Tactics to cisco 300 208
We provide real 300 208 dumps exam questions and answers braindumps in two formats. Download PDF & Practice Tests. Pass Cisco cisco 300 208 Exam quickly & easily. The 300 208 dumps PDF type is available for reading and printing. You can print more and practice many times. With the help of our Cisco cisco 300 208 dumps pdf and vce product and material, you can easily pass the 300 208 dumps exam.
Q11. Which Cisco ISE 1.x protocol can be used to control admin access to network access devices?
A. TACACS+
B. RADIUS
C. EAP
D. Kerberos
Answer: B
Q12. Which three personas can a Cisco ISE assume in a deployment? (Choose three.)
A. connection
B. authentication
C. administration
D. testing
E. policy service
F. monitoring
Answer: C,E,F
Q13. The corporate security policy requires multiple elements to be matched in an authorization policy. Which elements can be combined to meet the requirement?
A. Device registration status and device activation status
B. Network access device and time condition
C. User credentials and server certificate
D. Built-in profile and custom profile
Answer: B
Q14. Which RADIUS attribute is used primarily to differentiate an IEEE 802.1x request from a Cisco MAB request?
A. RADIUS Attribute (5) NAS-Port
B. RADIUS Attribute (6) Service-Type
C. RADIUS Attribute (7) Framed-Protocol
D. RADIUS Attribute (61) NAS-Port-Type
Answer: B
Q15. What is a required configuration step for an 802.1X capable switch to support dynamic
VLAN and ACL assignments?
A. Configure the VLAN assignment.
B. Configure the ACL assignment.
C. Configure 802.1X authenticator authorization.
D. Configure port security on the switch port.
Answer: C
Q16. When RADIUS NAC and AAA Override are enabled for WLC on a Cisco ISE, which two statements about RADIUS NAC are true? (Choose two.)
A. It will return an access-accept and send the redirection URL for all users.
B. It establishes secure connectivity between the RADIUS server and the ISE.
C. It allows the ISE to send a CoA request that indicates when the user is authenticated.
D. It is used for posture assessment, so the ISE changes the user profile based on posture result.
E. It allows multiple users to authenticate at the same time.
Answer: C,D
Q17. What is the first step that occurs when provisioning a wired device in a BYOD scenario?
A. The smart hub detects that the physically connected endpoint requires configuration and must use MAB to authenticate.
B. The URL redirects to the Cisco ISE Guest Provisioning portal.
C. Cisco ISE authenticates the user and deploys the SPW package.
D. The device user attempts to access a network URL.
Answer: A
Q18. When MAB is configured, how often are ports reauthenticated by default?
A. every 60 seconds
B. every 90 seconds
C. every 120 seconds
D. never
Answer: D
Q19. Which advanced authentication setting is needed to allow an unknown device to utilize Central WebAuth?
A. If Authentication failed > Continue
B. If Authentication failed > Drop
C. If user not found > Continue
D. If user not found > Reject
Answer: C
Q20. Which authorization method is the Cisco best practice to allow endpoints access to the
Apple App store or Google Play store with Cisco WLC software version 7.6 or newer?
A. dACL
B. DNS ACL
C. DNS ACL defined in Cisco ISE
D. redirect ACL
Answer: B