Thursday , November 21 2024

Network Access Control Quiz Answers NSE 2 Information Security Awareness Fortinet

Question 1: What is one characteristic of headless devices?

  • Devices that are connected only to a wired network
  • Devices that cannot take a 3rd party security agent
  • Devices that have only AV software installed
  • Devices that provide only centralized architecture

Question 2: What are the three key activities performed by NAC? (Choose three.)

  • Profile all devices to identify what access they should have
  • Watch for IoT devices to respond to CNC servers in the Internet
  • Provide appropriate network access to devices
  • Discover all devices on the network

Question 3: Which three statements are advantages of implementing a FortiNAC solution? (Choose three.)

  • The FortiNAC solution supports only wireless networks.
  • The FortiNAC solution only supports BYOD environments.
  • FortiNAC is integrated into the security framework.
  • The FortiNAC solution has complete visibility into the network.
  • FortiNAC can profile headless devices that are not equipped with an agent.

Question 4: What two security challenges do IoT devices present to IT security professionals? (Choose two.)

  • They are time consuming to deploy.
  • They often do not support security programs.
  • They are frequently stolen.
  • They can be exploited by bad actors.

Question 5: When NAC is first deployed, what is one of the first tasks it performs?

  • Installs AV software
  • Compares the signature of the file with a list of known virus signatures
  • Configures the firewall
  • Profiles all connected devices

Question 6: Which two network security concerns have grown dramatically for businesses in recent years? (Choose two.)

  • Need for overall network visibility
  • Malware protection requirements
  • Need for AVs
  • IoT devices connecting to a network

Question 7: What is one shortcoming of NAC solutions?

  • NAC solutions do not support BYOD environments.
  • NAC solutions support only endpoint security.
  • Some NAC solutions underperform in wired environments, creating a security vulnerability.
  • NAC solutions do not support IoT devices.

About Machine Learning

Check Also

SOAR Quiz Answers NSE 2 Information Security Awareness Fortinet

Question 1: What are playbooks used for? To describe the order analyst’s complete tasks.To optimize …

Leave a Reply

Your email address will not be published. Required fields are marked *