You are on page 1of 1

Network Access Control

----------------------
In this lesson, you will learn about technologies that identify what's on your
network in order to control which devices can connect and which devices are
blocked.

Question 1
When NAC is first deployed, what is one of the first tasks it performs?
Select one:
Configures the firewall
Profiles all connected devices [CORRECT ANSWER]
Compares the signature of the file with a list of known virus signatures
Installs AV software

Question 2
Which two network security concerns have grown dramatically for businesses in
recent years? (Choose two.)
Select one or more:
Malware protection requirements
Need for overall network visibility [CORRECT ANSWER]
IoT devices connecting to a network [CORRECT ANSWER]
Need for AVs

Question 3
What two security challenges do IoT devices present to IT security professionals?
(Choose two.)
Select one or more:
They are time consuming to deploy.
They are frequently stolen.
They often do not support security programs. [CORRECT ANSWER]
They can be exploited by bad actors. [CORRECT ANSWER]

Question 4
What are the three key activities performed by NAC? (Choose three.)
Select one or more:
Watch for IoT devices to respond to CNC servers in the Internet
Profile all devices to identify what access they should have [CORRECT ANSWER]
Provide appropriate network access to devices [CORRECT ANSWER]
Discover all devices on the network [CORRECT ANSWER]

Question 5
What is one characteristic of headless devices?
Select one:
Devices that provide only centralized architecture
Devices that cannot take a 3rd party security agent [CORRECT ANSWER]
Devices that are connected only to a wired network
Devices that have only AV software installed

You might also like