This Content Component encountered an error

Identity and Access Management Security School

Endpoint security protection: Policies for endpoint control <<previous|next>> :Keeping pace with emerging endpoint security technologies

Identity and Access Manag:

Endpoint security quiz

1. Which of the following endpoint security solutions is an API-level enforcement and quarantining technology built into the Cisco network infrastructure?
  1. NAP
  2. NAC
  3. TNC
  4. Integrity
2. Which of the following is a fully open endpoint security solution built on the assumption that every device has a specialized piece of hardware to verify that the endpoint hasn't been compromised?
  1. NAP
  2. CheckPoint
  3. TNC
  4. NAC
3. What role does the policy server play in endpoint security?
  1. It retrieves security credentials directly from the endpoints.
  2. It evaluates security credentials and makes an admission control policy decision.
  3. It enforces admission control policy decision.
  4. None of the above.
4. Which of the following is true of endpoint security solutions?
  1. Many current solutions are proprietary.
  2. The technology is immature.
  3. The solutions are costly and complex to implement.
  4. All of the above.
5. Which of the following is a disadvantage of client-free endpoint security solutions?
  1. They piggyback on Windows management mechanisms for remote access to local resource information.
  2. They don't require more client software to install and manage.
  3. They require some form of "managed" desktops.
  4. None of the above

If you got two or more wrong, revisit these materials in the endpoint security lesson:

  • Webcast: Top tactics for endpoint security
  • Technical article: Keeping pace with emerging endpoint security technologies
  • Podcast: Endpoint enforcement: Smart policies to control the endpoint explosion
  • If you got four or more correct, return to Identity and Access Management Security School and start another lesson.

    17 Jul 2006

    Related glossary terms

    Terms from − the technology online dictionary
    Information Security Policies, Procedures and Guidelines

    Related Resources