I was leaning towards B at first, since device profiling is also a key part of TrustSec. But I think C covers the core functionality better. Although, I do wonder if I'll get partial credit for knowing about the device stuff too...
Yeah, C is definitely the way to go. The other options don't really capture the essence of TrustSec. I mean, who needs forensics when you can just enforce the right policies in the first place, am I right?
I agree, C seems like the right answer. TrustSec is all about using identity and context to control access, not just relying on traditional network segmentation. That dynamic role-based control is a key part of the solution.
This question is really testing our understanding of Cisco TrustSec. I think the answer is C - dynamic role-based access control. TrustSec allows you to enforce policies based on user roles rather than just IP addresses or other static parameters.
upvoted 0 times
...
Log in to Pass4Success
Sign in:
Report Comment
Is the comment made by USERNAME spam or abusive?
Commenting
In order to participate in the comments you need to be logged-in.
You can sign-up or
login
Lavonda
5 months agoMatthew
5 months agoNorah
5 months agoJerrod
5 months agoEmmett
5 months agoSonia
5 months agoClarence
6 months agoLemuel
6 months agoLindsey
6 months agoAlton
6 months agoAshlyn
6 months agoClarence
7 months agoLeonor
8 months agoLatonia
8 months agoGraciela
8 months agoBlondell
7 months agoLawrence
8 months agoIrene
8 months agoTayna
8 months agoLetha
8 months agoRikki
8 months agoRory
8 months agoLigia
8 months ago