Lesson 02: Network Access Control Quiz Answers
Question: How does NAC effectively segment a network?
- Utilizing device profiles
- Using user roles
- Using IP addresses
- Routers
Question: Which security challenge do BYODs pose to networks?
- Limited RAM prevents the installation of security software
- MIS does not control what is installed on these devices
- Increase the maintenance cycle for network devices
- Data exfiltration
Question: What drives organizations to buy IoT devices?
- Can save time and money
- Mandated by government
- Provide valuable data to the CFO
- Required as part of an air-gap solution
Question: Which three parties participate in network authentication, according to the IEEE 802.1X standards? (Choose three.)
- Router
- Client device
- Authentication server
- Authenticator
- Certification authority
Question: What action do you typically need to do to join a public network, such as one in a coffee shop?
- Agree to the legal terms for using the network
- Submit your personal digital certificate
- Register your handheld device
- Provide biometric information
Question: Why are IoT devices potential conduits of contagion?
- Not able to install security software
- There are too many incompatible IoT security standards in use
- IoT devices are often cheaply made
- Does not support two-factor authentication