300 208.examcollection.premium.exam.174q

57
300-208.examcollection.premium.exam.174q Number: 300-208 Passing Score: 800 Time Limit: 120 min File Version: 17.0 Exam code: 300-208 Exam name: Implementing Cisco Secure Access Solutions Version 17.0

Upload: xsolarisx

Post on 29-Jan-2016

86 views

Category:

Documents


5 download

DESCRIPTION

300 208.Examcollection.premium.exam.174q

TRANSCRIPT

Page 1: 300 208.Examcollection.premium.exam.174q

300-208.examcollection.premium.exam.174q

Number: 300-208Passing Score: 800Time Limit: 120 minFile Version: 17.0

Exam code: 300-208

Exam name: Implementing Cisco Secure Access Solutions

Version 17.0

kinan
Text Box
Dumps & Student Guide & Workshop & Internal Training & Video Training Update Daily https://goo.gl/VVmVZ0
Page 2: 300 208.Examcollection.premium.exam.174q

Exam A

QUESTION 1A network administrator needs to implement a service that enables granular control of IOS commands that can be executed. Which AAA authentication methodshould be selected?

A. TACACS+B. RADIUSC. Windows Active DirectoryD. Generic LDAP

Correct Answer: ASection: (none)Explanation

Explanation/Reference:

QUESTION 2An administrator can leverage which attribute to assign privileges based on Microsoft Active Directory user groups?

A. member ofB. groupC. classD. person

Correct Answer: ASection: (none)Explanation

Explanation/Reference:

QUESTION 3Cisco 802.1X phasing enables flexible deployments through the use of open, low-impact, and closed modes. What is a unique characteristic of the most securemode?

A. Granular ACLs applied prior to authenticationB. Per user dACLs applied after successful authenticationC. Only EAPoL traffic allowed prior to authenticationD. Adjustable 802.1X timers to enable successful authentication

Correct Answer: CSection: (none)Explanation

Explanation/Reference:

QUESTION 4A network administrator must enable which protocol extension to utilize EAP-Chaining?

A. EAP-FASTB. EAP-TLSC. MSCHAPv2D. PEAP

Correct Answer: ASection: (none)Explanation

Explanation/Reference:

QUESTION 5In the command 'aaa authentication default group tacacs local', how is the word 'default' defined?

A. Command setB. Group nameC. Method listD. Login type

Correct Answer: CSection: (none)Explanation

Explanation/Reference:

QUESTION 6Changes were made to the ISE server while troubleshooting, and now all wireless certificate authentications are failing. Logs indicate an EAP failure. What is themost likely cause of the problem?

A. EAP-TLS is not checked in the Allowed Protocols listB. Certificate authentication profile is not configured in the Identity StoreC. MS-CHAPv2-is not checked in the Allowed Protocols listD. Default rule denies all trafficE. Client root certificate is not included in the Certificate Store

Page 3: 300 208.Examcollection.premium.exam.174q

Correct Answer: ASection: (none)Explanation

Explanation/Reference:

QUESTION 7The NAC Agent uses which port and protocol to send discovery packets to an ISE Policy Service Node?

A. tcp/8905B. udp/8905C. http/80D. https/443

Correct Answer: BSection: (none)Explanation

Explanation/Reference:

QUESTION 8Which two conditions are valid when configuring ISE for posturing? (Choose two.)

A. DictionaryB. member OfC. Profile statusD. FileE. Service

Correct Answer: DESection: (none)Explanation

Explanation/Reference:

QUESTION 9Refer to the exhibit.

Which three statements about the given configuration are true? (Choose three.)

A. TACACS+ authentication configuration is complete.B. TACACS+ authentication configuration is incomplete.C. TACACS+ server hosts are configured correctly.D. TACACS+ server hosts are misconfigured.E. The TACACS+ server key is encrypted.F. The TACACS+ server key is unencrypted.

Correct Answer: BCFSection: (none)Explanation

Explanation/Reference:

QUESTION 10In AAA, what function does authentication perform?

A. It identifies the actions that the user can perform on the device.B. It identifies the user who is trying to access a device.C. It identifies the actions that a user has previously taken.D. It identifies what the user can access.

Correct Answer: BSection: (none)Explanation

Explanation/Reference:

QUESTION 11Which identity store option allows you to modify the directory services that run on TCP/IP?

A. Lightweight Directory Access ProtocolB. RSA SecurID serverC. RADIUSD. Active Directory

Correct Answer: A

Page 4: 300 208.Examcollection.premium.exam.174q

Section: (none)Explanation

Explanation/Reference:

QUESTION 12Which term describes a software application that seeks connectivity to the network via a network access device?

A. authenticatorB. serverC. supplicantD. WLC

Correct Answer: CSection: (none)Explanation

Explanation/Reference:

QUESTION 13Cisco ISE distributed deployments support which three features? (Choose three.)

A. global implementation of the profiler service CoAB. global implementation of the profiler service in Cisco ISEC. configuration to send system logs to the appropriate profiler nodeD. node-specific probe configurationE. server-specific probe configurationF. NetFlow probes

Correct Answer: ACDSection: (none)Explanation

Explanation/Reference:

QUESTION 14How frequently does the Profiled Endpoints dashlet refresh data?

A. every 30 secondsB. every 60 secondsC. every 2 minutesD. every 5 minutes

Correct Answer: BSection: (none)Explanation

Explanation/Reference:

QUESTION 15Which command in the My Devices Portal can restore a previously lost device to the network?

A. ResetB. FoundC. ReinstateD. Request

Correct Answer: CSection: (none)Explanation

Explanation/Reference:

QUESTION 16What is the first step that occurs when provisioning a wired device in a BYOD scenario?

A. The smart hub detects that the physically connected endpoint requires configuration and must use MAB to authenticate.B. The URL redirects to the Cisco ISE Guest Provisioning portal.C. Cisco ISE authenticates the user and deploys the SPW package.D. The device user attempts to access a network URL.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:

QUESTION 17Which three features should be enabled as best practices for MAB? (Choose three.)

A. MD5B. IP source guard

Page 5: 300 208.Examcollection.premium.exam.174q

C. DHCP snoopingD. storm controlE. DAIF. URPF

Correct Answer: BCESection: (none)Explanation

Explanation/Reference:

QUESTION 18When MAB is configured, how often are ports reauthenticated by default?

A. every 60 secondsB. every 90 secondsC. every 120 secondsD. never

Correct Answer: DSection: (none)Explanation

Explanation/Reference:

QUESTION 19What is a required step when you deploy dynamic VLAN and ACL assignments?

A. Configure the VLAN assignment.B. Configure the ACL assignment.C. Configure Cisco IOS Software 802.1X authenticator authorization.D. Configure the Cisco IOS Software switch for ACL assignment.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:

QUESTION 20Which model does Cisco support in a RADIUS change of authorization implementation?

A. pushB. pullC. policyD. security

Correct Answer: ASection: (none)Explanation

Explanation/Reference:

QUESTION 21An organization has recently deployed ISE with the latest models of Cisco switches, and it plans to deploy Trustsec to secure its infrastructure. The company alsowants to allow different network access policies for different user groups (e.g., administrators). Which solution is needed to achieve these goals?

A. Cisco Security Group Access Policies in order to use SGACLs to control access based on SGTs assigned to different usersB. MACsec in Multiple-Host Mode in order to open or close a port based on a single authenticationC. Identity-based ACLs on the switches with user identities provided by ISED. Cisco Threat Defense for user group control by leveraging Netflow exported from the switches and login information from ISE

Correct Answer: ASection: (none)Explanation

Explanation/Reference:

QUESTION 22Security Group Access requires which three syslog messages to be sent to Cisco ISE? (Choose three.)

A. IOS-7-PROXY_DROPB. AP-1-AUTH_PROXY_DOS_ATTACKC. MKA-2-MACDROPD. AUTHMGR-5-MACMOVEE. ASA-6-CONNECT_BUILTF. AP-1-AUTH_PROXY_FALLBACK_REQ

Correct Answer: BDFSection: (none)Explanation

Explanation/Reference:

Page 6: 300 208.Examcollection.premium.exam.174q

QUESTION 23Which administrative role has permission to assign Security Group Access Control Lists?

A. System AdminB. Network Device AdminC. Policy AdminD. Identity Admin

Correct Answer: CSection: (none)Explanation

Explanation/Reference:

QUESTION 24Refer to the exhibit.

If the given configuration is applied to the object-group vpnservers, during which time period are external users able to connect?

A. From Friday at 6:00 p.m. until Monday at 8:00 a.m.B. From Monday at 8:00 a.m. until Friday at 6:00 p.m.C. From Friday at 6:01 p.m. until Monday at 8:01 a.m.D. From Monday at 8:01 a.m. until Friday at 5:59 p.m.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:

QUESTION 25Which set of commands allows IPX inbound on all interfaces?

A. ASA1(config)# access-list IPX-Allow ethertype permit ipx ASA1(config)# access-group IPX-Allow in interface globalB. ASA1(config)# access-list IPX-Allow ethertype permit ipx ASA1(config)# access-group IPX-Allow in interface insideC. ASA1(config)# access-list IPX-Allow ethertype permit ipx ASA1(config)# access-group IPX-Allow in interface outsideD. ASA1(config)# access-list IPX-Allow ethertype permit ipx ASA1(config)# access-group IPX-Allow out interface global

Correct Answer: ASection: (none)Explanation

Explanation/Reference:

QUESTION 26Which command enables static PAT for TCP port 25?

A. nat (outside,inside) static 209.165.201.3 209.165.201.226 eq smtpB. nat static 209.165.201.3 eq smtpC. nat (inside,outside) static 209.165.201.3 service tcp smtp smtpD. static (inside,outside) 209.165.201.3 209.165.201.226 netmask 255.255.255.255

Correct Answer: CSection: (none)Explanation

Explanation/Reference:

QUESTION 27Which command is useful when troubleshooting AAA Authentication between a Cisco router and the AAA server?

A. test aaa-server test cisco cisco123 all new-codeB. test aaa group7 tacacs+ auth cisco123 new-codeC. test aaa group tacacs+ cisco cisco123 new-codeD. test aaa-server tacacs+ group7 cisco cisco123 new-code

Correct Answer: CSection: (none)Explanation

Explanation/Reference:

QUESTION 28In a multi-node ISE deployment, backups are not working on the MnT node. Which ISE CLI option would help mitigate this issue?

Page 7: 300 208.Examcollection.premium.exam.174q

A. repositoryB. ftp-urlC. application-bundleD. collector

Correct Answer: ASection: (none)Explanation

Explanation/Reference:

QUESTION 29Which command can check a AAA server authentication for server group Group1, user cisco, and password cisco555 on a Cisco ASA device?

A. ASA# test aaa-server authentication Group1 username cisco password cisco555B. ASA# test aaa-server authentication group Group1 username cisco password cisco555C. ASA# aaa-server authorization Group1 username cisco password cisco555D. ASA# aaa-server authentication Group1 roger cisco555

Correct Answer: ASection: (none)Explanation

Explanation/Reference:

QUESTION 30Which statement about system time and NTP server configuration with Cisco ISE is true?

A. The system time and NTP server settings can be configured centrally on the Cisco ISE.B. The system time can be configured centrally on the Cisco ISE, but NTP server settings must be configured individually on each ISE node.C. NTP server settings can be configured centrally on the Cisco ISE, but the system time must be configured individually on each ISE node.D. The system time and NTP server settings must be configured individually on each ISE node.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:

QUESTION 31Wireless client supplicants attempting to authenticate to a wireless network are generating excessive log messages. Which three WLC authentication settingsshould be disabled? (Choose three.)

A. RADIUS Server TimeoutB. RADIUS Aggressive-FailoverC. Idle TimerD. Session TimeoutE. Client ExclusionF. Roaming

Correct Answer: BCDSection: (none)Explanation

Explanation/Reference:

QUESTION 32Which two authentication stores are supported to design a wireless network using PEAP EAP- MSCHAPv2 as the authentication method? (Choose two.)

A. Microsoft Active DirectoryB. ACSC. LDAPD. RSA Secure-IDE. Certificate Server

Correct Answer: ABSection: (none)Explanation

Explanation/Reference:

QUESTION 33What is another term for 802.11i wireless network security?

A. 802.1xB. WEPC. TKIPD. WPAE. WPA2

Correct Answer: ESection: (none)

Page 8: 300 208.Examcollection.premium.exam.174q

Explanation

Explanation/Reference:

QUESTION 34Which two EAP types require server side certificates? (Choose two.)

A. EAP-TLSB. PEAPC. EAP-MD5D. LEAPE. EAP-FASTF. MSCHAPv2

Correct Answer: ABSection: (none)Explanation

Explanation/Reference:

QUESTION 35Where is client traffic decrypted in a controller-based wireless network protected with WPA2 Security?

A. Access PointB. SwitchC. Wireless LAN ControllerD. Authentication Server

Correct Answer: ASection: (none)Explanation

Explanation/Reference:

QUESTION 36Which setting provides the best security for a WLAN and authenticates users against a centralized directory store?

A. WPA2 AES-CCMP and 801.X authenticationB. WPA2 AES-CCMP and PSK authenticationC. WPA2 TKIP and PSK authenticationD. WPA2 TKIP and 802.1X authentication

Correct Answer: ASection: (none)Explanation

Explanation/Reference:

QUESTION 37What is a feature of Cisco WLC and IPS synchronization?

A. Cisco WLC populates the ACLs to prevent repeat intruder attacks.B. The IPS automatically send shuns to Cisco WLC for an active host block.C. Cisco WLC and IPS synchronization enables faster wireless access.D. IPS synchronization uses network access points to provide reliable monitoring.

Correct Answer: BSection: (none)Explanation

Explanation/Reference:

QUESTION 38Which two components are required to connect to a WLAN network that is secured by EAP-TLS authentication? (Choose two.)

A. Kerberos authentication serverB. AAA/RADIUS serverC. PSKsD. CA server

Correct Answer: BDSection: (none)Explanation

Explanation/Reference:

QUESTION 39Which statement about Cisco Management Frame Protection is true?

A. It enables stations to remain in power-save mode, except at specified intervals to receive data from the access point.B. It detects spoofed MAC addresses.C. It identifies potential RF jamming attacks.

Page 9: 300 208.Examcollection.premium.exam.174q

D. It protects against frame and device spoofing.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:

QUESTION 40Which three statements about the Cisco wireless IPS solution are true? (Choose three.)

A. It enables stations to remain in power-save mode, except at specified intervals to receive data from the access point.B. It detects spoofed MAC addresses.C. It identifies potential RF jamming attacks.D. It protects against frame and device spoofing.E. It allows the WLC to failover because of congestion.

Correct Answer: BCDSection: (none)Explanation

Explanation/Reference:

QUESTION 41In a basic ACS deployment consisting of two servers, for which three tasks is the primary server responsible? (Choose three.)

A. configurationB. authenticationC. sensingD. policy requirementsE. monitoringF. repudiation

Correct Answer: ABDSection: (none)Explanation

Explanation/Reference:

QUESTION 42In a split ACS deployment with primary and secondary servers, which three statements about AAA load handling are true? (Choose three.)

A. During normal operations, each server processes the full workload of both servers.B. If a AAA connectivity problem occurs, the servers split the full load of authentication requests.C. If a AAA connectivity problem occurs, each server processes the full workload of both servers.D. During normal operations, the servers split the full load of authentication requests.E. During normal operations, each server is used for specific operations, such as device administration and network admission.F. The primary servers are used to distribute policy information to other servers in the enterprise.

Correct Answer: CDESection: (none)Explanation

Explanation/Reference:

QUESTION 43Which three personas can a Cisco ISE assume in a deployment? (Choose three.)

A. connectionB. authenticationC. administrationD. testingE. policy serviceF. monitoring

Correct Answer: CEFSection: (none)Explanation

Explanation/Reference:

QUESTION 44Which three components comprise the Cisco ISE profiler? (Choose three.)

A. the sensor, which contains one or more probesB. the probe managerC. a monitoring tool that connects to the Cisco ISED. the trigger, which activates ACLsE. an analyzer, which uses configured policies to evaluate endpointsF. a remitter tool, which fails over to redundant profilers

Correct Answer: ABE

Page 10: 300 208.Examcollection.premium.exam.174q

Section: (none)Explanation

Explanation/Reference:

QUESTION 45Which three statements about the Cisco ISE profiler are true? (Choose three.)

A. It sends endpoint data to AAA servers.B. It collects endpoint attributes.C. It stores MAC addresses for endpoint systems.D. It monitors and polices router and firewall traffic.E. It matches endpoints to their profiles.F. It stores endpoints in the Cisco ISE database with their profiles.

Correct Answer: BEFSection: (none)Explanation

Explanation/Reference:

QUESTION 46From which location can you run reports on endpoint profiling?

A. Reports > Operations > Catalog > EndpointB. Operations > Reports > Catalog > EndpointC. Operations > Catalog > Reports > EndpointD. Operations > Catalog > Endpoint

Correct Answer: BSection: (none)Explanation

Explanation/Reference:

QUESTION 47Which two services are included in the Cisco ISE posture service? (Choose two.)

A. posture administrationB. posture run-timeC. posture monitoringD. posture policingE. posture catalog

Correct Answer: ABSection: (none)Explanation

Explanation/Reference:

QUESTION 48What is a requirement for posture administration services in Cisco ISE?

A. at least one Cisco router to store Cisco ISE profiling policiesB. Cisco NAC Agents that communicate with the Cisco ISE serverC. an ACL that points traffic to the Cisco ISE deploymentD. the advanced license package must be installed

Correct Answer: DSection: (none)Explanation

Explanation/Reference:

QUESTION 49Which two statements about Cisco NAC Agents that are installed on clients that interact with the Cisco ISE profiler are true? (Choose two.)

A. They send endpoint data to AAA servers.B. They collect endpoint attributes.C. They interact with the posture service to enforce endpoint security policies.D. They block access from the network through noncompliant endpoints.E. They store endpoints in the Cisco ISE with their profiles.F. They evaluate clients against posture policies, to enforce requirements.

Correct Answer: CFSection: (none)Explanation

Explanation/Reference:

QUESTION 50What steps must you perform to deploy a CA-signed identify certificate on an ISE device?

Page 11: 300 208.Examcollection.premium.exam.174q

A. 1. Download the CA server certificate.2. Generate a signing request and save it as a file.3. Access the CA server and submit the ISE request.4. Install the issued certificate on the ISE.

B. 1. Download the CA server certificate.2. Generate a signing request and save it as a file.3. Access the CA server and submit the ISE request.4. Install the issued certificate on the CA server.

C. 1. Generate a signing request and save it as a file.2. Download the CA server certificate.3. Access the ISE server and submit the CA request.4. Install the issued certificate on the CA server.

D. 1. Generate a signing request and save it as a file.2. Download the CA server certificate.3. Access the CA server and submit the ISE request.4. Install the issued certificate on the ISE.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:

QUESTION 51What implementation must be added to the WLC to enable 802.1X and CoA for wireless endpoints?

A. the ISEB. an ACLC. a routerD. a policy server

Correct Answer: ASection: (none)Explanation

Explanation/Reference:

QUESTION 52What are the initial steps must you perform to add the ISE to the WLC?

A. 1. With a Web browser, establish an HTTP connection to the WLC pod.2, Navigate to Administration > Authentication > New.3. Enter server values to begin the configuration.

B. 1. With a Web browser, establish an FTP connection to the WLC pod.2. Navigate to Security > Administration > New.3. Add additional security features for FTP authentication.

C. 1. With a Web browser, establish an HTTP connection to the WLC pod.2. Navigate to Authentication > New.3. Enter ACLs and Authentication methods to begin the configuration.

D. 1. With a Web browser connect, establish an HTTPS connection to the WLC pod.2. Navigate to Security > Authentication > New.3. Enter server values to begin the configuration.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:

QUESTION 53Which command configures console port authorization under line con 0?

A. authorization default|WORDB. authorization exec line con 0|WORDC. authorization line con 0|WORDD. authorization exec default|WORD

Correct Answer: DSection: (none)Explanation

Explanation/Reference:

QUESTION 54Which two statements about administrative access to the ACS Solution Engine are true? (Choose two.)

A. The ACS Solution Engine supports command-line connections through a serial-port connection.B. For GUI access, an administrative GUI user must be created with the add-guiadmin command.C. The ACS Solution Engine supports command-line connections through an Ethernet interface.D. An ACL-based policy must be configured to allow administrative-user access.E. GUI access to the ACS Solution Engine is not supported.

Correct Answer: BDSection: (none)

Page 12: 300 208.Examcollection.premium.exam.174q

Explanation

Explanation/Reference:

QUESTION 55What is the purpose of the Cisco ISE Guest Service Sponsor Portal?

A. It tracks and stores user activity while connected to the Cisco ISE.B. It securely authenticates guest users for the Cisco ISE Guest Service.C. It filters guest users from account holders to the Cisco ISE.D. It creates and manages Guest User accounts.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:

QUESTION 56What is the effect of the ip http secure-server command on a Cisco ISE?

A. It enables the HTTP server for users to connect on the command line.B. It enables the HTTP server for users to connect using Web-based authentication.C. It enables the HTTPS server for users to connect using Web-based authentication.D. It enables the HTTPS server for users to connect on the command line.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:

QUESTION 57When RADIUS NAC and AAA Override are enabled for WLC on a Cisco ISE, which two statements about RADIUS NAC are true? (Choose two.)

A. It will return an access-accept and send the redirection URL for all users.B. It establishes secure connectivity between the RADIUS server and the ISE.C. It allows the ISE to send a CoA request that indicates when the user is authenticated.D. It is used for posture assessment, so the ISE changes the user profile based on posture result.E. It allows multiple users to authenticate at the same time.

Correct Answer: CDSection: (none)Explanation

Explanation/Reference:

QUESTION 58What are the initial steps to configure an ACS as a TACACS server?

A. 1. Choose Network Devices and AAA Clients > Network Resources.2. Click Create.

B. 1. Choose Network Resources > Network Devices and AAA Clients.2. Click Create.

C. 1. Choose Network Resources > Network Devices and AAA Clients.2. Click Manage.

D. 1. Choose Network Devices and AAA Clients > Network Resources.2. Click Install.

Correct Answer: BSection: (none)Explanation

Explanation/Reference:

QUESTION 59Which two statements about administrative access to the Cisco Secure ACS SE are true? (Choose two.)

A. The Cisco Secure ACS SE supports command-line connections through a serial-port connection.B. For GUI access, an administrative GUI user must be created by using the add-guiadmin command.C. The Cisco Secure ACS SE supports command-line connections through an Ethernet interface.D. An ACL-based policy must be configured to allow administrative-user access.E. GUI access to the Cisco Secure ASC SE is not supported.

Correct Answer: BDSection: (none)Explanation

Explanation/Reference:

QUESTION 60When RADIUS NAC and AAA Override are enabled for a WLC on a Cisco ISE, which two statements about RADIUS NAC are true? (Choose two.)

Page 13: 300 208.Examcollection.premium.exam.174q

A. It returns an access-accept and sends the redirection URL for all users.B. It establishes secure connectivity between the RADIUS server and the Cisco ISE.C. It allows the Cisco ISE to send a CoA request that indicates when the user is authenticated.D. It is used for posture assessment, so the Cisco ISE changes the user profile based on posture result.E. It allows multiple users to authenticate at the same time.

Correct Answer: CDSection: (none)Explanation

Explanation/Reference:

QUESTION 61In the command 'aaa authentication default group tacacs local', how is the word 'default' defined?

A. Command setB. Group nameC. Method listD. Login type

Correct Answer: CSection: (none)Explanation

Explanation/Reference:

QUESTION 62In an 802.1X authorization process, a network access device provides which three functions? (Choose three.)

A. Filters traffic prior to authenticationB. Passes credentials to authentication serverC. Enforces policy provided by authentication serverD. Hosts a central web authentication pageE. Confirms supplicant protocol complianceF. Validates authentication credentials

Correct Answer: ABCSection: (none)Explanation

Explanation/Reference:

QUESTION 63Which two switchport commands enable MAB and allow non-802.1X capable devices to immediately run through the MAB process? (Choose two.)

A. authentication order mab dot1xB. authentication order dot1x mabC. no authentication timerD. dot1x timeout tx-periodE. authentication openF. mab

Correct Answer: AFSection: (none)Explanation

Explanation/Reference:

QUESTION 64Which two attributes must match between two Cisco ASA devices to properly enable high availability? (Choose two.)

A. model, interface configuration, and RAMB. major and minor software releaseC. tcp dead-peer detection protocolD. 802.1x authentication identity

Correct Answer: ABSection: (none)Explanation

Explanation/Reference:

QUESTION 65What are two client-side requirements of the NAC Agent and NAC Web Agent installation? (Choose two.)

A. Administrator workstation rightsB. Active Directory Domain membershipC. Allowing of web browser activex installationD. WSUS service running

Correct Answer: ACSection: (none)

Page 14: 300 208.Examcollection.premium.exam.174q

Explanation

Explanation/Reference:

QUESTION 66Which three algorithms should be avoided due to security concerns? (Choose three.)

A. DES for encryptionB. SHA-1 for hashingC. 1024-bit RSAD. AES GCM mode for encryptionE. HMAC-SHA-1F. 256-bit Elliptic Curve Diffie-HellmanG. 2048-bit Diffie-Hellman

Correct Answer: ABCSection: (none)Explanation

Explanation/Reference:

QUESTION 67In the command 'aaa authentication default group tacacs local', how is the word 'default' defined?

A. Command setB. Group nameC. Method listD. Login type

Correct Answer: CSection: (none)Explanation

Explanation/Reference:

QUESTION 68Which statement about IOS accounting is true?

A. A named list of AAA methods must be defined.B. A named list of accounting methods must be defined.C. Authorization must be configured before accounting.D. A named list of tracking methods must be defined.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:

QUESTION 69What are the initial steps to configure an ACS as a TACACS server?

A. 1. Choose Network Devices and AAA Clients > Network Resources.2. Click Create.

B. 1. Choose Network Resources > Network Devices and AAA Clients.2. Click Create.

C. 1. Choose Network Resources > Network Devices and AAA Clients.2. Click Manage.

D. 1. Choose Network Devices and AAA Clients > Network Resources.2. Click Install.

Correct Answer: BSection: (none)Explanation

Explanation/Reference:

QUESTION 70Which effect does the ip http secure-server command have on a Cisco ISE?

A. It enables the HTTP server for users to connect on the command line.B. It enables the HTTP server for users to connect by using web-based authentication.C. It enables the HTTPS server for users to connect by using web-based authentication.D. It enables the HTTPS server for users to connect on the command line.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:

QUESTION 71

Page 15: 300 208.Examcollection.premium.exam.174q

The NAC Agent v4.9.x uses which ports and protocols to communicate with an ISE Policy Service Node?

A. tcp/8905, http/80, ftp/21B. tcp/8905, http/80, https/443C. udp/8905, telnet/23, https/443D. udp/8906, http/80, https/443

Correct Answer: BSection: (none)Explanation

Explanation/Reference:

QUESTION 72Which two are valid ISE posture conditions? (Choose two.)

A. DictionaryB. memberOfC. Profile statusD. FileE. Service

Correct Answer: DESection: (none)Explanation

Explanation/Reference:

QUESTION 73A network engineer is configuring HTTP based CWA on a switch. Which three configuration elements are required? (Choose three.)

A. HTTP server enabledB. Radius authentication on the port with MABC. Redirect access-listD. Redirect-URLE. HTTP secure server enabledF. Radius authentication on the port with 802.1xG. Pre-auth port based access-list

Correct Answer: ABCSection: (none)Explanation

Explanation/Reference:

QUESTION 74Which three statements describe differences between TACACS+ and RADIUS? (Choose three.)

A. RADIUS encrypts the entire packet, while TACACS+ encrypts only the password.B. TACACS+ encrypts the entire packet, while RADIUS encrypts only the password.C. RADIUS uses TCP, while TACACS+ uses UDP.D. TACACS+ uses TCP, while RADIUS uses UDP.E. RADIUS uses ports 1812 and 1813, while TACACS+ uses port 49.F. TACACS+ uses ports 1812 and 1813, while RADIUS uses port 49

Correct Answer: BDESection: (none)Explanation

Explanation/Reference:

QUESTION 75Which two identity store options allow you to authorize based on group membership? (Choose two).

A. Lightweight Directory Access ProtocolB. RSA SecurID serverC. RADIUSD. Active Directory

Correct Answer: ADSection: (none)Explanation

Explanation/Reference:

QUESTION 76What attribute could be obtained from the SNMP query probe?

A. FQDNB. CDPC. DHCP class identifierD. User agent

Page 16: 300 208.Examcollection.premium.exam.174q

Correct Answer: BSection: (none)Explanation

Explanation/Reference:

QUESTION 77What is a required configuration step for an 802.1X capable switch to support dynamic VLAN and ACL assignments?

A. Configure the VLAN assignment.B. Configure the ACL assignment.C. Configure 802.1X authenticator authorization.D. Configure port security on the switch port.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:

QUESTION 78Which network component would issue the CoA?

A. switchB. endpointC. Admin NodeD. Policy Service Node

Correct Answer: DSection: (none)Explanation

Explanation/Reference:

QUESTION 79What steps must you perform to deploy a CA-signed identity certificate on an ISE device?

A. 1. Download the CA server certificate and install it on ISE.2. Generate a signing request and save it as a file.3. Access the CA server and submit the CA request.4. Install the issued certificate on the ISE.

B. 1. Download the CA server certificate and install it on ISE.2. Generate a signing request and save it as a file.3. Access the CA server and submit the CSR.4. Install the issued certificate on the CA server.

C. 1. Generate a signing request and save it as a file.2. Download the CA server certificate and install it on ISE.3. Access the ISE server and submit the CA request.4. Install the issued certificate on the CA server.

D. 1. Generate a signing request and save it as a file.2. Download the CA server certificate and install it on ISE.3. Access the CA server and submit the CSR.4. Install the issued certificate on the ISE.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:

QUESTION 80An organization has recently deployed ISE with Trustsec capable Cisco switches and would like to allow differentiated network access based on user groups. Whichsolution is most suitable for achieving these goals?

A. Cyber Threat Defense for user group control by leveraging Netflow exported from the Cisco switches and identity information from ISEB. MACsec in Multiple-Host Mode in order to encrypt traffic at each hop of the network infrastructureC. Identity-based ACLs preconfigured on the Cisco switches with user identities provided by ISED. Cisco Security Group Access Policies to control access based on SGTs assigned to different user groups

Correct Answer: DSection: (none)Explanation

Explanation/Reference:

QUESTION 81Which three are required steps to enable SXP on a Cisco ASA? (Choose three).

A. configure AAA authenticationB. configure passwordC. issue the aaa authorization command aaa-server group commandD. configure a peerE. configure TACACS

Page 17: 300 208.Examcollection.premium.exam.174q

F. issue the cts sxp enable command

Correct Answer: BDFSection: (none)Explanation

Explanation/Reference:

QUESTION 82Which three network access devices allow for static security group tag assignment? (Choose three.)

A. intrusion prevention systemB. access layer switchC. data center access switchD. load balancerE. VPN concentratorF. wireless LAN controller

Correct Answer: BCESection: (none)Explanation

Explanation/Reference:

QUESTION 83Which option is required for inline security group tag propagation?

A. Cisco Secure Access Control SystemB. hardware supportC. Security Group Tag Exchange Protocol (SXP) v4D. Cisco Identity Services Engine

Correct Answer: BSection: (none)Explanation

Explanation/Reference:

QUESTION 84Which two fields are characteristics of IEEE 802.1AE frame? (Choose two.)

A. destination MAC addressB. source MAC addressC. 802.1AE header in EtherTypeD. security group tag in EtherTypeE. integrity check valueF. CRC/FCS

Correct Answer: CESection: (none)Explanation

Explanation/Reference:

QUESTION 85Which two options are valid for configuring IEEE 802.1AE MACSec between switches in a TrustSec network? (Choose two.)

A. manually on links between supported switchesB. in the Cisco Identity Services EngineC. in the global configuration of a TrustSec non-seed switchD. dynamically on links between supported switchesE. in the Cisco Secure Access Control SystemF. in the global configuration of a TrustSec seed switch

Correct Answer: ADSection: (none)Explanation

Explanation/Reference:

QUESTION 86Which three pieces of information can be found in an authentication detail report? (Choose three.)

A. DHCP vendor IDB. user agent stringC. the authorization rule matched by the endpointD. the EAP method the endpoint is usingE. the RADIUS username being usedF. failed posture requirement

Correct Answer: CDESection: (none)

Page 18: 300 208.Examcollection.premium.exam.174q

Explanation

Explanation/Reference:

QUESTION 87Certain endpoints are missing DHCP profiling data.

Which option describes what can be used to determine if DHCP requests from clients are reaching Cisco ISE?

A. output of show interface gigabitEthernet 0 from the CLIB. output of debug logging all 7 from the CLIC. output of show logging application profiler.log from the CLID. the TCP dump diagnostic tool through the GUIE. the posture troubleshooting diagnostic tool through the GUI

Correct Answer: DSection: (none)Explanation

Explanation/Reference:

QUESTION 88Which debug command on a Cisco WLC shows the reason that a client session was terminated?

A. debug dot11 state enableB. debug dot1x packet enableC. debug client mac addrD. debug dtls event enableE. debug ap enable cisco ap

Correct Answer: CSection: (none)Explanation

Explanation/Reference:

QUESTION 89Which two identity databases are supported when PEAP-MSCHAPv2 is used as EAP type? (Choose two.)

A. Windows Active DirectoryB. LDAPC. RADIUS token serverD. internal endpoint storeE. internal user storeF. certificate authentication profileG. RSA SecurID

Correct Answer: AESection: (none)Explanation

Explanation/Reference:

QUESTION 90Which two Cisco Catalyst switch interface commands allow only a single voice device and a single data device to be connected to the IEEE 802.1X-enabledinterface? (Choose two.)

A. authentication host-mode single-hostB. authentication host-mode multi-domainC. authentication host-mode multi-hostD. authentication host-mode multi-auth

Correct Answer: ABSection: (none)Explanation

Explanation/Reference:

QUESTION 91Which RADIUS attribute is used primarily to differentiate an IEEE 802.1x request from a Cisco MAB request?

A. RADIUS Attribute (5) NAS-PortB. RADIUS Attribute (6) Service-TypeC. RADIUS Attribute (7) Framed-ProtocolD. RADIUS Attribute (61) NAS-Port-Type

Correct Answer: BSection: (none)Explanation

Explanation/Reference:

Page 19: 300 208.Examcollection.premium.exam.174q

QUESTION 92Which authorization method is the Cisco best practice to allow endpoints access to the Apple App store or Google Play store with Cisco WLC software version 7.6or newer?

A. dACLB. DNS ACLC. DNS ACL defined in Cisco ISED. redirect ACL

Correct Answer: BSection: (none)Explanation

Explanation/Reference:

QUESTION 93Which time allowance is the minimum that can be configured for posture reassessment interval?

A. 5 minutesB. 20 minutesC. 60 minutesD. 90 minutes

Correct Answer: CSection: (none)Explanation

Explanation/Reference:

QUESTION 94Which advanced authentication setting is needed to allow an unknown device to utilize Central WebAuth?

A. If Authentication failed > ContinueB. If Authentication failed > DropC. If user not found > ContinueD. If user not found > Reject

Correct Answer: CSection: (none)Explanation

Explanation/Reference:

QUESTION 95Which option restricts guests from connecting more than one device at a time?

A. Guest Portal policy > Set Device registration portal limitB. Guest Portal Policy > Set Allow only one guest session per userC. My Devices Portal > Set Maximum number of devices to registerD. Multi-Portal Policy > Guest users should be able to do device registration

Correct Answer: BSection: (none)Explanation

Explanation/Reference:

QUESTION 96In Cisco ISE, which two actions can be taken based on matching a profiler policy? (Choose two).

A. exceptionB. network scan (NMAP)C. delete endpointD. automatically remediateE. create matching identity group

Correct Answer: ABSection: (none)Explanation

Explanation/Reference:

QUESTION 97Which statement about the Cisco ISE BYOD feature is true?

A. Use of SCEP/CA is optional.B. BYOD works only on wireless access.C. Cisco ISE needs to integrate with MDM to support BYOD.D. Only mobile endpoints are supported.

Correct Answer: ASection: (none)Explanation

Page 20: 300 208.Examcollection.premium.exam.174q

Explanation/Reference:

QUESTION 98What user rights does an account need to join ISE to a Microsoft Active Directory domain?

A. Create and Delete Computer ObjectsB. Domain AdminC. Join and Leave DomainD. Create and Delete User Objects

Correct Answer: ASection: (none)Explanation

Explanation/Reference:

QUESTION 99A network administrator must enable which protocol to utilize EAP-Chaining?

A. EAP-FASTB. EAP-TLSC. MSCHAPv2D. PEAP

Correct Answer: ASection: (none)Explanation

Explanation/Reference:

QUESTION 100The corporate security policy requires multiple elements to be matched in an authorization policy. Which elements can be combined to meet the requirement?

A. Device registration status and device activation statusB. Network access device and time conditionC. User credentials and server certificateD. Built-in profile and custom profile

Correct Answer: BSection: (none)Explanation

Explanation/Reference:

QUESTION 101A network administrator needs to determine the ability of existing network devices to deliver key BYOD services. Which tool will complete a readiness assessmentand outline hardware and software capable and incapable devices?

A. Prime InfrastructureB. Network Control SystemC. Cisco Security ManagerD. Identity Services Engine

Correct Answer: ASection: (none)Explanation

Explanation/Reference:

QUESTION 102Which EAP method uses a modified version of the MS-CHAP authentication protocol?

A. EAP-POTPB. EAP-TLSC. LEAPD. EAP-MD5

Correct Answer: CSection: (none)Explanation

Explanation/Reference:

QUESTION 103Under which circumstance would an inline posture node be deployed?

A. When the NAD does not support CoAB. When the NAD cannot support the number of connected endpointsC. When a PSN is overloadedD. To provide redundancy for a PSN

Page 21: 300 208.Examcollection.premium.exam.174q

Correct Answer: ASection: (none)Explanation

Explanation/Reference:

QUESTION 104Which Cisco ISE 1.x protocol can be used to control admin access to network access devices?

A. TACACS+B. RADIUSC. EAPD. Kerberos

Correct Answer: BSection: (none)Explanation

Explanation/Reference:

QUESTION 105A user is on a wired connection and the posture status is noncompliant.

Which state will their EPS session be placed in?

A. disconnectedB. limitedC. no accessD. quarantined

Correct Answer: DSection: (none)Explanation

Explanation/Reference:

QUESTION 106Which three posture states can be used for authorization rules? (Choose three.)

A. unknownB. knownC. noncompliantD. quarantinedE. compliantF. no accessG. limited

Correct Answer: ACESection: (none)Explanation

Explanation/Reference:

QUESTION 107Which two Cisco ISE administration options are available in the Default Posture Status setting? (Choose two.)

A. UnknownB. CompliantC. FailOpenD. FailCloseE. Noncompliant

Correct Answer: BESection: (none)Explanation

Explanation/Reference:

QUESTION 108Which two portals can be configured to use portal FQDN? (Choose two.)

A. adminB. sponsorC. guestD. my devicesE. monitoring and troubleshooting

Correct Answer: BDSection: (none)Explanation

Explanation/Reference:

Page 22: 300 208.Examcollection.premium.exam.174q

QUESTION 109Which five portals are provided by PSN? (Choose five.)

A. guestB. sponsorC. my devicesD. blacklistE. client provisioningF. adminG. monitoring and troubleshooting

Correct Answer: ABCDESection: (none)Explanation

Explanation/Reference:

QUESTION 110When you add a new PSN for guest access services, which two options must be enabled under deployment settings? (Choose two.)

A. AdminB. MonitoringC. Policy ServiceD. Session ServicesE. Profiling

Correct Answer: CDSection: (none)Explanation

Explanation/Reference:

QUESTION 111In Cisco ISE, which probe must be enabled to collect profiling data using Device Sensor?

A. RADIUSB. SNMPQueryC. SNMPTrapD. Network ScanE. Syslog

Correct Answer: ASection: (none)Explanation

Explanation/Reference:

QUESTION 112Which two profile attributes can be collected by a Cisco Catalyst Switch that supports Device Sensor? (Choose two.)

A. LLDP agent informationB. user agentC. DHCP optionsD. open portsE. operating systemF. trunk ports

Correct Answer: ACSection: (none)Explanation

Explanation/Reference:

QUESTION 113Which two profile attributes can be collected by a Cisco Wireless LAN Controller that supports Device Sensor? (Choose two.)

A. LLDP agent informationB. user agentC. DHCP optionsD. open portsE. CDP agent informationF. FQDN

Correct Answer: BCSection: (none)Explanation

Explanation/Reference:

QUESTION 114Which statement about Cisco ISE BYOD is true?

Page 23: 300 208.Examcollection.premium.exam.174q

A. Dual SSID allows EAP-TLS only when connecting to the secured SSID.B. Single SSID does not require endpoints to be registered.C. Dual SSID allows BYOD for guest users.D. Single SSID utilizes open SSID to accommodate different types of users.E. Single SSID allows PEAP-MSCHAPv2 for native supplicant provisioning.

Correct Answer: ESection: (none)Explanation

Explanation/Reference:

QUESTION 115Which two types of client provisioning resources are used for BYOD implementations? (Choose two.)

A. user agentB. Cisco NAC agentC. native supplicant profilesD. device sensorE. software provisioning wizards

Correct Answer: CESection: (none)Explanation

Explanation/Reference:

QUESTION 116Which protocol sends authentication and accounting in different requests?

A. RADIUSB. TACACS+C. EAP-ChainingD. PEAPE. EAP-TLS

Correct Answer: BSection: (none)Explanation

Explanation/Reference:

QUESTION 117You enabled the guest session limit feature on the Cisco ISE. However, end users report that the same guest can log in from multiple devices simultaneously.

Which configuration is missing on the network access device?

A. RADIUS authenticationB. RADIUS accountingC. DHCP requiredD. AAA override

Correct Answer: BSection: (none)Explanation

Explanation/Reference:

QUESTION 118A properly configured Cisco ISE Policy Service node is not receiving any profile data from a Cisco switch that runs Device Sensor.

Which option is the most likely reason for the failure?

A. Syslog is configured for the Policy Administration Node.B. RADIUS Accounting is disabled.C. The SNMP community strings are mismatched.D. RADIUS Authentication is misconfigured.E. The connected endpoints support CDP but not DHCP.

Correct Answer: BSection: (none)Explanation

Explanation/Reference:

QUESTION 119

Select and Place:

Page 24: 300 208.Examcollection.premium.exam.174q

Correct Answer:

Section: (none)Explanation

Explanation/Reference:

QUESTION 120Changes were made to the ISE server while troubleshooting, and now all wireless certificate authentications are failing. Logs indicate an EAP failure. What are thetwo possible causes of the problem? (Choose two.)

A. EAP-TLS is not checked in the Allowed Protocols listB. Client certificate is not included in the Trusted Certificate StoreC. MS-CHAPv2-is not checked in the Allowed Protocols listD. Default rule denies all trafficE. Certificate authentication profile is not configured in the Identity Store

Correct Answer: AESection: (none)Explanation

Explanation/Reference:

QUESTION 121Which action must an administrator take after joining a Cisco ISE deployment to an Active Directory domain?

A. Choose an Active Directory user.B. Configure the management IP address.C. Configure replication.D. Choose an Active Directory group.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:

QUESTION 122Which feature of Cisco ASA allows VPN users to be postured against Cisco ISE without requiring an inline posture node?

A. RADIUS Change of AuthorizationB. device trackingC. DHCP snooping

Page 25: 300 208.Examcollection.premium.exam.174q

D. VLAN hopping

Correct Answer: ASection: (none)Explanation

Explanation/Reference:

QUESTION 123After an endpoint has completed authentication with MAB, a security violation is triggered because a different MAC address was detected. Which host mode mustbe active on the port?

A. single-host modeB. multidomain authentication host modeC. multiauthentication host modeD. multihost mode

Correct Answer: ASection: (none)Explanation

Explanation/Reference:

QUESTION 124Refer to the exhibit.

You are configuring permissions for a new Cisco ISE standard authorization profile. If you configure the Tunnel-Private-Group-ID attribute as shown, what does thevalue 123 represent?

A. the VLAN IDB. the VRF IDC. the tunnel IDD. the group ID

Correct Answer: ASection: (none)Explanation

Explanation/Reference:

QUESTION 125Where would a Cisco ISE administrator define a named ACL to use in an authorization policy?

A. In the conditions of an authorization rule.B. In the attributes of an authorization rule.C. In the permissions of an authorization rule.D. In an authorization profile associated with an authorization rule.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:

QUESTION 126Refer to the exhibit.

Which URL must you enter in the External Webauth URL field to configure Cisco ISE CWA correctly?

A. https://ip_address:8443/guestportal/Login.actionB. https://ip_address:443/guestportal/Welcome.htmlC. https://ip_address:443/guestportal/action=cppD. https://ip_address:8905/guestportal/Sponsor.action

Correct Answer: ASection: (none)Explanation

Page 26: 300 208.Examcollection.premium.exam.174q

Explanation/Reference:

QUESTION 127When you configure an endpoint profiling policy rule, which option describes the purpose of the minimum certainty factor?

A. It is compared to the total certainty metric of an individual endpoint to determine whether the endpoint can be trusted.B. It is compared to the assigned certainty value of an individual endpoint in a device database to determine whether the endpoint can be trusted.C. It is used to compare the policy condition to other active policies.D. It is used to determine the likelihood that an endpoint is an active, trusted device on the network.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:

QUESTION 128You have configured a Cisco ISE 1.2 deployment for self-registration of guest users. What two options can you select from to determine when the account durationtimer begins? (Choose two.)

A. CreateTimeB. FirstLoginC. BeginLoginD. StartTime

Correct Answer: ABSection: (none)Explanation

Explanation/Reference:

QUESTION 129Which error in a redirect ACL can cause the redirection of an endpoint to the provisioning portal to fail?

A. The redirect ACL is blocking access to ports 80 and 443.B. The redirect ACL is applied to an incorrect SVI.C. The redirect ACL is blocking access to the client provisioning portal.D. The redirect ACL is blocking access to Cisco ISE port 8905.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:

QUESTION 130Where must periodic re-authentication be configured to allow a client to come out of the quarantine state and become compliant?

A. on the switch portB. on the router portC. on the supplicantD. on the controller

Correct Answer: ASection: (none)Explanation

Explanation/Reference:

QUESTION 131Which functionality does the Cisco ISE self-provisioning flow provide?

A. It provides support for native supplicants, allowing users to connect devices directly to the network.B. It provides the My Devices portal, allowing users to add devices to the network.C. It provides support for users to install the Cisco NAC agent on enterprise devices.D. It provides self-registration functionality to allow guest users to access the network.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:

QUESTION 132During client provisioning on a Mac OS X system, the client system fails to renew its IP address. Which change can you make to the agent profile to correct theproblem?

A. Enable the Agent IP Refresh feature.B. Enable the Enable VLAN Detect Without UI feature.C. Enable CRL checking.D. Edit the Discovery Host parameter to use an IP address instead of an FQDN.

Page 27: 300 208.Examcollection.premium.exam.174q

Correct Answer: ASection: (none)Explanation

Explanation/Reference:

QUESTION 133Where is dynamic SGT classification configured?

A. Cisco ISEB. NADC. supplicantD. RADIUS proxy

Correct Answer: ASection: (none)Explanation

Explanation/Reference:

QUESTION 134What is the function of the SGACL policy matrix on a Cisco TrustSec domain with SGT Assignment?

A. It determines which access policy to apply to the endpoint.B. It determines which switches are trusted within the TrustSec domain.C. It determines the path the SGT of the packet takes when entering the Cisco TrustSec domain.D. It lists all servers that are permitted to participate in the TrustSec domain.E. It lists all hosts that are permitted to participate in the TrustSec domain.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:

QUESTION 135You are configuring SGA on a network device that is unable to perform SGT tagging. How can the device propagate SGT information?

A. The device can use SXP to pass IP-address-to-SGT mappings to a TrustSec-capable hardware peer.B. The device can use SXP to pass MAC-address-to-STG mappings to a TrustSec-capable hardware peer.C. The device can use SXP to pass MAC-address-to-IP mappings to a TrustSec-capable hardware peer.D. The device can propagate SGT information in an encapsulated security payload.E. The device can use a GRE tunnel to pass the SGT information to a TrustSec-capable hardware peer.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:

QUESTION 136Refer to the exhibit.

Page 28: 300 208.Examcollection.premium.exam.174q

The links outside the TrustSec area in the given SGA architecture are unprotected. On which two links does EAC take place? (Choose two.)

A. between switch 2 and switch 3B. between switch 5 and host 2C. between host 1 and switch 1D. between the authentication server and switch 4E. between switch 1 and switch 2F. between switch 1 and switch 5

Correct Answer: ABSection: (none)Explanation

Explanation/Reference:

QUESTION 137Which three host modes support MACsec? (Choose three.)

A. multidomain authentication host modeB. multihost modeC. multi-MAC host modeD. single-host modeE. dual-host modeF. multi-auth host mode

Correct Answer: ABDSection: (none)Explanation

Explanation/Reference:

QUESTION 138You are troubleshooting wired 802.1X authentications and see the following error:"Authentication failed: 22040 Wrong password or invalid shared secret." What should you inspect to determine the problem?

A. RADIUS shared secretB. Active Directory shared secretC. Identity source sequenceD. TACACS+ shared secretE. Certificate authentication profile

Correct Answer: A

Page 29: 300 208.Examcollection.premium.exam.174q

Section: (none)Explanation

Explanation/Reference:

QUESTION 139Refer to the exhibit.

You are troubleshooting RADIUS issues on the network and the debug radius command returns the given output. What is the most likely reason for the failure?

A. An invalid username or password was entered.B. The RADIUS port is incorrect.C. The NAD is untrusted by the RADIUS server.D. The RADIUS server is unreachable.E. RADIUS shared secret does not match

Correct Answer: ASection: (none)Explanation

Explanation/Reference:

QUESTION 140What are two possible reasons why a scheduled nightly backup of ISE to a FTP repository would fail? (Choose two.)

A. ISE attempted to write the backup to an invalid path on the FTP server.B. The ISE and FTP server clocks are out of sync.C. The username and password for the FTP server are invalid.D. The server key is invalid or misconfigured.E. TCP port 69 is disabled on the FTP server.

Correct Answer: ACSection: (none)Explanation

Explanation/Reference:

QUESTION 141Which two statements about MAB are true? (Choose two.)

A. It requires a preexisting database of the MAC addresses of permitted devices.B. It is unable to control network access at the edge.C. If MAB fails, the device is unable to fall back to another authentication method.D. It is unable to link the IP and MAC addresses of a device.E. It is unable to authenticate individual users.

Correct Answer: AESection: (none)Explanation

Explanation/Reference:

QUESTION 142Which type of access list is the most scalable that Cisco ISE can use to implement network authorization enforcement for a large number of users?

A. downloadable access listsB. named access listsC. VLAN access listsD. MAC address access lists

Correct Answer: ASection: (none)

Page 30: 300 208.Examcollection.premium.exam.174q

Explanation

Explanation/Reference:

QUESTION 143When you select Centralized Web Auth in the ISE Authorization Profile, which two components host the web authentication portal? (Choose two.)

A. ISEB. the WLCC. the access pointD. the switchE. the endpoints

Correct Answer: BDSection: (none)Explanation

Explanation/Reference:

QUESTION 144What is the default posture status for non-agent capable devices, such as Linux and iDevices?

A. UnknownB. ValidatedC. DefaultD. Compliant

Correct Answer: DSection: (none)Explanation

Explanation/Reference:

QUESTION 145Your guest-access wireless network is experiencing degraded performance and excessive latency due to user saturation. Which type of rate limiting can youimplement on your network to correct the problem?

A. per-deviceB. per-policyC. per-access pointD. per-controllerE. per-application

Correct Answer: ASection: (none)Explanation

Explanation/Reference:

QUESTION 146You are installing Cisco ISE on nodes that will be used in a distributed deployment. After the initial bootstrap process, what state will the Cisco ISE nodes be in?

A. RemoteB. Policy serviceC. AdministrationD. Standalone

Correct Answer: DSection: (none)Explanation

Explanation/Reference:

QUESTION 147What three changes require restarting the application service on an ISE node? (Choose three.)

A. Registering a node.B. Changing the primary node to standalone.C. Promoting the administration node.D. Installing the root CA certificate.E. Changing the guest portal default port settings.F. Adding a network access device.

Correct Answer: ABCSection: (none)Explanation

Explanation/Reference:

QUESTION 148Which default identity source is used by the MyDevices_Portal_Sequence identity source sequence?

Page 31: 300 208.Examcollection.premium.exam.174q

A. internal usersB. guest usersC. Active DirectoryD. internal endpointsE. RADIUS servers

Correct Answer: ASection: (none)Explanation

Explanation/Reference:

QUESTION 149What EAP method supports mutual certificate-based authentication?

A. EAP-TTLSB. EAP-MSCHAPC. EAP-TLSD. EAP-MD5

Correct Answer: CSection: (none)Explanation

Explanation/Reference:

QUESTION 150Which two Active Directory authentication methods are supported by Cisco ISE? (Choose two.)

A. MS-CHAPv2B. PEAPC. PPTPD. EAP-PEAPE. PPP

Correct Answer: ABSection: (none)Explanation

Explanation/Reference:

QUESTION 151Which statement about a distributed Cisco ISE deployment is true?

A. It can support up to two monitoring Cisco ISE nodes for high availability.B. It can support up to three load-balanced Administration ISE nodes.C. Policy Service ISE nodes can be configured in a redundant failover configuration.D. The Active Directory servers of Cisco ISE can be configured in a load-balanced configuration.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:

QUESTION 152Which Cisco ISE feature can differentiate a corporate endpoint from a personal device?

A. EAP chainingB. PAC filesC. authenticated in-band provisioningD. machine authentication

Correct Answer: ASection: (none)Explanation

Explanation/Reference:

QUESTION 153Which configuration must you perform on a switch to deploy Cisco ISE in low-impact mode?

A. Configure an ingress port ACL on the switchport.B. Configure DHCP snooping globally.C. Configure IP-device tracking.D. Configure BPDU filtering.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:

Page 32: 300 208.Examcollection.premium.exam.174q

QUESTION 154Which profiling capability allows you to gather and forward network packets to an analyzer?

A. collectorB. spannerC. retrieverD. aggregator

Correct Answer: ASection: (none)Explanation

Explanation/Reference:

QUESTION 155Which network access device feature can you configure to gather raw endpoint data?

A. Device SensorB. Device ClassifierC. Switched Port AnalyzerD. Trust Anchor

Correct Answer: ASection: (none)Explanation

Explanation/Reference:

QUESTION 156Which method does Cisco prefer to securely deploy guest wireless access in a BYOD implementation?

A. deploying a dedicated Wireless LAN Controller in a DMZB. configuring a guest SSID with WPA2 Enterprise authenticationC. configuring guest wireless users to obtain DHCP centrally from the corporate DHCP serverD. disabling guest SSID broadcasting

Correct Answer: ASection: (none)Explanation

Explanation/Reference:

QUESTION 157Which mechanism does Cisco ISE use to force a device off the network if it is reported lost or stolen?

A. CoAB. dynamic ACLsC. SGACLD. certificate revocation

Correct Answer: ASection: (none)Explanation

Explanation/Reference:

QUESTION 158You discover that the Cisco ISE is failing to connect to the Active Directory server. Which option is a possible cause of the problem?

A. NTP server time synchronization is configured incorrectly.B. There is a certificate mismatch between Cisco ISE and Active Directory.C. NAT statements required for Active Directory are configured incorrectly.D. The RADIUS authentication ports are being blocked by the firewall.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:

QUESTION 159Which type of remediation does Windows Server Update Services provide?

A. automatic remediationB. administrator-initiated remediationC. redirect remediationD. central Web auth remediation

Correct Answer: ASection: (none)Explanation

Page 33: 300 208.Examcollection.premium.exam.174q

Explanation/Reference:

QUESTION 160Which three remediation actions are supported by the Web Agent for Windows? (Choose three.)

A. Automatic RemediationB. Message textC. URL LinkD. File DistributionE. AV definition updateF. Launch Program

Correct Answer: BCDSection: (none)Explanation

Explanation/Reference:

QUESTION 161What endpoint operating system provides native support for the SPW?

A. Apple iOSB. Android OSC. Windows 8D. Mac OS X

Correct Answer: ASection: (none)Explanation

Explanation/Reference:

QUESTION 162Which condition triggers wireless authentication?

A. NAS-Port-Type is set to IEEE 802.11.B. Framed-Compression is set to None.C. Service-Type is set to Framed.D. Tunnel-Type is set to VLAN.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:

QUESTION 163Which feature enables the Cisco ISE DHCP profiling capabilities to determine and enforce authorization policies on mobile devices?

A. disabling the DHCP proxy optionB. DHCP option 42C. DHCP snoopingD. DHCP spoofing

Correct Answer: ASection: (none)Explanation

Explanation/Reference:

QUESTION 164With which two appliance-based products can Cisco Prime Infrastructure integrate to perform centralized management? (Choose two.)

A. Cisco Managed Services EngineB. Cisco Email Security ApplianceC. Cisco Wireless Location ApplianceD. Cisco Content Security ApplianceE. Cisco ISE

Correct Answer: AESection: (none)Explanation

Explanation/Reference:

QUESTION 165Which two options are EAP methods supported by Cisco ISE? (Choose two.)

A. EAP-FASTB. EAP-TLSC. EAP-MS-CHAPv2

Page 34: 300 208.Examcollection.premium.exam.174q

D. EAP-GTC

Correct Answer: ABSection: (none)Explanation

Explanation/Reference:

QUESTION 166You configured wired 802.1X with EAP-TLS on Windows machines. The ISE authentication detail report shows "EAP-TLS failed SSL/TLS handshake because of anunknown CA in the client certificates chain." What is the most likely cause of this error?

A. The ISE certificate store is missing a CA certificate.B. The Wireless LAN Controller is missing a CA certificate.C. The switch is missing a CA certificate.D. The Windows Active Directory server is missing a CA certificate.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:

QUESTION 167What type of identity group is the Blacklist identity group?

A. endpointB. userC. blackholeD. quarantineE. denied systems

Correct Answer: ASection: (none)Explanation

Explanation/Reference:

QUESTION 168Which feature must you configure on a switch to allow it to redirect wired endpoints to Cisco ISE?

A. the http secure-server commandB. RADIUS Attribute 29C. the RADIUS VSA for accountingD. the RADIUS VSA for URL-REDIRECT

Correct Answer: ASection: (none)Explanation

Explanation/Reference:

QUESTION 169In this simulation, you are task to examine the various authentication events using the ISE GUI. For example, you should see events like Authentication succeeded.Authentication failed and etc...

Page 35: 300 208.Examcollection.premium.exam.174q
Page 36: 300 208.Examcollection.premium.exam.174q

Which four statements are correct regarding the event that occurred at 2014-05-07 00:19:07.004? (Choose four.)

A. The IT_Corp authorization profile were applied.B. The it1 user was matched to the IT_Corp authorization policy.C. The it1 user supplicant used the PEAP (EAP-MSCHAPv2) authentication method.D. The it1 user was authenticated using MAB.E. The it1 user was successfully authenticated against AD1 identity store.F. The it1 user machine has been profiled as a Microsoft-Workstation.G. The it1 user machine has passed all the posture assessement tests.

Correct Answer: BCEFSection: (none)Explanation

Explanation/Reference:Explanation:Here are the details shown for this event:

Page 37: 300 208.Examcollection.premium.exam.174q
Page 38: 300 208.Examcollection.premium.exam.174q

QUESTION 170In this simulation, you are task to examine the various authentication events using the ISE GUI. For example, you should see events like Authentication succeeded.Authentication failed and etc...

Page 39: 300 208.Examcollection.premium.exam.174q

Which three statements are correct regarding the events with the 20 repeat count that occurred at 2014-05-07 00:22:48.748? (Choose three.)

A. The device was successfully authenticated using MAB.B. The device matched the Machine_Corp authorization policy.C. The Print Servers authorization profile were applied.D. The device was profiled as a Linksys-PrintServer.E. The device MAC address is 00:14:BF:70:B5:FB.F. The device is connected to the Gi0/1 switch port and the switch IP address is 10.10.2.2.

Correct Answer: ADESection: (none)Explanation

Explanation/Reference:Explanation:Event Details:

Page 40: 300 208.Examcollection.premium.exam.174q
Page 41: 300 208.Examcollection.premium.exam.174q

...continued:

Page 42: 300 208.Examcollection.premium.exam.174q
Page 43: 300 208.Examcollection.premium.exam.174q

QUESTION 171In this simulation, you are task to examine the various authentication events using the ISE GUI. For example, you should see events like Authentication succeeded.Authentication failed and etc...

Page 44: 300 208.Examcollection.premium.exam.174q
Page 45: 300 208.Examcollection.premium.exam.174q

Which two statements are correct regarding the event that occurred at 2014-05-07 00:22:48.175? (Choose two.)

A. The DACL will permit http traffic from any host to 10.10.2.20B. The DACL will permit http traffic from any host to 10.10.3.20C. The DACL will permit icmp traffic from any host to 10.10.2.20D. The DACL will permit icmp traffic from any host to 10.10.3.20E. The DACL will permit https traffic from any host to 10.10.3.20

Correct Answer: AESection: (none)Explanation

Explanation/Reference:Explanation:Event Details:

Page 46: 300 208.Examcollection.premium.exam.174q
Page 47: 300 208.Examcollection.premium.exam.174q
Page 48: 300 208.Examcollection.premium.exam.174q
Page 49: 300 208.Examcollection.premium.exam.174q

QUESTION 172In this simulation, you are task to examine the various authentication events using the ISE GUI. For example, you should see events like Authentication succeeded.Authentication failed and etc...

Page 50: 300 208.Examcollection.premium.exam.174q
Page 51: 300 208.Examcollection.premium.exam.174q

Which two statements are correct regarding the event that occurred at 2014-05-07 00:16:55.393? (Choose two.)

A. The failure reason was user entered the wrong username.B. The supplicant used the PAP authentication method.C. The username entered was it1.D. The user was authenticated against the Active Directory then also against the ISE interal user database and both fails.E. The NAS switch port where the user connected to has a MAC address of 44:03:A7:62:41:7FF. The user is being authenticated using 802.1X.G. The user failed the MAB.H. The supplicant stopped responding to ISE which caused the failure.

Correct Answer: CFSection: (none)Explanation

Explanation/Reference:Explanation:Event Details:

Page 52: 300 208.Examcollection.premium.exam.174q
Page 53: 300 208.Examcollection.premium.exam.174q
Page 54: 300 208.Examcollection.premium.exam.174q
Page 55: 300 208.Examcollection.premium.exam.174q

QUESTION 173The Secure-X company has recently successfully tested the 802.1X authentication deployment using the Cisco Catalyst switch and the Cisco ISEv1.2 appliance.Currently, each employee desktop is connected to an 802.1X enabled switch port and is able to use the Cisco AnyConnect NAM 802.1Xsupplicantto log in andconnect to the network.Currently, a new testing requirement is to add a network printer to the Fa0/19 switch port and have it connect to the network. The network printer does not support802.1X supplicant. The Fa0/19 switch port is now configured to use 802.1X authentication only.To support this network printer, the Fa0/19 switch port configuration needs to be edited to enable the network printer to authenticate using its MAC address. Thenetwork printer should also be on VLAN 9.Another network security engineer responsible for managing the Cisco ISE has already per-configured all the requirements on the Cisco ISE, including adding thenetwork printer MAC address to the Cisco ISE endpoint database and etc...Your task in the simulation is to access the Cisco Catalyst Switch console then use the CLI to:• Enable only the Cisco Catalyst Switch Fa0/19 switch port to authenticate the network printer using its MAC address and:• Ensure that MAC address authentication processing is not delayed until 802.1Xfails• Ensure that even if MAC address authentication passes, the switch will still perform 802.1X authentication if requested by a 802.1X supplicant• Use the required show command to verify the MAC address authentication on the Fa0/19 is successfulThe switch enable password is CiscoFor the purpose of the simulation, to test the network printer, assume the network printer will be unplugged then plugged back into the Fa0/19 switch port after youhave finished the required configurations on the Fa0/19 switch port.Note: For this simulation, you will not need and do not have access to the ISE GUI To access the switch CLI, click the Switch icon in the topology diagram

Correct Answer: Review the explanation for full configuration and solution.Section: (none)Explanation

Explanation/Reference:Initial configuration for fa 0/19 that is already done:

AAA configuration has already been done for us. We need to configure mac address bypass on this port to achieve the goal stated in the question. To do this wesimply need to add this command under the interface:

mab

Then do a shut/no shut on the interface.

Verification:

Page 56: 300 208.Examcollection.premium.exam.174q

QUESTION 174The Secure-X company has started to tested the 802.1X authentication deployment using the Cisco Catalyst 3560-X layer 3 switch and the Cisco ISEvl2 appliance.Each employee desktop will be connected to the 802.1X enabled switch port and will use the Cisco AnyConnect NAM 802.1X supplicant to log in and connect to thenetwork.Your particular tasks in this simulation are to create a new identity source sequence named AD_internal which will first use the Microsoft Active Directory (AD1) thenuse the ISE Internal User database. Once the new identity source sequence has been configured, edit the existing DotlX authentication policy to use the newAD_internal identity source sequence.The Microsoft Active Directory (AD1) identity store has already been successfully configured, you just need to reference it in your configuration.

In addition to the above, you are also tasked to edit the IT users authorization policy so IT users who successfully authenticated will get the permission of theexisting IT_Corp authorization profile.Perform this simulation by accessing the ISE GUI to perform the following tasks:• Create a new identity source sequence named AD_internal to first use the Microsoft Active Directory (AD1) then use the ISE Internal User database• Edit the existing Dot1X authentication policy to use the new AD_internal identity source sequence:• If authentication failed-reject the access request• If user is not found in AD-Drop the request without sending a response• If process failed-Drop the request without sending a response• Edit the IT users authorization policy so IT users who successfully authenticated will get the permission of the existing IT_Corp authorization profile.To access the ISE GUI, click the ISE icon in the topology diagram. To verify your configurations, from the ISE GUI, you should also see the AuthenticationSucceeded event for the it1 user after you have successfully defined the DotlX authentication policy to use the Microsoft Active Directory first then use the ISEInternal User Database to authenticate the user. And in the Authentication Succeeded event, you should see the IT_Corp authorization profile being applied to theit1 user. If your configuration is not correct and ISE can't authenticate the user against the Microsoft Active Directory, you should see the Authentication Failed eventinstead for the it1 user.Note: If you make a mistake in the Identity Source Sequence configuration, please delete the Identity Source Sequence then re-add a new one. The edit IdentitySource Sequence function is not implemented in this simulation.

Page 57: 300 208.Examcollection.premium.exam.174q

Correct Answer: Review the explanation for full configuration and solution.Section: (none)Explanation

Explanation/Reference:Step 1: create a new identity source sequence named AD_internal which will first use the Microsoft Active Directory (AD1) then use the ISE Internal User databaseas shown below:

Step 2: Edit the existing Dot1x policy to use the newly created Identity Source:

Then hit Done and save.