eight

Page: 2 / 5
Total 299 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved