exam questions

Exam 300-715 All Questions

View all questions & answers for the 300-715 exam

Exam 300-715 topic 1 question 208 discussion

Actual exam question from Cisco's 300-715
Question #: 208
Topic #: 1
[All 300-715 Questions]

A user changes the status of a device to stolen in the My Devices Portal of Cisco ISE. The device was originally onboarded in the BYOD wireless Portal without a certificate. The device is found later, but the user cannot re-onboard the device because Cisco ISE assigned the device to the Blocklist endpoint identity group. What must the user do in the My Devices Portal to resolve this issue?

  • A. Manually remove the device from the Blocklist endpoint identity group.
  • B. Change the device state from Stolen to Not Registered.
  • C. Change the BYOD registration attribute of the device to None.
  • D. Delete the device, and then re-add the device.
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Cachaman
1 month, 2 weeks ago
Selected Answer: D
D If a user reinstates a stolen device, the status reverts to Not Registered. The user must delete that device, and add it back. This starts the onboarding process. https://www.cisco.com/c/en/us/td/docs/security/ise/3-0/admin_guide/b_ISE_admin_3_0/b_ISE_admin_30_byod.html
upvoted 1 times
...
Jimmyb007
1 month, 4 weeks ago
Selected Answer: D
If a user reinstates a stolen device, the status reverts to not registered. The user must delete that device, and add that it back. https://www.cisco.com/c/en/us/td/docs/security/ise/2-4/admin_guide/reorg/b_byod_2_4.html
upvoted 1 times
...
AyOwZe
8 months, 2 weeks ago
Selected Answer: B
I believe 'B' to be correct, this guide uses the "re-instate" option to move the device to a "not registered" state, therefore allowing the re-onboarding to occur for stolen devices that are returned. https://www.cisco.com/c/en/us/td/docs/security/ise/3-1/my_devices/b_mydevices_31.html#reference_82B02EC563A54F14A41787169D24960B
upvoted 1 times
AyOwZe
8 months, 2 weeks ago
I think key word is "what must the user do".
upvoted 1 times
...
...
faridh
1 year, 8 months ago
Selected Answer: D
The correct answer is D. Delete the device, and then re-add the device. When a device is marked as stolen in the My Devices Portal of Cisco ISE, it is automatically assigned to the Blocklist endpoint identity group. This group is used to prevent unauthorized devices from accessing the network. In order to resolve this issue and re-onboard the device, the user needs to delete the device from the My Devices Portal. This will remove it from the Blocklist endpoint identity group. Once deleted, the user can then re-add the device and go through the onboarding process again. Options A, B, and C are incorrect because they do not address the issue of being assigned to the Blocklist endpoint identity group. Manually removing the device from this group (option A) would require administrative access and may not be possible for a regular user. Changing the device state from stolen to not registered (option B) or changing the BYOD registration attribute of the device to none (option C) would not remove it from the Blocklist endpoint identity group.
upvoted 3 times
...
Leogxn
1 year, 9 months ago
Selected Answer: D
B could be right but the option is using "change" instead of "reinstate" D is the closest option imo. The question uses "must" keyword and it matches the Cisco admin guide "The user must delete that device, and add it back"
upvoted 1 times
...
johntan1980
1 year, 9 months ago
Selected Answer: D
Stolen device must be delete and re-add in order to connect to the network. https://community.cisco.com/t5/security-knowledge-base/cisco-ise-byod-prescriptive-deployment-guide/ta-p/3641867
upvoted 1 times
...
ccamar
1 year, 10 months ago
Selected Answer: D
If the device was onboarded by provisioning a profile (no certificate), Cisco ISE assigns the device to the Blacklist endpoint identity group. The device still has network access, unless you create an authorization policy for this situation. For example, IF Endpoint Identity Group is Blacklist AND BYOD_is_Registered THEN DenyAccess. If a user reinstates a stolen device, the status reverts to Not Registered. The user must delete that device, and add it back. This starts the onboarding process.
upvoted 1 times
...
rhylos
1 year, 11 months ago
Selected Answer: D
If a user reinstates a stolen device, the status reverts to Not Registered. The user must delete that device, and add it back. This starts the onboarding process.
upvoted 2 times
...
matan24
2 years ago
Selected Answer: B
checked on cisco official course, the provided answer in correct. beause no certificate is used, reinstate the device (changing it to "not registered") and then recoonnect to the netwotk is good to go.
upvoted 3 times
...
JimboOh
2 years, 1 month ago
Selected Answer: A
I think A: " If the device is found, employees can reinstate it (in the My Devices portal) and regain network access without having to register the device again. Depending on whether the device was lost or stolen, additional provisioning may be required before the device can be connected to the network." https://www.cisco.com/c/en/us/td/docs/security/ise/2-0/admin_guide/b_ise_admin_guide_20/m_ise_device_access.html
upvoted 2 times
JimboOh
2 years, 1 month ago
Actually I think it may be D as YmerG says, "If a user reinstates a stolen device, the status reverts to not registered. The user must delete that device, and add that it back. That starts the onboarding process."
upvoted 3 times
...
...
YmerG
2 years, 1 month ago
Very tricky question as if a user reinstates a stolen device, the status reverts to Not Registered. The user must delete that device, and add it back. This starts the onboarding process. So there is no reinstate in the options but since reinstate is the action it will lead to unregistered device. Once reinstating the device it must be deleted and readded. I am still in doubt between B and D
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago