my choice is B
The authorization profile in Cisco ISE now includes an option to scan endpoints for vulnerabilities. (Cisco Identity Services Engine Administrator Guide, Release 2.7)
The authorization profile in Cisco ISE now includes an option to scan endpoints for vulnerabilities. You can choose to run the scan periodically and also specify the time interval for these scans. After you define the authorization profile, you can apply it to an existing authorization policy rule or create a new authorization policy rule.
Answer B is the correcet answer for sure ... you can see the option clearly in Authorization profile tab :
Authorization Profile
* Name
Description
* Access Type
Network Device Profile
Service Template
Track Movement
Passive Identity Tracking
DACL Name
ACL (Filter-ID)
Security Group
VLAN
Voice Domain Permission
Web Redirection (CWA, MDM, NSP, CPP)
Display Certificates Renewal Message
Static IP/Host name/FQDN
Suppress Profiler CoA for endpoints in Logical Profile
Auto Smart Port
[Assess Vulnerabilities
Adapter Instance
Trigger scan if the time since last scan is greater than
Enter value in hours (1-9999)
Assess periodically using above interval]
The authorization profile in Cisco ISE now includes an option to scan endpoints for vulnerabilities. You can choose to run the scan periodically and also specify the time interval for these scans. After you define the authorization profile, you can apply it to an existing authorization policy rule or create a new authorization policy rule.
Correct answer is D
The authorization policy is where you determine flags for endpoint vulnerabilities, profiles only compile the endpoint specific data in the identity store. The auth policy directly scans and "advises" the PAN of any potential vulnerabilities.
B is correct answer
Configure Authorization Profile
The authorization profile in Cisco ISE now includes an option to scan endpoints for vulnerabilities. You can choose to run the scan periodically and also specify the time interval for these scans. After you define the authorization profile, you can apply it to an existing authorization policy rule or create a new authorization policy rule.
https://www.cisco.com/c/en/us/td/docs/security/ise/2-2/admin_guide/b_ise_admin_guide_22/b_ise_admin_guide_22_chapter_010100.html
Looking in my lab, I think the answer should actually be Authorization Policy as you build out the values in the policy / conditions studio. The authorization profile doesn't make any reference to assessing vulnerabilities. Anyone else thinking the same?
I was incorrect, there is an Assess Vulnerabilities option in the profile to do TC-NAC for endpoints.
upvoted 1 times
...
...
This section is not available anymore. Please use the main Exam Page.300-715 Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
tanri04
10 months, 3 weeks agoccnpsise
1 year, 1 month agoTHEODORABLE
1 year, 6 months agoCnoteone
1 year, 8 months agoCnoteone
1 year, 9 months agoaHash
2 years, 1 month agohisho72
2 years, 3 months agoliqucika
2 years, 6 months agoSeawanderer
2 years, 7 months agokthekillerc
2 years, 7 months agoaaInman
3 years, 1 month agoCisco_SecCol_111
3 years, 1 month agoCisco_SecCol_111
3 years, 1 month ago