[PDF&VCE] New Lead2pass Cisco 300-208 New Questions Free Download (161-180)

2016 October Cisco Official New Released 300-208 Dumps in Lead2pass.com!

100% Free Download! 100% Pass Guaranteed!

I’m currently studying for Cisco exam 300-208. I do enjoy studying for exams. It’s hard, but it’s an excellent forcing function. I learn bits and pieces here and there now and then about this and that, but when I have an exam schedule for a set date, I have to study! And not only do I put in more hours, but I follow a more systematic approach. In this article, I’m going to share Lead2pass braindumps in case you too are studying and this method works for you.

Following questions and answers are all new published by Cisco Official Exam Center: http://www.lead2pass.com/300-208.html

QUESTION 161
What endpoint operating system provides native support for the SPW?

A.    Apple iOS
B.    Android OS
C.    Windows 8
D.    Mac OS X

Answer: A

QUESTION 162
Which condition triggers wireless authentication?

A.    NAS-Port-Type is set to IEEE 802.11.
B.    Framed-Compression is set to None.
C.    Service-Type is set to Framed.
D.    Tunnel-Type is set to VLAN.

Answer: A

QUESTION 163
Which feature enables the Cisco ISE DHCP profiling capabilities to determine and enforce authorization policies on mobile devices?

A.    disabling the DHCP proxy option
B.    DHCP option 42
C.    DHCP snooping
D.    DHCP spoofing

Answer: A

QUESTION 164
With which two appliance-based products can Cisco Prime Infrastructure integrate to perform centralized management? (Choose two.)

A.    Cisco Managed Services Engine
B.    Cisco Email Security Appliance
C.    Cisco Wireless Location Appliance
D.    Cisco Content Security Appliance
E.    Cisco ISE

Answer: AE

QUESTION 165
Which two options are EAP methods supported by Cisco ISE? (Choose two.)

A.    EAP-FAST
B.    EAP-TLS
C.    EAP-MS-CHAPv2
D.    EAP-GTC

Answer: AB

QUESTION 166
You configured wired 802.1X with EAP-TLS on Windows machines. The ISE authentication detail report shows “EAP-TLS failed SSL/TLS handshake because of an unknown CA in the client certificates chain.” What is the most likely cause of this error?

A.    The ISE certificate store is missing a CA certificate.
B.    The Wireless LAN Controller is missing a CA certificate.
C.    The switch is missing a CA certificate.
D.    The Windows Active Directory server is missing a CA certificate.

Answer: A

QUESTION 167
What type of identity group is the Blacklist identity group?

A.    endpoint
B.    user
C.    blackhole
D.    quarantine
E.    denied systems

Answer: A

QUESTION 168
Which feature must you configure on a switch to allow it to redirect wired endpoints to Cisco ISE?

A.    the http secure-server command
B.    RADIUS Attribute 29
C.    the RADIUS VSA for accounting
D.    the RADIUS VSA for URL-REDIRECT

Answer: A

QUESTION 169
Lab Sim
The Secure-X company has recently successfully tested the 802.1X authentication deployment using the Cisco Catalyst switch and the Cisco ISEv1.2 appliance. Currently, each employee desktop is connected to an 802.1X enabled switch port and is able to use the Cisco AnyConnect NAM 802.1Xsupplicantto log in and connect to the network.
Currently, a new testing requirement is to add a network printer to the Fa0/19 switch port and have it connect to the network. The network printer does not support 802.1X supplicant. The Fa0/19 switch port is now configured to use 802.1X authentication only.
To support this network printer, the Fa0/19 switch port configuration needs to be edited to enable the network printer to authenticate using its MAC address. The network printer should also be on VLAN 9.
Another network security engineer responsible for managing the Cisco ISE has already per- configured all the requirements on the Cisco ISE, including adding the network printer MAC address to the Cisco ISE endpoint database and etc…
Your task in the simulation is to access the Cisco Catalyst Switch console then use the CLI to:
– Enable only the Cisco Catalyst Switch Fa0/19 switch port to authenticate the network printer using its MAC address and:
– Ensure that MAC address authentication processing is not delayed until 802.1Xfails
– Ensure that even if MAC address authentication passes, the switch will still perform 802.1X authentication if requested by a 802.1X supplicant
– Use the required show command to verify the MAC address authentication on the Fa0/19 is successful
The switch enable password is Cisco
For the purpose of the simulation, to test the network printer, assume the network printer will be unplugged then plugged back into the Fa0/19 switch port after you have finished the required configurations on the Fa0/19 switch port.
Note: For this simulation, you will not need and do not have access to the ISE GUI To access the switch CLI, click the Switch icon in the topology diagram
1691

Answer: Review the explanation for full configuration and solution.
Initial configuration for fa 0/19 that is already done:
1692
AAA configuration has already been done for us.
We need to configure mac address bypass on this port to achieve the goal stated in the question.
To do this we simply need to add this command under the interface:
mab
Then do a shut/no shut on the interface.

QUESTION 170
Lab Sim
The Secure-X company has started to tested the 802.1X authentication deployment using the Cisco Catalyst 3560-X layer 3 switch and the Cisco ISEvl2 appliance. Each employee desktop will be connected to the 802.1X enabled switch port and will use the Cisco AnyConnect NAM 802.1X supplicant to log in and connect to the network.
Your particular tasks in this simulation are to create a new identity source sequence named AD_internal which will first use the Microsoft Active Directory (AD1) then use the ISE Internal User database. Once the new identity source sequence has been configured, edit the existing DotlX authentication policy to use the new AD_internal identity source sequence.
The Microsoft Active Directory (AD1) identity store has already been successfully configured, you just need to reference it in your configuration.
1701
In addition to the above, you are also tasked to edit the IT users authorization policy so IT users who successfully authenticated will get the permission of the existing IT_Corp authorization profile.
Perform this simulation by accessing the ISE GUI to perform the following tasks:
– Create a new identity source sequence named AD_internal to first use the Microsoft Active Directory (AD1) then use the ISE Internal User database
– Edit the existing Dot1X authentication policy to use the new AD_internal identity source sequence:
– If authentication failed-reject the access request
– If user is not found in AD-Drop the request without sending a response
– If process failed-Drop the request without sending a response
– Edit the IT users authorization policy so IT users who successfully authenticated will get the permission of the existing IT_Corp authorization profile.
To access the ISE GUI, click the ISE icon in the topology diagram. To verify your configurations, from the ISE GUI, you should also see the Authentication Succeeded event for the it1 user after you have successfully defined the DotlX authentication policy to use the Microsoft Active Directory first then use the ISE Internal User Database to authenticate the user. And in the Authentication Succeeded event, you should see the IT_Corp authorization profile being applied to the it1 user. If your configuration is not correct and ISE can’t authenticate the user against the Microsoft Active Directory, you should see the Authentication Failed event instead for the it1 user.
Note: If you make a mistake in the Identity Source Sequence configuration, please delete the Identity Source Sequence then re-add a new one. The edit Identity Source Sequence function is not implemented in this simulation.
1702

1703
Answer: Review the explanation for full configuration and solution.
Step 1: create a new identity source sequence named AD_internal which will first use the Microsoft Active Directory (AD1) then use the ISE Internal User database as shown below:
1704

Step 2: Edit the existing Dot1x policy to use the newly created Identity Source:
1705
Then hit Done and save.

QUESTION 171
Hotspot Question
In this simulation, you are task to examine the various authentication events using the ISE GUI. For example, you should see events like Authentication succeeded. Authentication failed and etc…
1711

1712
Which four statements are correct regarding the event that occurred at 2014-05-07 00:19:07.004? (Choose four.)

A.    The IT_Corp authorization profile were applied.
B.    The it1 user was matched to the IT_Corp authorization policy.
C.    The it1 user supplicant used the PEAP (EAP-MSCHAPv2) authentication method.
D.    The it1 user was authenticated using MAB.
E.    The it1 user was successfully authenticated against AD1 identity store.
F.    The it1 user machine has been profiled as a Microsoft-Workstation.
G.    The it1 user machine has passed all the posture assessement tests.

Answer: ACEF
Explanation:
Here are the details shown for this event:

QUESTION 172
Hotspot Question
In this simulation, you are task to examine the various authentication events using the ISE GUI. For example, you should see events like Authentication succeeded. Authentication failed and etc…
1721

1722

Which three statements are correct regarding the events with the 20 repeat count that occurred at 2014-05-07 00:22:48.748? (Choose three.)

A.    The device was successfully authenticated using MAB.
B.    The device matched the Machine_Corp authorization policy.
C.    The Print Servers authorization profile were applied.
D.    The device was profiled as a Linksys-PrintServer.
E.    The device MAC address is 00:14:BF:70:B5:FB.
F.    The device is connected to the Gi0/1 switch port and the switch IP address is 10.10.2.2.

Answer: ADE

QUESTION 173
Hotspot Question
In this simulation, you are task to examine the various authentication events using the ISE GUI. For example, you should see events like Authentication succeeded. Authentication failed and etc…
1731

1732
Which two statements are correct regarding the event that occurred at 2014-05-07 00:22:48.175? (Choose two.)

A.    The DACL will permit http traffic from any host to 10.10.2.20
B.    The DACL will permit http traffic from any host to 10.10.3.20
C.    The DACL will permit icmp traffic from any host to 10.10.2.20
D.    The DACL will permit icmp traffic from any host to 10.10.3.20
E.    The DACL will permit https traffic from any host to 10.10.3.20

Answer: AE

QUESTION 174
Hotspot Question
In this simulation, you are task to examine the various authentication events using the ISE GUI. For example, you should see events like Authentication succeeded. Authentication failed and etc…
1741

1742
Which two statements are correct regarding the event that occurred at 2014-05-07 00:16:55.393? (Choose two.)

A.    The failure reason was user entered the wrong username.
B.    The supplicant used the PAP authentication method.
C.    The username entered was it1.
D.    The user was authenticated against the Active Directory then also against the ISE interal user database and both fails.
E.    The NAS switch port where the user connected to has a MAC address of 44:03:A7:62:41:7F
F.    The user is being authenticated using 802.1X.
G.    The user failed the MAB.
H.    The supplicant stopped responding to ISE which caused the failure.

Answer: CF

QUESTION 175
Changes were made to the ISE server while troubleshooting, and now all wireless certificate authentications are failing. Logs indicate an EAP failure.
What are the two possible causes of the problem? (Choose two.)

A.    EAP-TLS is not checked in the Allowed Protocols list
B.    Client certificate is not included in the Trusted Certificate Store
C.    MS-CHAPv2-is not checked in the Allowed Protocols list
D.    Default rule denies all traffic
E.    Certificate authentication profile is not configured in the Identity Store

Answer: AE

QUESTION 176
Which action must an administrator take after joining a Cisco ISE deployment to an Active Directory domain?

A.    Choose an Active Directory user.
B.    Configure the management IP address.
C.    Configure replication.
D.    Choose an Active Directory group.

Answer: D

QUESTION 177
Which feature of Cisco ASA allows VPN users to be postured against Cisco ISE without requiring an inline posture node?

A.    RADIUS Change of Authorization
B.    device tracking
C.    DHCP snooping
D.    VLAN hopping

Answer: A

QUESTION 178
After an endpoint has completed authentication with MAB, a security violation is triggered because a different MAC address was detected. Which host mode must be active on the port?

A.    single-host mode
B.    multidomain authentication host mode
C.    multiauthentication host mode
D.    multihost mode

Answer: A

QUESTION 179
Refer to the exhibit. You are configuring permissions for a new Cisco ISE standard authorization profile. If you configure the Tunnel-Private-Group-ID attribute as shown, what does the value 123 represent?
1791

A.    the VLAN ID
B.    the VRF ID
C.    the tunnel ID
D.    the group ID

Answer: A

QUESTION 180
Where would a Cisco ISE administrator define a named ACL to use in an authorization policy?

A.    In the conditions of an authorization rule.
B.    In the attributes of an authorization rule.
C.    In the permissions of an authorization rule.
D.    In an authorization profile associated with an authorization rule.

Answer: D

If you want to prepare for 300-208 exam in shortest time, with minimum effort but for most effective result, you can use Lead2pass 300-208 dump which simulates the actual testing environment and allows you to focus on various sections of 300-208 exam. Best of luck!

300-208 new questions on Google Drive: https://drive.google.com/open?id=0B3Syig5i8gpDM1I1WlhIdHJZNjA

2016 Cisco 300-208 exam dumps (All 250 Q&As) from Lead2pass:

http://www.lead2pass.com/300-208.html [100% Exam Pass Guaranteed]