Home Fortinet Network Access Control Quiz Answers NSE 2 Information Security Awareness Fortinet

Network Access Control Quiz Answers NSE 2 Information Security Awareness Fortinet

0
795

Question 1: What is one characteristic of headless devices?

  • Devices that are connected only to a wired network
  • Devices that cannot take a 3rd party security agent
  • Devices that have only AV software installed
  • Devices that provide only centralized architecture

Question 2: What are the three key activities performed by NAC? (Choose three.)

  • Profile all devices to identify what access they should have
  • Watch for IoT devices to respond to CNC servers in the Internet
  • Provide appropriate network access to devices
  • Discover all devices on the network

Question 3: Which three statements are advantages of implementing a FortiNAC solution? (Choose three.)

  • The FortiNAC solution supports only wireless networks.
  • The FortiNAC solution only supports BYOD environments.
  • FortiNAC is integrated into the security framework.
  • The FortiNAC solution has complete visibility into the network.
  • FortiNAC can profile headless devices that are not equipped with an agent.

Question 4: What two security challenges do IoT devices present to IT security professionals? (Choose two.)

  • They are time consuming to deploy.
  • They often do not support security programs.
  • They are frequently stolen.
  • They can be exploited by bad actors.

Question 5: When NAC is first deployed, what is one of the first tasks it performs?

  • Installs AV software
  • Compares the signature of the file with a list of known virus signatures
  • Configures the firewall
  • Profiles all connected devices

Question 6: Which two network security concerns have grown dramatically for businesses in recent years? (Choose two.)

  • Need for overall network visibility
  • Malware protection requirements
  • Need for AVs
  • IoT devices connecting to a network

Question 7: What is one shortcoming of NAC solutions?

  • NAC solutions do not support BYOD environments.
  • NAC solutions support only endpoint security.
  • Some NAC solutions underperform in wired environments, creating a security vulnerability.
  • NAC solutions do not support IoT devices.

Question 8:Which three parties participate in network authentication, according to the IEEE 802.1X standards? (Choose three.)

Select one or more:

  • Authentication server
  • Authenticator
  • Router
  • Client device
  • Certification authority

Question 9:How does NAC effectively segment a network?
Select one:

  • Using IP addresses
  • Utilizing device profiles
  • Using user roles
  • Routers

Question 10:What action do you typically need to do to join a public network, such as one in a coffee shop?
Select one:

  • Provide biometric information
  • Submit your personal digital certificate
  • Register your handheld device
  • Agree to the legal terms for using the network

Question 11:What drives organizations to buy IoT devices?
Select one:

  • Mandated by government
  • Provide valuable data to the CFO
  • Required as part of an air-gap solution
  • Can save time and money*

Question 12:Which security challenge do BYODs pose to networks?
Select one:

  • Limited RAM prevents the installation of security software
  • Data exfiltration
  • Increase the maintenance cycle for network devices
  • MIS does not control what is installed on these devices

Question 13:Why are IoT devices potential conduits of contagion?
Select one:

  • IoT devices are often cheaply made
  • There are too many incompatible IoT security standards in use.
  • Does not support two-factor authentication
  • Not able to install security software

NO COMMENTS

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Please Comment for your required Exam Answers and we will try to provide you at shortest time. We truly value your contribution to the website. Thank you!!!