Hello Friends in this article i am gone to share Fortinet: NSE 2 Information Security Awareness | Network Access Control Quiz Answers with you..
Course link: NSE 2 Information Security Awareness
Network Access Control Quiz Answers
Question 1)
What is one characteristic of headless devices?
- Devices that have only AV software installed
- Devices that provide only centralized architecture
- Devices that are connected only to a wired network
- Devices that cannot take a 3rd party security agent
Question 2)
What are the three key activities performed by NAC? (Choose three.)
- Discover all devices on the network
- Profile all devices to identify what access they should have
- Watch for IoT devices to respond to CNC servers in the Internet
- Provide appropriate network access to devices
Question 3)
Which three statements are advantages of implementing a FortiNAC solution? (Choose three.)
- FortiNAC is integrated into the security framework.
- The FortiNAC solution supports only wireless networks.
- The FortiNAC solution only supports BYOD environments.
- The FortiNAC solution has complete visibility into the network.
- FortiNAC can profile headless devices that are not equipped with an agent.
Question 4)
What two security challenges do IoT devices present to IT security professionals? (Choose two.)
- They are frequently stolen.
- They can be exploited by bad actors.
- They are time consuming to deploy.
- They often do not support security programs.
Question 5)
When NAC is first deployed, what is one of the first tasks it performs?
- Installs AV software
- Configures the firewall
- Profiles all connected devices
- Compares the signature of the file with a list of known virus signatures
Question 6)
Which two network security concerns have grown dramatically for businesses in recent years? (Choose two.)
- Need for AVs
- IoT devices connecting to a network
- Need for overall network visibility
- Malware protection requirements
Question 7)
What is one shortcoming of NAC solutions?
- NAC solutions do not support IoT devices.
- NAC solutions do not support BYOD environments.
- NAC solutions support only endpoint security.
- Some NAC solutions underperform in wired environments, creating a security vulnerability.
Question 8)
Which three parties participate in network authentication, according to the IEEE 802.1X standards? (Choose three.) Select one or more:
- Router
- Client device
- Authenticator
- Authentication server
- Certification authority
Question 9)
How does NAC effectively segment a network? Select one:
- Routers
- Using IP addresses
- Utilizing device profiles
- Using user roles
Question 10)
What action do you typically need to do to join a public network, such as one in a coffee shop? Select one:
- Register your handheld device
- Provide biometric information
- Submit your personal digital certificate
- Agree to the legal terms for using the network
Question 11)
What drives organizations to buy IoT devices? Select one:
- Can save time and money*
- Mandated by government
- Provide valuable data to the CFO
- Required as part of an air-gap solution
Question 12)
Which security challenge do BYODs pose to networks? Select one:
- Data exfiltration
- Limited RAM prevents the installation of security software
- Increase the maintenance cycle for network devices
- MIS does not control what is installed on these devices
Question 13)
Why are IoT devices potential conduits of contagion? Select one:
- Does not support two-factor authentication
- Not able to install security software
- IoT devices are often cheaply made
- There are too many incompatible IoT security standards in use.