♥♥ 2017 NEW RECOMMEND ♥♥

Free VCE & PDF File for Cisco 300-208 Real Exam (Full Version!)

★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 300-208 Exam Dumps (PDF & VCE):
Available on: http://www.exam.com/300-208-dumps.html


Exam Code: ccnp security sisas 300 208 official cert guide (Practice Exam Latest Test Questions VCE PDF)
Exam Name: Implementing Cisco Secure Access Solutions (SISAS)
Certification Provider: Cisco
Free Today! Guaranteed Training- Pass ccnp security sisas 300 208 official cert guide pdf Exam.

Q31. What type of identity group is the Blacklist identity group? 

A. endpoint 

B. user 

C. blackhole 

D. quarantine 

E. denied systems 

Answer:


Q32. A properly configured Cisco ISE Policy Service node is not receiving any profile data from a Cisco switch that runs Device Sensor. 

Which option is the most likely reason for the failure? 

A. Syslog is configured for the Policy Administration Node. 

B. RADIUS Accounting is disabled. 

C. The SNMP community strings are mismatched. 

D. RADIUS Authentication is misconfigured. 

E. The connected endpoints support CDP but not DHCP. 

Answer:


Q33. Which two identity databases are supported when PEAP-MSCHAPv2 is used as EAP type? (Choose two.) 

A. Windows Active Directory 

B. LDAP 

C. RADIUS token server 

D. internal endpoint store 

E. internal user store 

F. certificate authentication profile 

G. RSA SecurID 

Answer: A,E 


Q34. Which command in the My Devices Portal can restore a previously lost device to the network? 

A. Reset 

B. Found 

C. Reinstate 

D. Request 

Answer:


Q35. What are two client-side requirements of the NAC Agent and NAC Web Agent installation? (Choose two.) 

A. Administrator workstation rights 

B. Active Directory Domain membership 

C. Allowing of web browser activex installation 

D. WSUS service running 

Answer: A,C 


Q36. Refer to the exhibit. 

The links outside the TrustSec area in the given SGA architecture are unprotected. On which two links does EAC take place? (Choose two.) 

A. between switch 2 and switch 3 

B. between switch 5 and host 2 

C. between host 1 and switch 1 

D. between the authentication server and switch 4 

E. between switch 1 and switch 2 

F. between switch 1 and switch 5 

Answer: A,B 


Q37. Which three are required steps to enable SXP on a Cisco ASA? (Choose three). 

A. configure AAA authentication 

B. configure password 

C. issue the aaa authorization command aaa-server group command 

D. configure a peer 

E. configure TACACS 

F. issue the cts sxp enable command 

Answer: B,D,F 


Q38. In this simulation, you are task to examine the various authentication events using the ISE GUI. For example, you should see events like Authentication succeeded. Authentication failed and etc... 

Which four statements are correct regarding the event that occurred at 2014-05-07 00:19:07.004? (Choose four.) 

A. The IT_Corp authorization profile were applied. 

B. The it1 user was matched to the IT_Corp authorization policy. 

C. The it1 user supplicant used the PEAP (EAP-MSCHAPv2) authentication method. 

D. The it1 user was authenticated using MAB. 

E. The it1 user was successfully authenticated against AD1 identity store. 

F. The it1 user machine has been profiled as a Microsoft-Workstation. 

G. The it1 user machine has passed all the posture assessement tests. 

Answer: B,C,E,F 

Explanation: 

Here are the details shown for this event: 

Screen Shot 2015-06-23 at 5.27.37 PM 


Q39. ORRECT TEXT 

The Secure-X company has started to tested the 802.1X authentication deployment using the Cisco Catalyst 3560-X layer 3 switch and the Cisco ISEvl2 appliance. Each employee desktop will be connected to the 802.1X enabled switch port and will use the Cisco AnyConnect NAM 802.1X supplicant to log in and connect to the network. 

Your particular tasks in this simulation are to create a new identity source sequence named AD_internal which will first use the Microsoft Active Directory (AD1) then use the ISE Internal User database. Once the new identity source sequence has been configured, edit the existing DotlX authentication policy to use the new AD_internal identity source sequence. 

The Microsoft Active Directory (AD1) identity store has already been successfully configured, you just need to reference it in your configuration. 

In addition to the above, you are also tasked to edit the IT users authorization policy so IT users who successfully authenticated will get the permission of the existing IT_Corp authorization profile. 

Perform this simulation by accessing the ISE GUI to perform the following tasks: 

. Create a new identity source sequence named AD_internal to first use the Microsoft Active Directory (AD1) then use the ISE Internal User database 

. Edit the existing Dot1X authentication policy to use the new AD_internal identity source sequence: 

. If authentication failed-reject the access request 

. If user is not found in AD-Drop the request without sending a response 

. If process failed-Drop the request without sending a response 

. Edit the IT users authorization policy so IT users who successfully authenticated will get the permission of the existing IT_Corp authorization profile. 

To access the ISE GUI, click the ISE icon in the topology diagram. To verify your configurations, from the ISE GUI, you should also see the Authentication Succeeded event for the it1 user after you have successfully defined the DotlX authentication policy to use the Microsoft Active Directory first then use the ISE Internal User Database to authenticate the user. And in the Authentication Succeeded event, you should see the IT_Corp authorization profile being applied to the it1 user. If your configuration is not correct and ISE can't authenticate the user against the Microsoft Active Directory, you should see the Authentication Failed event instead for the it1 user. 

Note: If you make a mistake in the Identity Source Sequence configuration, please delete the Identity Source Sequence then re-add a new one. The edit Identity Source Sequence function is not implemented in this simulation. 

Answer: Review the explanation for full configuration and solution. 


Q40. What is the purpose of the Cisco ISE Guest Service Sponsor Portal? 

A. It tracks and stores user activity while connected to the Cisco ISE. 

B. It securely authenticates guest users for the Cisco ISE Guest Service. 

C. It filters guest users from account holders to the Cisco ISE. 

D. It creates and manages Guest User accounts. 

Answer: