2. Answer: a. Authentication, access control and remediation
3. Answer: d. NAC solutions can ensure that only users and/or groups given explicit authorization can access resources.
4. Answer: b. The products are fully mature
5. Answer: b. Once an issue is detected, the same NAC enforcement mechanisms controlling access can be put in place to quarantine the "violators."
Did you pass the quiz? Email us your results. To review the questions you got wrong, visit the materials in the Integrating security into the network lesson of our Identity and Access Management Security School.
This was first published in September 2006
Security Management Strategies for the CIO