exam questions

Exam 300-710 All Questions

View all questions & answers for the 300-710 exam

Exam 300-710 topic 1 question 212 discussion

Actual exam question from Cisco's 300-710
Question #: 212
Topic #: 1
[All 300-710 Questions]

What is the RTC workflow when the infected endpoint is identified?

  • A. Cisco ISE instructs Cisco AMP to contain the infected endpoint.
  • B. Cisco ISE instructs Cisco FMC to contain the infected endpoint.
  • C. Cisco FMC instructs Cisco ISE to contain the infected endpoint.
  • D. Cisco AMP instructs Cisco FMC to contain the infected endpoint.
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
tinyJoe
2 weeks, 5 days ago
Selected Answer: C
I am not sure, but C looks fine. Quarantine endpoints is the job of ISE. https://www.cisco.com/c/ja_jp/td/docs/security/ise/2-3/admin_guide/b_ise_admin_guide_23/b_ise_admin_guide_23-1_chapter_01101.html# ID173.
upvoted 2 times
...
rbrain
1 month ago
Selected Answer: C
Looks like its C https://www.cisco.com/c/m/en_uk/products/security/identity-services-engine/use-case-threat-containment.html
upvoted 2 times
...
Kris92
4 months, 2 weeks ago
Selected Answer: B
"This integration allows you to create content policies on FMC based on the information that is shared by ISE and their published topics (related to the endpoint activity)." https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine-32/220856-configure-and-troubleshoot-ise-3-2-with.html
upvoted 1 times
...
littlewilly
6 months, 2 weeks ago
Selected Answer: C
It's see look at page 16 here- https://www.cisco.com/c/dam/m/en_uk/events/2016/securityexperts/pdf/rapid_threat_containment_sept_8th_2016.pdf
upvoted 2 times
Kris92
4 months, 2 weeks ago
page 16 just says demo, it's also a general, more for sales presentation on RTC
upvoted 1 times
...
...
z6st2a1jv
8 months, 1 week ago
Selected Answer: B
ISE instructs FMC
upvoted 2 times
...
Abetong
10 months, 3 weeks ago
Should be A. Cisco ISE instructs Cisco AMP to contain the infected endpoint. When Cisco ISE detects an infected endpoint, it can instruct Cisco AMP to take actions directly on that specific endpoint to contain the threat. Given the specific keyword "endpoint," the scenario where Cisco ISE instructs Cisco AMP to contain the infected endpoint is more directly relevant and specific choice.
upvoted 1 times
Abetong
10 months, 2 weeks ago
Sorry, I'll go now with C.
upvoted 2 times
...
...
Cokamaniako
1 year, 2 months ago
Selected Answer: C
RTC w/ FMC & ISE is the ability for the FMC to quarantine end points through ISE. So, when the FMC sees some indicators of compromise, certain Snort IPS signatures are fired, or malware is discovered through AMP, the FMC can trigger actions to occur through ISE. ISE, in turn, can determine what to do when that trigger occurs.
upvoted 1 times
...
Initial14
1 year, 3 months ago
Selected Answer: C
ONLY C is the right answer, because ISE has the power to shut down the port in the case of Infected host
upvoted 4 times
Initial14
1 year, 3 months ago
And the FMC informs ISE
upvoted 2 times
...
...
Joe_Blue
1 year, 4 months ago
Selected Answer: B
When an infected endpoint is identified in the network, the RTC (Rapid Threat Containment) workflow involves isolating the endpoint to prevent further spread of the threat. In this workflow, Cisco ISE (Identity Services Engine) identifies the infected endpoint and instructs Cisco FMC (Firepower Management Center) to contain the endpoint. Cisco FMC then applies the appropriate policy to contain the endpoint, such as isolating it on a separate VLAN or blocking its traffic altogether. Note that Cisco AMP (Advanced Malware Protection) can also play a role in threat containment, but in this specific RTC workflow, the instruction to contain the endpoint comes from Cisco ISE and is executed by Cisco FMC.
upvoted 2 times
...
Joe_Blue
1 year, 4 months ago
RTC w/ FMC & ISE is the ability for the FMC to quarantine end points through ISE. So, when the FMC sees some indicators of compromise, certain Snort IPS signatures are fired, or malware is discovered through AMP, the FMC can trigger actions to occur through ISE. ISE, in turn, can determine what to do when that trigger occurs. ISE could kick the user off the network or change the context of the user and endpoint so that different actions are taken within the network infrastructure.
upvoted 1 times
...
uedemdog
1 year, 4 months ago
RTC w/ FMC & ISE is the ability for the FMC to quarantine end points through ISE. So, when the FMC sees some indicators of compromise, certain Snort IPS signatures are fired, or malware is discovered through AMP, the FMC can trigger actions to occur through ISE. ISE, in turn, can determine what to do when that trigger occurs. ISE could kick the user off the network or change the context of the user and endpoint so that different actions are taken within the network infrastructure.
upvoted 1 times
...
Milan82
1 year, 4 months ago
Selected Answer: C
I think C
upvoted 1 times
...
Baumb
1 year, 5 months ago
Selected Answer: D
Ok, I wrote at 206 that this has to be right for it to be FMC and Stealthwatch. Upon further research I think AMP and Stealthwatch (aka AMP for Networks) are the only ones able to contain an Endpoint in case of Files and Malware. (Not any other case!!)
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago