Quiz: Locking down endpoint security

A five-question multiple-choice quiz to test your understanding of the content presented by expert Joel Snyder in this lesson of SearchSecurity.com's Integration of Networking and Security School.

SearchSecurity.com Security School
This tip is part of SearchSecurity.com's Integration of Networking and Security School lesson, Locking down the endpoint: How network access control (NAC) can boost host security. Visit the lesson page for more learning resources.

1. Which of the following responses is not one of the four key components of network access control?

  1. Authentication
  2. Unified threat management
  3. Enforcement
  4. Endpoint security
  5. Management

2. Why is a quality remediation system an integral part of a successful network access control architecture?

  1. Because auto-remediation systems are expensive, and hard to learn and manage.
  2. Because remediation should never result in prohibition of network access.
  3. Because virtual LANs (vLANs) aren't a patching and updating cure-all.
  4. Because the remediation system should be managed separately.

3. Which statement about NAC security and policy management is not true?

  1. A NAC implementation will lead to chaos without an overarching policy management system.
  2. Organizational barriers are often a significant challenge during NAC policy management implementations.
  3. Administrators, system designers and firewall managers should all cede some control during a successful NAC policy management implementation.
  4. A viable alternative to an overarching NAC policy management system is several systems that integrate with Active Directory.

4. Which NAC security framework is best for most enterprises?

  1. Cisco's NAC
  2. Microsoft NAP
  3. Trusted Computing Group's TNC
  4. Any of the above

5. Which is the recommended network access control strategy for allowing access to unmanaged clients?

  1. Downloadable software clients
  2. Dynamic session-based updates
  3. No access for unmanaged clients
  4. None of the above

If you answered two or more questions incorrectly, revisit the materials from the lesson Locking down the endpoint: How network access control (NAC) can boost host security:

  • Tip: Essential elements of a network access control (NAC) endpoint security strategy
  • Webcast: NAC and endpoint security demystified
  • Podcast: Top 5 questions to ask when shopping for an endpoint security product

    If you answered four or more questions correctly, return to SearchSecurity.com's Integration of Networking and Security School and begin another lesson, or try another school in SearchSecurity.com's Security School Course Catalog.

  • This was first published in March 2007

    Dig deeper on Network Access Control Basics

    Pro+

    Features

    Enjoy the benefits of Pro+ membership, learn more and join.

    0 comments

    Oldest 

    Forgot Password?

    No problem! Submit your e-mail address below. We'll send you an email containing your password.

    Your password has been sent to:

    -ADS BY GOOGLE

    SearchCloudSecurity

    SearchNetworking

    SearchCIO

    SearchConsumerization

    SearchEnterpriseDesktop

    SearchCloudComputing

    ComputerWeekly

    Close