Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: s2p65

Easiest Solution 2 Pass Your Certification Exams

300-715 Cisco Implementing and Configuring Cisco Identity Services Engine (SISE) v4.0 (300-715 SISE) Free Practice Exam Questions (2025 Updated)

Prepare effectively for your Cisco 300-715 Implementing and Configuring Cisco Identity Services Engine (SISE) v4.0 (300-715 SISE) certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 1 / 5
Total 299 questions

There are several devices on a network that are considered critical and need to be placed into the ISE database and a policy used for them. The organization does not want to use profiling. What must be done to accomplish this goal?

A.

Enter the MAC address in the correct Endpoint Identity Group.

B.

Enter the MAC address in the correct Logical Profile.

C.

Enter the IP address in the correct Logical Profile.

D.

Enter the IP address in the correct Endpoint Identity Group.

While configuring Cisco TrustSec on Cisco IOS devices the engineer must set the CTS device ID and password in order for the devices to authenticate with each other. However after this is complete the devices are not able to property authenticate What issue would cause this to happen even if the device ID and passwords are correct?

A.

The device aliases are not matching

B.

The 5GT mappings have not been defined

C.

The devices are missing the configuration cts credentials trustsec verify 1

D.

EAP-FAST is not enabled

An engineer is configuring web authentication and needs to allow specific protocols to permit DNS traffic. Which type of access list should be used for this configuration?

A.

reflexive ACL

B.

extended ACL

C.

standard ACL

D.

numbered ACL

A network administrator changed a Cisco ISE deployment from pilot to production and noticed that the JVM memory utilization increased significantly. The administrator suspects this is due to replication between the nodes What must be configured to minimize performance degradation?

A.

Review the profiling policies for any misconfiguration

B.

Enable the endpoint attribute filter

C.

Change the reauthenticate interval.

D.

Ensure that Cisco ISE is updated with the latest profiler feed update

A security engineer configures a Cisco Catalyst switch to use Cisco TrustSec. The engineer must define the PAC key to authenticate the switch to Cisco IISE. Drag and drop the commands from the left into sequence on the right. Not all options are used.

When planning for the deployment of Cisco ISE, an organization's security policy dictates that they must use network access authentication via RADIUS. It also states that the deployment provide an adequate amount of security and visibility for the hosts on the network. Why should the engineer configure MAB in this situation?

A.

The Cisco switches only support MAB.

B.

MAB provides the strongest form of authentication available.

C.

The devices in the network do not have a supplicant.

D.

MAB provides user authentication.

An organization wants to standardize the 802 1X configuration on their switches and remove static ACLs on the switch ports while allowing Cisco ISE to communicate to the switch what access to provide What must be configured to accomplish this task?

A.

security group tag within the authorization policy

B.

extended access-list on the switch for the client

C.

port security on the switch based on the client's information

D.

dynamic access list within the authorization profile

An engineer is configuring a posture policy for Windows 10 endpoints and wants to ensure that users in each AD group have different conditions to meet to be compliant. What must be done to accomplish this task?

A.

identify The users groups needed for different policies and create service conditions to map each one to its posture requirement

B.

Configure a simple condition for each AD group and use it in the posture policy for each use case

C.

Use the authorization policy within the policy set to group each AD group with their respective posture policy

D.

Change the posture requirements to use an AD group lor each use case then use those requirements in the posture policy

Which two default guest portals are available with Cisco ISE? (Choose two.)

A.

visitor

B.

WIFI-access

C.

self-registered

D.

central web authentication

E.

sponsored

An engineer is designing a BYOD environment utilizing Cisco ISE for devices that do not support native supplicants Which portal must the security engineer configure to accomplish this task?

A.

MDM

B.

Client provisioning

C.

My devices

D.

BYOD

What must match between Cisco ISE and the network access device to successfully authenticate endpoints?

A.

SNMP version

B.

shared secret

C.

certificate

D.

profile

Which advanced option within a WLAN must be enabled to trigger Central Web Authentication for Wireless users on AireOS controller?

A.

DHCP server

B.

static IP tunneling

C.

override Interface ACL

D.

AAA override

Which type of identity store allows for creating single-use access credentials in Cisco ISE?

A.

OpenLDAP

B.

Local

C.

PKI

D.

RSA SecurID

An administrator needs to give the same level of access to the network devices when users are logging into them using TACACS+ However, the administrator must restrict certain commands based on one of three user roles that require different commands How is this accomplished without creating too many objects using Cisco ISE?

A.

Create one shell profile and multiple command sets.

B.

Create multiple shell profiles and multiple command sets.

C.

Create one shell profile and one command set.

D.

Create multiple shell profiles and one command set

A network administrator has just added a front desk receptionist account to the Cisco ISE Guest Service sponsor group. Using the Cisco ISE Guest Sponsor Portal, which guest services can the receptionist provide?

A.

Keep track of guest user activities

B.

Configure authorization settings for guest users

C.

Create and manage guest user accounts

D.

Authenticate guest users to Cisco ISE

An engineer is configuring 802.1X and is testing out their policy sets. After authentication, some endpoints are given an access-reject message but are still allowed onto the network. What is causing this issue to occur?

A.

The switch port is configured with authentication event server dead action authorize vlan.

B.

The authorization results for the endpoints include a dACL allowing access.

C.

The authorization results for the endpoints include the Trusted security group tag.

D.

The switch port is configured with authentication open.

An engineer is enabling a newly configured wireless SSID for tablets and needs visibility into which other types of devices are connecting to it. What must be done on the Cisco WLC to provide this information to Cisco ISE9

A.

enable IP Device Tracking

B.

enable MAC filtering

C.

enable Fast Transition

D.

enable mDNS snooping

A security administrator is using Cisco ISE to create a BYOD onboarding solution for all employees who use personal devices on the corporate network. The administrator generates a Certificate Signing Request and signs the request using an external Certificate Authority server. Which certificate usage option must be selected when importing the certificate into ISE?

A.

RADIUS

B.

DLTS

C.

Portal

D.

Admin

Which nodes are supported in a distributed Cisco ISE deployment?

A.

Policy Service nodes for session failover

B.

Monitoring nodes for PxGrid services

C.

Administration nodes for session failover

D.

Policy Service nodes for automatic failover

What is a difference between RADIUS and TACACS+?

A.

RADIUS uses connection-oriented transport, and TACACS+ uses best-effort delivery.

B.

RADIUS offers multiprotocol support, and TACACS+ supports only IP traffic.

C.

RADIUS combines authentication and authorization functions, and TACACS+ separates them.

D.

RADIUS supports command accounting, and TACACS+ does not.

Page: 1 / 5
Total 299 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved