Which use case validates a change of authorization?

By | November 26, 2022

  • A. An endpoint that is disconnected from the network is discovered.
  • B. Endpoints are created through device registration for the guests.
  • C. An endpoint profiling policy is changed for authorization policy.
  • D. An authenticated, wired EAP-capable endpoint is discovered.
Answer: Option C.
Explanation: 

Reference: https://www.cisco.com/c/en/us/td/docs/security/ise/1-2/user_guide/ise_user_guide/ise_prof_pol.html

The post Which use case validates a change of authorization? appeared first on Majanto.