Implementing Cisco Secure Access
Questions, Answers, Braindumps (300-208)
exam is tough but the guide from
www.exams.ws was really helpful.
QUESTION NO: 1
administrator needs to implement a service that enables
granular control of IOS commands that can be executed.
Which AAA authentication method should be selected?
C. Windows Active
D. Generic LDAP
QUESTION NO: 2
can leverage which attribute to assign privileges based on
Microsoft Active Directory user groups?
A. member of
QUESTION NO: 3
phasing enables flexible deployments through the use of
open, low-impact, and closed modes. What is a unique
characteristic of the most secure mode?
A. Granular ACLs
applied prior to authentication
B. Per user dACLs
applied after successful authentication
C. Only EAPoL
traffic allowed prior to authentication
802.1X timers to enable successful authentication
QUESTION NO: 4
administrator must enable which protocol extension to
QUESTION NO: 5
In the command 'aaa
authentication default group tacacs local', how is the
word 'default' defined?
A. Command set
B. Group name
C. Method list
D. Login type
QUESTION NO: 6
Changes were made
to the ISE server while troubleshooting, and now all
wireless certificate authentications are failing. Logs
indicate an EAP failure. What is the most likely cause of
A. EAP-TLS is not
checked in the Allowed Protocols list
authentication profile is not configured in the Identity
not checked in the Allowed Protocols list
D. Default rule
denies all traffic
E. Client root
certificate is not included in the Certificate Store
QUESTION NO: 7
The NAC Agent uses
which port and protocol to send discovery packets to an
ISE Policy Service Node?
QUESTION NO: 8
conditions are valid when configuring ISE for posturing?
C. Profile status
QUESTION NO: 9
Which effect does
the ip http secure-server command have on a Cisco ISE?
A. It enables the
HTTP server for users to connect on the command line.
B. It enables the
HTTP server for users to connect by using web-based
C. It enables the
HTTPS server for users to connect by using web-based
D. It enables the
HTTPS server for users to connect on the command line.
QUESTION NO: 10
In AAA, what
function does authentication perform?
A. It identifies
the actions that the user can perform on the device.
B. It identifies
the user who is trying to access a device.
C. It identifies
the actions that a user has previously taken.
D. It identifies
what the user can access.
QUESTION NO: 11
store option allows you to modify the directory services
that run on TCP/IP?
Directory Access Protocol
B. RSA SecurID