Chapter 5.7 Network Access Control
Bring your own device(BYOD)
https://labsimapp.testout.com/v6_0_476/index.html/productviewer/1187/5.7/e9fb11db-4486-4248-9bac-09936916a481#:~:text=A%20policy%20that%20allows%20an%20employee%20to%20use%20a%20personal%20device%2C%20such%20as%20a%20laptop%20computer%20or%20phone%2C%20to%20connect%20to%20the%20organization%27s%20network%20to%20accomplish%20daily%20work%20tasks.
Which of the steps in the Network Access Control (NAC) implementation process occurs once the policies have been defined? Test Plan Apply Review
Apply
NAC Agent Types
Before a device can connect to the production network, it must go through a health check. This health check is performed by specific software designed solely for this purpose, often known as an agent
Which of the following NAC agent types is the most convenient agent type? Permanent Zero-trust Agentless Dissolvable
Permanent
Which of the following NAC agent types creates a temporary connection? Zero-trust Agentless Dissolvable Permanent
Dissolvable
Network access control
A policy-driven control process that allows or denies network access to devices connecting to a network.
Which of the following NAC agent types would be used for IoT devices? Permanent Agentless Zero-trust Dissolvable
Agentless
Which of the following defines all the prerequisites a device must meet in order to access a network? Identity Services Engine (ISE) Authorization Zero-trust security Authentication
Authentication
Which of the following applies the appropriate policies in order to provide a device with the access it's defined to receive? Authentication Identity Services Engine Authorization Zero-trust security
Authorization
What is Cisco's Network Access Control (NAC) solution called? Network Access Protection Identity Services Engine (ISE) Talos Network Address Translation (NAT)
Identity Services Engine (ISE)
You are configuring the security settings for your network. You have decided to configure a policy that requires any computer connecting to the network to run at least Windows 10 version 2004. Which of the following have you configured? ISE NAP NAC NAT
NAC
NAC Process
NAC is a complicated process that requires forethought. Use the following process when implementing NAC: Plan - A committee should convene and make decisions that define how NAC should work. Define - The roles, identities, and permissions (policies) must be defined. Apply - Once defined, the polices must be applied. Review/Revise - As business needs change, the process must be reviewed to determine whether changes are required.
Which of the following BEST describes zero-trust security? All devices are trusted. Only devices that pass both authentication and authorization are trusted. Only devices that pass authentication are trusted. Only devices that pass authorization are trusted.
Only devices that pass both authentication and authorization are trusted.
NAC Agent Type:Dissolvable
The agent is downloaded, or a temporary connection is established. It is removed once the user is done with it. The user has to download or connect to the agent again if needed.
NAC Agent Type:Agentless
The agent is on the domain controller. When the user logs into the domain, it authenticates with the network. Agentless NAC is often used when there is limited disk space, such as for Internet of Things (IoT) devices.
NAC Agent Type:Permanent
The agent resides on a device permanently. This is the most convenient agent since it does not have to be renewed and can always run on the device. It is also known as a persistent agent.