ccnp security sisas 300 208 official cert guide [May 2017]

Act now and download your Cisco ccnp security sisas 300 208 official cert guide test today! Do not waste time for the worthless Cisco 300 208 dumps tutorials. Download Renovate Cisco Implementing Cisco Secure Access Solutions (SISAS) exam with real questions and answers and begin to learn Cisco 300 208 dumps with a classic professional.


The article at Testaimer.com going over http://www.testaimer.com/300-208-test is very comprehensive.

Q21. Which two attributes must match between two Cisco ASA devices to properly enable high availability? (Choose two.) 

A. model, interface configuration, and RAM 

B. major and minor software release 

C. tcp dead-peer detection protocol 

D. 802.1x authentication identity 

Answer: A,B 


Q22. Under which circumstance would an inline posture node be deployed? 

A. When the NAD does not support CoA 

B. When the NAD cannot support the number of connected endpoints 

C. When a PSN is overloaded 

D. To provide redundancy for a PSN 

Answer:


Q23. Which command in the My Devices Portal can restore a previously lost device to the network? 

A. Reset 

B. Found 

C. Reinstate 

D. Request 

Answer:


Q24. Which RADIUS attribute is used primarily to differentiate an IEEE 802.1x request from a Cisco MAB request? 

A. RADIUS Attribute (5) NAS-Port 

B. RADIUS Attribute (6) Service-Type 

C. RADIUS Attribute (7) Framed-Protocol 

D. RADIUS Attribute (61) NAS-Port-Type 

Answer:


Q25. ORRECT TEXT 

The Secure-X company has started to tested the 802.1X authentication deployment using the Cisco Catalyst 3560-X layer 3 switch and the Cisco ISEvl2 appliance. Each employee desktop will be connected to the 802.1X enabled switch port and will use the Cisco AnyConnect NAM 802.1X supplicant to log in and connect to the network. 

Your particular tasks in this simulation are to create a new identity source sequence named AD_internal which will first use the Microsoft Active Directory (AD1) then use the ISE Internal User database. Once the new identity source sequence has been configured, edit the existing DotlX authentication policy to use the new AD_internal identity source sequence. 

The Microsoft Active Directory (AD1) identity store has already been successfully configured, you just need to reference it in your configuration. 

In addition to the above, you are also tasked to edit the IT users authorization policy so IT users who successfully authenticated will get the permission of the existing IT_Corp authorization profile. 

Perform this simulation by accessing the ISE GUI to perform the following tasks: 

. Create a new identity source sequence named AD_internal to first use the Microsoft Active Directory (AD1) then use the ISE Internal User database 

. Edit the existing Dot1X authentication policy to use the new AD_internal identity source sequence: 

. If authentication failed-reject the access request 

. If user is not found in AD-Drop the request without sending a response 

. If process failed-Drop the request without sending a response 

. Edit the IT users authorization policy so IT users who successfully authenticated will get the permission of the existing IT_Corp authorization profile. 

To access the ISE GUI, click the ISE icon in the topology diagram. To verify your configurations, from the ISE GUI, you should also see the Authentication Succeeded event for the it1 user after you have successfully defined the DotlX authentication policy to use the Microsoft Active Directory first then use the ISE Internal User Database to authenticate the user. And in the Authentication Succeeded event, you should see the IT_Corp authorization profile being applied to the it1 user. If your configuration is not correct and ISE can't authenticate the user against the Microsoft Active Directory, you should see the Authentication Failed event instead for the it1 user. 

Note: If you make a mistake in the Identity Source Sequence configuration, please delete the Identity Source Sequence then re-add a new one. The edit Identity Source Sequence function is not implemented in this simulation. 

Answer: Review the explanation for full configuration and solution. 


Q26. In a split ACS deployment with primary and secondary servers, which three statements about AAA load handling are true? (Choose three.) 

A. During normal operations, each server processes the full workload of both servers. 

B. If a AAA connectivity problem occurs, the servers split the full load of authentication requests. 

C. If a AAA connectivity problem occurs, each server processes the full workload of both servers. 

D. During normal operations, the servers split the full load of authentication requests. 

E. During normal operations, each server is used for specific operations, such as device administration and network admission. 

F. The primary servers are used to distribute policy information to other servers in the enterprise. 

Answer: C,D,E 


Q27. The corporate security policy requires multiple elements to be matched in an authorization policy. Which elements can be combined to meet the requirement? 

A. Device registration status and device activation status 

B. Network access device and time condition 

C. User credentials and server certificate 

D. Built-in profile and custom profile 

Answer:


Q28. Which two Cisco ISE administration options are available in the Default Posture Status setting? (Choose two.) 

A. Unknown 

B. Compliant 

C. FailOpen 

D. FailClose 

E. Noncompliant 

Answer: B,E 


Q29. Which command enables static PAT for TCP port 25? 

A. nat (outside,inside) static 209.165.201.3 209.165.201.226 eq smtp 

B. nat static 209.165.201.3 eq smtp 

C. nat (inside,outside) static 209.165.201.3 service tcp smtp smtp 

D. static (inside,outside) 209.165.201.3 209.165.201.226 netmask 255.255.255.255 

Answer:


Q30. When you configure an endpoint profiling policy rule, which option describes the purpose of the minimum certainty factor? 

A. It is compared to the total certainty metric of an individual endpoint to determine whether the endpoint can be trusted. 

B. It is compared to the assigned certainty value of an individual endpoint in a device database to determine whether the endpoint can be trusted. 

C. It is used to compare the policy condition to other active policies. 

D. It is used to determine the likelihood that an endpoint is an active, trusted device on the network. 

Answer: