Chapter 5.7 Network Access Control

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Bring your own device(BYOD)

https://labsimapp.testout.com/v6_0_476/index.html/productviewer/1187/5.7/e9fb11db-4486-4248-9bac-09936916a481#:~:text=A%20policy%20that%20allows%20an%20employee%20to%20use%20a%20personal%20device%2C%20such%20as%20a%20laptop%20computer%20or%20phone%2C%20to%20connect%20to%20the%20organization%27s%20network%20to%20accomplish%20daily%20work%20tasks.

Which of the steps in the Network Access Control (NAC) implementation process occurs once the policies have been defined? Test Plan Apply Review

Apply

NAC Agent Types

Before a device can connect to the production network, it must go through a health check. This health check is performed by specific software designed solely for this purpose, often known as an agent

Which of the following NAC agent types is the most convenient agent type? Permanent Zero-trust Agentless Dissolvable

Permanent

Which of the following NAC agent types creates a temporary connection? Zero-trust Agentless Dissolvable Permanent

Dissolvable

Network access control

A policy-driven control process that allows or denies network access to devices connecting to a network.

Which of the following NAC agent types would be used for IoT devices? Permanent Agentless Zero-trust Dissolvable

Agentless

Which of the following defines all the prerequisites a device must meet in order to access a network? Identity Services Engine (ISE) Authorization Zero-trust security Authentication

Authentication

Which of the following applies the appropriate policies in order to provide a device with the access it's defined to receive? Authentication Identity Services Engine Authorization Zero-trust security

Authorization

What is Cisco's Network Access Control (NAC) solution called? Network Access Protection Identity Services Engine (ISE) Talos Network Address Translation (NAT)

Identity Services Engine (ISE)

You are configuring the security settings for your network. You have decided to configure a policy that requires any computer connecting to the network to run at least Windows 10 version 2004. Which of the following have you configured? ISE NAP NAC NAT

NAC

NAC Process

NAC is a complicated process that requires forethought. Use the following process when implementing NAC: Plan - A committee should convene and make decisions that define how NAC should work. Define - The roles, identities, and permissions (policies) must be defined. Apply - Once defined, the polices must be applied. Review/Revise - As business needs change, the process must be reviewed to determine whether changes are required.

Which of the following BEST describes zero-trust security? All devices are trusted. Only devices that pass both authentication and authorization are trusted. Only devices that pass authentication are trusted. Only devices that pass authorization are trusted.

Only devices that pass both authentication and authorization are trusted.

NAC Agent Type:Dissolvable

The agent is downloaded, or a temporary connection is established. It is removed once the user is done with it. The user has to download or connect to the agent again if needed.

NAC Agent Type:Agentless

The agent is on the domain controller. When the user logs into the domain, it authenticates with the network. Agentless NAC is often used when there is limited disk space, such as for Internet of Things (IoT) devices.

NAC Agent Type:Permanent

The agent resides on a device permanently. This is the most convenient agent since it does not have to be renewed and can always run on the device. It is also known as a persistent agent.


Ensembles d'études connexes

FVC1--Global Business--Chapter 1

View Set

Chapter 15.6 - Using Reward Systems to Motivate Performance

View Set

Chapter 37: Impact of Cognitive or Sensory Impairment on the Child and Family

View Set