Free Cisco 300-715 Exam Actual Questions

The questions for 300-715 were last updated On Dec 16, 2024

Question No. 1

If a user reports a device lost or stolen, which portal should be used to prevent the device from accessing the network while still providing information about why the device is blocked?

Show Answer Hide Answer
Correct Answer: D

https://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/Borderless_Networks/Unified_Access/BYOD_Design_Guide/Managing_Lost_or_Stolen_Device.html#90273

The Blacklist identity group is system generated and maintained by ISE to prevent access to lost or stolen devices. In this design guide, two authorization profiles are used to enforce the permissions for wireless and wired devices within the Blacklist:

Blackhole WiFi Access

Blackhole Wired Access


Question No. 2

An administrator must block access to BYOD endpoints that were onboarded without a certificate and have been reported as stolen in the Cisco ISE My Devices Portal. Which condition must be used when configuring an authorization policy that sets DenyAccess permission?

Show Answer Hide Answer
Correct Answer: A

https://www.cisco.com/c/en/us/td/docs/security/ise/2-6/admin_guide/b_ISE_26_admin_guide/b_ISE_admin_26_byod.html


Question No. 3

Which profiling probe collects the user-agent string?

Show Answer Hide Answer
Correct Answer: C

Question No. 4

Which two events trigger a CoA for an endpoint when CoA is enabled globally for ReAuth? (Choose two.)

Show Answer Hide Answer
Correct Answer: C, D

Question No. 5

Which two endpoint compliance statuses are possible? (Choose two.)

Show Answer Hide Answer
Correct Answer: A, D