[2017 New] 2017 Latest Lead2pass 300-208 Questions & Answers PDF Free Download (51-75)

2017 July Cisco Official New Released 300-208 Dumps in Lead2pass.com!

100% Free Download! 100% Pass Guaranteed!

Good news, Lead2pass has updated the 300-208 exam dumps. With all the questions and answers in your hands, you will pass the Cisco 300-208 exam easily.

Following questions and answers are all new published by Cisco Official Exam Center: https://www.lead2pass.com/300-208.html

QUESTION 51
Which two attributes must match between two Cisco ASA devices to properly enable high availability? (Choose two.)

A.    model, interface configuration, and RAM
B.    major and minor software release
C.    tcp dead-peer detection protocol
D.    802.1x authentication identity

Answer: AB

QUESTION 52
What are two client-side requirements of the NAC Agent and NAC Web Agent installation? (Choose two.)

A.    Administrator workstation rights
B.    Active Directory Domain membership
C.    Allowing of web browser activex installation
D.    WSUS service running

Answer: AC

QUESTION 53
Which three algorithms should be avoided due to security concerns? (Choose three.)

A.    DES for encryption
B.    SHA-1 for hashing
C.    1024-bit RSA
D.    AES GCM mode for encryption
E.    HMAC-SHA-1
F.    256-bit Elliptic Curve Diffie-Hellman
G.    2048-bit Diffie-Hellman

Answer: ABC

QUESTION 54
In the command ‘aaa authentication default group tacacs local’, how is the word ‘default’ defined?

A.    Command set
B.    Group name
C.    Method list
D.    Login type

Answer: C

QUESTION 55
Which statement about IOS accounting is true?

A.    A named list of AAA methods must be defined.
B.    A named list of accounting methods must be defined.
C.    Authorization must be configured before accounting.
D.    A named list of tracking methods must be defined.

Answer: C

QUESTION 56
What are the initial steps to configure an ACS as a TACACS server?

A.    1. Choose Network Devices and AAA Clients > Network Resources.
2. Click Create.
B.    1. Choose Network Resources > Network Devices and AAA Clients.
2. Click Create.
C.    1. Choose Network Resources > Network Devices and AAA Clients.
2. Click Manage.
D.    1. Choose Network Devices and AAA Clients > Network Resources.
2. Click Install.

Answer: B

QUESTION 57
Which effect does the ip http secure-server command have on a Cisco ISE?

A.    It enables the HTTP server for users to connect on the command line.
B.    It enables the HTTP server for users to connect by using web-based authentication.
C.    It enables the HTTPS server for users to connect by using web-based authentication.
D.    It enables the HTTPS server for users to connect on the command line.

Answer: C

QUESTION 58
A network administrator needs to implement a service that enables granular control of IOS commands that can be executed. Which AAA authentication method should be selected?

A.    TACACS+
B.    RADIUS
C.    Windows Active Directory
D.    Generic LDAP

Answer: A

QUESTION 59
An administrator can leverage which attribute to assign privileges based on Microsoft Active Directory user groups?

A.    member of
B.    group
C.    class
D.    person

Answer: A

QUESTION 60
Cisco 802.1X phasing enables flexible deployments through the use of open, low-impact, and closed modes. What is a unique characteristic of the most secure mode?

A.    Granular ACLs applied prior to authentication
B.    Per user dACLs applied after successful authentication
C.    Only EAPoL traffic allowed prior to authentication
D.    Adjustable 802.1X timers to enable successful authentication

Answer: C

QUESTION 61
A network administrator must enable which protocol extension to utilize EAP-Chaining?

A.    EAP-FAST
B.    EAP-TLS
C.    MSCHAPv2
D.    PEAP

Answer: A

QUESTION 62
In the command ‘aaa authentication default group tacacs local’, how is the word ‘default’ defined?

A.    Command set
B.    Group name
C.    Method list
D.    Login type

Answer: C

QUESTION 63
Changes were made to the ISE server while troubleshooting, and now all wireless certificate authentications are failing. Logs indicate an EAP failure. What is the most likely cause of the problem?

A.    EAP-TLS is not checked in the Allowed Protocols list
B.    Certificate authentication profile is not configured in the Identity Store
C.    MS-CHAPv2-is not checked in the Allowed Protocols list
D.    Default rule denies all traffic
E.    Client root certificate is not included in the Certificate Store

Answer: A

QUESTION 64
The NAC Agent uses which port and protocol to send discovery packets to an ISE Policy Service Node?

A.    tcp/8905
B.    udp/8905
C.    http/80
D.    https/443

Answer: B

QUESTION 65
Which two conditions are valid when configuring ISE for posturing? (Choose two.)

A.    Dictionary
B.    memberOf
C.    Profile status
D.    File
E.    Service

Answer: DE

QUESTION 66
Refer to the exhibit. Which three statements about the given configuration are true? (Choose three.)

 

A.    TACACS+ authentication configuration is complete.
B.    TACACS+ authentication configuration is incomplete.
C.    TACACS+ server hosts are configured correctly.
D.    TACACS+ server hosts are misconfigured.
E.    The TACACS+ server key is encrypted.
F.    The TACACS+ server key is unencrypted.

Answer: BCF

QUESTION 67
In AAA, what function does authentication perform?

A.    It identifies the actions that the user can perform on the device.
B.    It identifies the user who is trying to access a device.
C.    It identifies the actions that a user has previously taken.
D.    It identifies what the user can access.

Answer: B

QUESTION 68
Which identity store option allows you to modify the directory services that run on TCP/IP?

A.    Lightweight Directory Access Protocol
B.    RSA SecurID server
C.    RADIUS
D.    Active Directory

Answer: A

QUESTION 69
Which term describes a software application that seeks connectivity to the network via a network access device?

A.    authenticator
B.    server
C.    supplicant
D.    WLC

Answer: C

QUESTION 70
Cisco ISE distributed deployments support which three features? (Choose three.)

A.    global implementation of the profiler service CoA
B.    global implementation of the profiler service in Cisco ISE
C.    configuration to send system logs to the appropriate profiler node
D.    node-specific probe configuration
E.    server-specific probe configuration
F.    NetFlow probes

Answer: ACD

QUESTION 71
An organization has recently deployed ISE with the latest models of Cisco switches, and it plans to deploy Trustsec to secure its infrastructure. The company also wants to allow different network access policies for different user groups (e.g., administrators). Which solution is needed to achieve these goals?

A.    Cisco Security Group Access Policies in order to use SGACLs to control access based on SGTs
assigned to different users
B.    MACsec in Multiple-Host Mode in order to open or close a portbased on a single authentication
C.    Identity-based ACLs on the switches with user identities provided by ISE
D.    Cisco Threat Defense for user group control by leveraging Netflow exported from the switches and
login information from ISE

Answer: A

QUESTION 72
Security Group Access requires which three syslog messages to be sent to Cisco ISE? (Choose three.)

A.    IOS-7-PROXY_DROP
B.    AP-1-AUTH_PROXY_DOS_ATTACK
C.    MKA-2-MACDROP
D.    AUTHMGR-5-MACMOVE
E.    ASA-6-CONNECT_BUILT
F.    AP-1-AUTH_PROXY_FALLBACK_REQ

Answer: BDF

QUESTION 73
Which Cisco IOS IPS feature allows to you remove one or more actions from all active signatures based on the attacker and/or target address criteria, as well as the event risk rating criteria?

A.    signature event action filters
B.    signature event action overrides
C.    signature attack severity rating
D.    signature event risk rating

Answer: A

QUESTION 74
Which action does the command private-vlan association 100,200 take?

A.    configures VLANs 100 and 200 and associates them as a community
B.    associates VLANs 100 and 200 with the primary VLAN
C.    creates two private VLANs with the designation of VLAN 100 and VLAN 200
D.    assigns VLANs 100 and 200 as an association of private VLANs

Answer: B

QUESTION 75
Which of these allows you to add event actions globally based on the risk rating of each event,
without having to configure each signature individually?

A.    event action summarization
B.    event action filter
C.    event action override
D.    signature event action processor

Answer: C

Once there are some changes on 300-208 exam questions, we will update the study materials timely to make sure that our customer can download the latest edition.

300-208 new questions on Google Drive: https://drive.google.com/open?id=0B3Syig5i8gpDM1I1WlhIdHJZNjA

2017 Cisco 300-208 exam dumps (All 300 Q&As) from Lead2pass:

https://www.lead2pass.com/300-208.html [100% Exam Pass Guaranteed]