
Exam Code: ccnp security sisas 300 208 official cert guide pdf (Practice Exam Latest Test Questions VCE PDF)
Exam Name: Implementing Cisco Secure Access Solutions (SISAS)
Certification Provider: Cisco
Free Today! Guaranteed Training- Pass ccnp security sisas 300 208 official cert guide pdf Exam.
Q11. Which two authentication stores are supported to design a wireless network using PEAP EAP-MSCHAPv2 as the authentication method? (Choose two.)
A. Microsoft Active Directory
B. ACS
C. LDAP
D. RSA Secure-ID
E. Certificate Server
Answer: A,B
Q12. Which mechanism does Cisco ISE use to force a device off the network if it is reported lost or stolen?
A. CoA
B. dynamic ACLs
C. SGACL
D. certificate revocation
Answer: A
Q13. Which two are valid ISE posture conditions? (Choose two.)
A. Dictionary
B. memberOf
C. Profile status
D. File
E. Service
Answer: D,E
Q14. When RADIUS NAC and AAA Override are enabled for WLC on a Cisco ISE, which two statements about RADIUS NAC are true? (Choose two.)
A. It will return an access-accept and send the redirection URL for all users.
B. It establishes secure connectivity between the RADIUS server and the ISE.
C. It allows the ISE to send a CoA request that indicates when the user is authenticated.
D. It is used for posture assessment, so the ISE changes the user profile based on posture result.
E. It allows multiple users to authenticate at the same time.
Answer: C,D
Q15. What type of identity group is the Blacklist identity group?
A. endpoint
B. user
C. blackhole
D. quarantine
E. denied systems
Answer: A
Q16. Refer to the exhibit.
Which three statements about the given configuration are true? (Choose three.)
A. TACACS+ authentication configuration is complete.
B. TACACS+ authentication configuration is incomplete.
C. TACACS+ server hosts are configured correctly.
D. TACACS+ server hosts are misconfigured.
E. The TACACS+ server key is encrypted.
F. The TACACS+ server key is unencrypted.
Answer: B,C,F
Q17. Which statement about a distributed Cisco ISE deployment is true?
A. It can support up to two monitoring Cisco ISE nodes for high availability.
B. It can support up to three load-balanced Administration ISE nodes.
C. Policy Service ISE nodes can be configured in a redundant failover configuration.
D. The Active Directory servers of Cisco ISE can be configured in a load-balanced configuration.
Answer: A
Q18. In AAA, what function does authentication perform?
A. It identifies the actions that the user can perform on the device.
B. It identifies the user who is trying to access a device.
C. It identifies the actions that a user has previously taken.
D. It identifies what the user can access.
Answer: B
Q19. Which advanced authentication setting is needed to allow an unknown device to utilize Central WebAuth?
A. If Authentication failed > Continue
B. If Authentication failed > Drop
C. If user not found > Continue
D. If user not found > Reject
Answer: C
Q20. Where would a Cisco ISE administrator define a named ACL to use in an authorization policy?
A. In the conditions of an authorization rule.
B. In the attributes of an authorization rule.
C. In the permissions of an authorization rule.
D. In an authorization profile associated with an authorization rule.
Answer: D