300-208 Exam - Implementing Cisco Secure Access Solutions (SISAS)

certleader.com

Q1. In this simulation, you are task to examine the various authentication events using the ISE GUI. For example, you should see events like Authentication succeeded. Authentication failed and etc... 

Which three statements are correct regarding the events with the 20 repeat count that occurred at 2014-05-07 00:22:48.748? (Choose three.) 

A. The device was successfully authenticated using MAB. 

B. The device matched the Machine_Corp authorization policy. 

C. The Print Servers authorization profile were applied. 

D. The device was profiled as a Linksys-PrintServer. 

E. The device MAC address is 00:14:BF:70:B5:FB. 

F. The device is connected to the Gi0/1 switch port and the switch IP address is 10.10.2.2. 

Answer: A,D,E 

Explanation: 

Event Details: 

Screen Shot 2015-06-23 at 5.32.43 PM …continued: 

Screen Shot 2015-06-23 at 5.33.24 PM 

Q2. Which RADIUS attribute is used primarily to differentiate an IEEE 802.1x request from a Cisco MAB request? 

A. RADIUS Attribute (5) NAS-Port 

B. RADIUS Attribute (6) Service-Type 

C. RADIUS Attribute (7) Framed-Protocol 

D. RADIUS Attribute (61) NAS-Port-Type 

Answer:

Q3. Which model does Cisco support in a RADIUS change of authorization implementation? 

A. push 

B. pull 

C. policy 

D. security 

Answer:

Q4. Which action must an administrator take after joining a Cisco ISE deployment to an Active Directory domain? 

A. Choose an Active Directory user. 

B. Configure the management IP address. 

C. Configure replication. 

D. Choose an Active Directory group. 

Answer:

Q5. When you configure an endpoint profiling policy rule, which option describes the purpose of the minimum certainty factor? 

A. It is compared to the total certainty metric of an individual endpoint to determine whether the endpoint can be trusted. 

B. It is compared to the assigned certainty value of an individual endpoint in a device database to determine whether the endpoint can be trusted. 

C. It is used to compare the policy condition to other active policies. 

D. It is used to determine the likelihood that an endpoint is an active, trusted device on the network. 

Answer:

Q6. Which two identity store options allow you to authorize based on group membership? (Choose two). 

A. Lightweight Directory Access Protocol 

B. RSA SecurID server 

C. RADIUS 

D. Active Directory 

Answer: A,D 

Q7. Which two statements about administrative access to the Cisco Secure ACS SE are true? (Choose two.) 

A. The Cisco Secure ACS SE supports command-line connections through a serial-port connection. 

B. For GUI access, an administrative GUI user must be created by using the add-guiadmin command. 

C. The Cisco Secure ACS SE supports command-line connections through an Ethernet interface. 

D. An ACL-based policy must be configured to allow administrative-user access. 

E. GUI access to the Cisco Secure ASC SE is not supported. 

Answer: B,D 

Q8. Refer to the exhibit. 

Which three statements about the given configuration are true? (Choose three.) 

A. TACACS+ authentication configuration is complete. 

B. TACACS+ authentication configuration is incomplete. 

C. TACACS+ server hosts are configured correctly. 

D. TACACS+ server hosts are misconfigured. 

E. The TACACS+ server key is encrypted. 

F. The TACACS+ server key is unencrypted. 

Answer: B,C,F 

Q9. Which two statements about Cisco NAC Agents that are installed on clients that interact with the Cisco ISE profiler are true? (Choose two.) 

A. They send endpoint data to AAA servers. 

B. They collect endpoint attributes. 

C. They interact with the posture service to enforce endpoint security policies. 

D. They block access from the network through noncompliant endpoints. 

E. They store endpoints in the Cisco ISE with their profiles. 

F. They evaluate clients against posture policies, to enforce requirements. 

Answer: C,F 

Q10. You are installing Cisco ISE on nodes that will be used in a distributed deployment. After the initial bootstrap process, what state will the Cisco ISE nodes be in? 

A. Remote 

B. Policy service 

C. Administration 

D. Standalone 

Answer: