Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Cisco Exam 300-715 Topic 3 Question 89 Discussion

Actual exam question for Cisco's 300-715 exam
Question #: 89
Topic #: 3
[All 300-715 Questions]

The security team identified a rogue endpoint with MAC address 00:46:91:02:28:4A attached to the network. Which action must security engineer take within Cisco ISE to effectively

restrict network access for this endpoint?

Show Suggested Answer Hide Answer
Suggested Answer: C

Cisco ISE provides a feature called Adaptive Network Control (ANC) that allows administrators to apply policies to endpoints based on their behavior or status1. One of the ANC policies is Quarantine, which restricts network access for an endpoint by assigning it to a limited-access VLAN or applying an access control list (ACL) on the switch port2. To use the Quarantine policy, the administrator must add the MAC address of the rogue endpoint to the endpoint quarantine list in ISE2. This will trigger a change of authorization (CoA) for the endpoint and apply the Quarantine policy. The other options are not effective for restricting network access for a rogue endpoint, as they do not use the ANC feature of ISE.


Contribute your Thoughts:

Latonia
4 months ago
I'm feeling lucky today. Let's go with A) Configure access control list on network switches to block traffic. What could possibly go wrong?
upvoted 0 times
Gianna
3 months ago
User 3: I agree, let's not rush into a decision. We need to make sure we take the right action.
upvoted 0 times
...
Marva
3 months ago
User 2: Are you sure about that? Maybe we should consider other options as well.
upvoted 0 times
...
Dierdre
3 months ago
User 1: I think we should go with option A) Configure access control list on network switches to block traffic.
upvoted 0 times
...
...
Lemuel
4 months ago
Hmm, I'd go with B) Create authentication policy to force reauthentication. Might as well give the user a chance to explain themselves before denying them outright.
upvoted 0 times
Berry
3 months ago
User 3: I agree, it's a good balance between security and user experience.
upvoted 0 times
...
Yasuko
4 months ago
User 2: Yeah, it's important to give the user a chance to explain themselves.
upvoted 0 times
...
Dahlia
4 months ago
User 1: I think B) Create authentication policy to force reauthentication is a good idea.
upvoted 0 times
...
...
Honey
4 months ago
This question is a piece of cake! C) is the way to go. Quarantine that rogue endpoint and keep the network safe!
upvoted 0 times
...
Filiberto
4 months ago
I agree with Antonio, that way we can restrict network access for the rogue endpoint.
upvoted 0 times
...
Gerardo
4 months ago
D) Implement authentication policy to deny access. This seems like a more comprehensive solution to address the security issue.
upvoted 0 times
...
Antonio
4 months ago
I think we should add the MAC address to the endpoint quarantine list.
upvoted 0 times
...
Gussie
4 months ago
C) Add MAC address to the endpoint quarantine list. This will effectively restrict network access for the rogue endpoint.
upvoted 0 times
Reena
3 months ago
C) Add MAC address to the endpoint quarantine list. This will effectively restrict network access for the rogue endpoint.
upvoted 0 times
...
Kiley
4 months ago
A) Configure access control list on network switches to block traffic.
upvoted 0 times
...
Benton
4 months ago
C) Add MAC address to the endpoint quarantine list. This will effectively restrict network access for the rogue endpoint.
upvoted 0 times
...
Bernadine
4 months ago
A) Configure access control list on network switches to block traffic.
upvoted 0 times
...
Hyun
4 months ago
C) Add MAC address to the endpoint quarantine list. This will effectively restrict network access for the rogue endpoint.
upvoted 0 times
...
Thersa
4 months ago
A) Configure access control list on network switches to block traffic.
upvoted 0 times
...
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77