Questions for the 300-715 were updated on : Nov 29 ,2024
Topic 1
Which personas can a Cisco ISE node assume?
C
Explanation:
Reference: https://www.cisco.com/en/US/docs/security/ise/1.0/user_guide/ise10_dis_deploy.html
Topic 1
What occurs when a Cisco ISE distributed deployment has two nodes and the secondary node is deregistered?
C
Topic 1
DRAG DROP
Drag the steps to configure a Cisco ISE node as a primary administration node from the left into the correct order on the
right.
Select and Place:
Explanation:
Reference: https://www.cisco.com/en/US/docs/security/ise/1.0/user_guide/ise10_dis_deploy.html
Topic 1
Which two features are available when the primary admin node is down and the secondary admin node has not been
promoted? (Choose two.)
B D
Topic 1
Which supplicant(s) and server(s) are capable of supporting EAP-CHAINING?
B
Explanation:
Reference: https://www.cisco.com/c/en/us/support/docs/wireless-mobility/eap-fast/200322-Understanding-EAP-FAST-and-
Chaining-imp.html
Topic 1
What is a requirement for Feed Service to work?
B
Topic 1
What is a method for transporting security group tags throughout the network?
B
Topic 1
An engineer is configuring a virtual Cisco ISE deployment and needs each persona to be on a different node.
Which persona should be configured with the largest amount of storage in this environment?
A
Topic 1
In a standalone Cisco ISE deployment, which two personas are configured on a node? (Choose two.)
C E
Topic 1
A network engineer must enforce access control using special tags, without re-engineering the network design.
Which feature should be configured to achieve this in a scalable manner?
C
Explanation:
Reference: https://www.cisco.com/c/dam/en/us/solutions/collateral/enterprise-networks/trustsec/branch-segmentation.pdf
Topic 1
A network engineer is configuring a network device that needs to filter traffic based on security group tags using a security
policy on a routed interface.
Which command should be used to accomplish this task?
D
Topic 1
In a Cisco ISE split deployment model, which load is split between the nodes?
A. log collection
B. device admission
C. AAA
D. network admission
A
Topic 2, Policy Enforcement
Topic 2
How is policy services node redundancy achieved in a deployment?
B
Topic 2
Which two fields are available when creating an endpoint on the context visibility page of Cisco ISE? (Choose two.)
C D
Explanation:
Reference: https://www.cisco.com/c/en/us/td/docs/security/ise/2-
2/admin_guide/b_ise_admin_guide_22/b_ise_admin_guide_22_chapter_010101.html
Topic 2
In which two ways can users and endpoints be classified for TrustSec? (Choose two.)
A D