0% found this document useful (0 votes)
115 views2 pages

NS2 Module 6

The document summarizes the results of a quiz on network access control (NAC). It indicates that the user passed the quiz with a score of 80% by answering 4 out of 5 questions correctly. The quiz tested knowledge about key characteristics of headless devices, security challenges posed by IoT devices, advantages of implementing NAC solutions like FortiNAC, and common activities performed by NAC systems like device discovery, profiling, and appropriate network access provisioning. The only question answered incorrectly was about one of the first tasks performed by NAC upon initial deployment.

Uploaded by

oviuap
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
115 views2 pages

NS2 Module 6

The document summarizes the results of a quiz on network access control (NAC). It indicates that the user passed the quiz with a score of 80% by answering 4 out of 5 questions correctly. The quiz tested knowledge about key characteristics of headless devices, security challenges posed by IoT devices, advantages of implementing NAC solutions like FortiNAC, and common activities performed by NAC systems like device discovery, profiling, and appropriate network access provisioning. The only question answered incorrectly was about one of the first tasks performed by NAC upon initial deployment.

Uploaded by

oviuap
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

2/16/2020 Network Access Control Quiz

 The Evolution of Cybersecurity

Started on Sunday, 16 February 2020, 11:19 AM


State Finished
Completed on Sunday, 16 February 2020, 11:20 AM
Time taken 1 min 2 secs
Marks 4/5
Grade 80 out of 100
Feedback Congratulations, you passed!

Question 1 What is one characteristic of headless devices?


Correct

Mark 1 out of 1 Select one:


Devices that cannot take a 3rd party security agent 

Devices that are connected only to a wired network

Devices that have only AV software installed

Devices that provide only centralized architecture

Question 2 What two security challenges do IoT devices present to IT security professionals? (Choose two.)
Correct

Mark 1 out of 1 Select one or more:


They are frequently stolen.

They often do not support security programs. 

They are time consuming to deploy.

They can be exploited by bad actors. 

Question 3 Which three statements are advantages of implementing a FortiNAC solution? (Choose three.)
Correct

Mark 1 out of 1 Select one or more:


FortiNAC can profile headless devices that are not equipped with an agent. 

The FortiNAC solution supports only wireless networks.

FortiNAC is integrated into the security framework. 

The FortiNAC solution has complete visibility into the network. 

The FortiNAC solution only supports BYOD environments.

Question 4 What are the three key activities performed by NAC? (Choose three.)
Correct

Mark 1 out of 1 Select one or more:


Discover all devices on the network 

Provide appropriate network access to devices 

Watch for IoT devices to respond to CNC servers in the Internet

Profile all devices to identify what access they should have 

https://training.fortinet.com/mod/quiz/review.php?attempt=2369995&cmid=51349 1/2
2/16/2020 Network Access Control Quiz

Question 5 When NAC is first deployed, what is one of the first tasks it performs?
Incorrect

Mark 0 out of 1 Select one:


Configures the firewall

Installs AV software 

Compares the signature of the file with a list of known virus signatures

Profiles all connected devices

https://training.fortinet.com/mod/quiz/review.php?attempt=2369995&cmid=51349 2/2

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy