Fortinet NSE 2 Lesson7-Network Access Control Quiz

Q1. What is one shortcoming of NAC solutions?

Select one:
NAC solutions do not support BYOD environments.
NAC solutions do not support IoT devices.
NAC solutions support only endpoint security.
Some NAC solutions underperform in wired environments, creating a security vulnerability.

Q2. What are the three key activities performed by NAC? (Choose three.)

Select one or more:
Discover all devices on the network
Provide appropriate network access to devices
Profile all devices to identify what access they should have

Watch for IoT devices to respond to CNC servers in the Internet

Q3. When NAC is first deployed, what is one of the first tasks it performs?

Select one:
Installs AV software
Configures the firewall
Compares the signature of the file with a list of known virus signatures
Profiles all connected devices

Q4. Which three statements are advantages of implementing a FortiNAC solution? (Choose three.)

Select one or more:
The FortiNAC solution only supports BYOD environments.
FortiNAC can profile headless devices that are not equipped with an agent.
The FortiNAC solution supports only wireless networks.
The FortiNAC solution has complete visibility into the network.
FortiNAC is integrated into the security framework.

Q5. What is one characteristic of headless devices?

Select one:
Devices that have only AV software installed
Devices that cannot take a 3rd party security agent
Devices that provide only centralized architecture
Devices that are connected only to a wired network

Q6. Which two network security concerns have grown dramatically for businesses in recent years? (Choose two.)

Select one or more:
Need for AVs
Malware protection requirements
Need for overall network visibility
IoT devices connecting to a network

Q7. What two security challenges do IoT devices present to IT security professionals? (Choose two.)

Select one or more:
They often do not support security programs.
They are frequently stolen.
They are time consuming to deploy.
They can be exploited by bad actors.

Bir Cevap Yazın