300-208 Premium Bundle

300-208 Premium Bundle

Implementing Cisco Secure Access Solutions (SISAS) Certification Exam

4.5 
(20565 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
November 21, 2024Last update

Cisco 300-208 Free Practice Questions

Q1. Security Group Access requires which three syslog messages to be sent to Cisco ISE? (Choose three.) 

A. IOS-7-PROXY_DROP 

B. AP-1-AUTH_PROXY_DOS_ATTACK 

C. MKA-2-MACDROP 

D. AUTHMGR-5-MACMOVE 

E. ASA-6-CONNECT_BUILT 

F. AP-1-AUTH_PROXY_FALLBACK_REQ 

Answer: B,D,F 

Q2. What is the function of the SGACL policy matrix on a Cisco TrustSec domain with SGT Assignment? 

A. It determines which access policy to apply to the endpoint. 

B. It determines which switches are trusted within the TrustSec domain. 

C. It determines the path the SGT of the packet takes when entering the Cisco TrustSec domain. 

D. It lists all servers that are permitted to participate in the TrustSec domain. 

E. It lists all hosts that are permitted to participate in the TrustSec domain. 

Answer:

Q3. What are the initial steps must you perform to add the ISE to the WLC? 

A. 1. With a Web browser, establish an HTTP connection to the WLC pod. 

2. Navigate to Administration > Authentication > New. 

3. Enter server values to begin the configuration. 

B. 1. With a Web browser, establish an FTP connection to the WLC pod. 

2. Navigate to Security > Administration > New. 

3. Add additional security features for FTP authentication. 

C. 1. With a Web browser, establish an HTTP connection to the WLC pod. 

2. Navigate to Authentication > New. 

3. Enter ACLs and Authentication methods to begin the configuration. 

D. 1. With a Web browser connect, establish an HTTPS connection to the WLC pod. 

2. Navigate to Security > Authentication > New. 

3. Enter server values to begin the configuration. 

Answer:

Q4. Which action must an administrator take after joining a Cisco ISE deployment to an Active Directory domain? 

A. Choose an Active Directory user. 

B. Configure the management IP address. 

C. Configure replication. 

D. Choose an Active Directory group. 

Answer:

Q5. Which set of commands allows IPX inbound on all interfaces? 

A. ASA1(config)# access-list IPX-Allow ethertype permit ipx ASA1(config)# access-group IPX-Allow in interface global 

B. ASA1(config)# access-list IPX-Allow ethertype permit ipx ASA1(config)# access-group IPX-Allow in interface inside 

C. ASA1(config)# access-list IPX-Allow ethertype permit ipx ASA1(config)# access-group IPX-Allow in interface outside 

D. ASA1(config)# access-list IPX-Allow ethertype permit ipx ASA1(config)# access-group IPX-Allow out interface global 

Answer:

Q6. Cisco 802.1X phasing enables flexible deployments through the use of open, low-impact, and closed modes. What is a unique characteristic of the most secure mode? 

A. Granular ACLs applied prior to authentication 

B. Per user dACLs applied after successful authentication 

C. Only EAPoL traffic allowed prior to authentication 

D. Adjustable 802.1X timers to enable successful authentication 

Answer:

Q7. Which two services are included in the Cisco ISE posture service? (Choose two.) 

A. posture administration 

B. posture run-time 

C. posture monitoring 

D. posture policing 

E. posture catalog 

Answer: A,B 

Q8. Which feature of Cisco ASA allows VPN users to be postured against Cisco ISE without requiring an inline posture node? 

A. RADIUS Change of Authorization 

B. device tracking 

C. DHCP snooping 

D. VLAN hopping 

Answer:

Q9. Wireless client supplicants attempting to authenticate to a wireless network are generating excessive log messages. Which three WLC authentication settings should be disabled? (Choose three.) 

A. RADIUS Server Timeout 

B. RADIUS Aggressive-Failover 

C. Idle Timer 

D. Session Timeout 

E. Client Exclusion 

F. Roaming 

Answer: B,C,D 

Q10. Which RADIUS attribute is used primarily to differentiate an IEEE 802.1x request from a Cisco MAB request? 

A. RADIUS Attribute (5) NAS-Port 

B. RADIUS Attribute (6) Service-Type 

C. RADIUS Attribute (7) Framed-Protocol 

D. RADIUS Attribute (61) NAS-Port-Type 

Answer:

Q11. Under which circumstance would an inline posture node be deployed? 

A. When the NAD does not support CoA 

B. When the NAD cannot support the number of connected endpoints 

C. When a PSN is overloaded 

D. To provide redundancy for a PSN 

Answer:

Q12. Which three features should be enabled as best practices for MAB? (Choose three.) 

A. MD5 

B. IP source guard 

C. DHCP snooping 

D. storm control E. DAI 

F. URPF 

Answer: B,C,E 

Q13. You configured wired 802.1X with EAP-TLS on Windows machines. The ISE authentication detail report shows "EAP-TLS failed SSL/TLS handshake because of an unknown CA in the client certificates chain." What is the most likely cause of this error? 

A. The ISE certificate store is missing a CA certificate. 

B. The Wireless LAN Controller is missing a CA certificate. 

C. The switch is missing a CA certificate. 

D. The Windows Active Directory server is missing a CA certificate. 

Answer:

Q14. What is another term for 802.11i wireless network security? 

A. 802.1x 

B. WEP 

C. TKIP 

D. WPA 

E. WPA2 

Answer:

Q15. Which two statements about MAB are true? (Choose two.) 

A. It requires a preexisting database of the MAC addresses of permitted devices. 

B. It is unable to control network access at the edge. 

C. If MAB fails, the device is unable to fall back to another authentication method. 

D. It is unable to link the IP and MAC addresses of a device. 

E. It is unable to authenticate individual users. 

Answer: A,E 

Q16. When RADIUS NAC and AAA Override are enabled for WLC on a Cisco ISE, which two statements about RADIUS NAC are true? (Choose two.) 

A. It will return an access-accept and send the redirection URL for all users. 

B. It establishes secure connectivity between the RADIUS server and the ISE. 

C. It allows the ISE to send a CoA request that indicates when the user is authenticated. 

D. It is used for posture assessment, so the ISE changes the user profile based on posture result. 

E. It allows multiple users to authenticate at the same time. 

Answer: C,D 

Q17. You are troubleshooting wired 802.1X authentications and see the following error: "Authentication failed: 22040 Wrong password or invalid shared secret." What should you inspect to determine the problem? 

A. RADIUS shared secret 

B. Active Directory shared secret 

C. Identity source sequence 

D. TACACS+ shared secret 

E. Certificate authentication profile 

Answer:

START 300-208 EXAM