2. Answer: c. TNC
3. Answer: b. It evaluates security credentials and makes an admission control policy decision
4. Answer: d. All of the above
5. Answer: c. They require some form of "managed" desktops
Did you pass the quiz? Email us your results. To review the questions you got wrong, visit the materials in the Endpoint security lesson of our Identity and Access Management Security School
- Webcast: Top Tactics for Endpoint Security
- Technical article: Keeping pace with emerging endpoint security technologies
- Podcast: Endpoint enforcement: Smart policies to control the endpoint explosion
This was first published in August 2006
Security Management Strategies for the CIO