Quiz

Quiz: Locking down endpoint security

SearchSecurity.com Security School
This tip is part of SearchSecurity.com's Integration of Networking and Security School lesson, Locking down the endpoint: How network access control (NAC) can boost host security. Visit the lesson page for more learning resources.

1. Which of the following responses is not one of the four key components of network access control?

  1. Authentication
  2. Unified threat management
  3. Enforcement
  4. Endpoint security
  5. Management

2. Why is a quality remediation system an integral part of a successful network access control architecture?

  1. Because auto-remediation systems are expensive, and hard to learn and manage.
  2. Because remediation should never result in prohibition of network access.
  3. Because virtual LANs (vLANs) aren't a patching and updating cure-all.
  4. Because the remediation system should be managed separately.

3. Which statement about NAC security and policy management is not true?

  1. A NAC implementation will lead to chaos without an overarching policy management system.
  2. Organizational barriers are often a significant challenge during NAC policy management implementations.
  3. Administrators, system designers and firewall managers should all cede some control during a successful NAC policy management implementation.
  4. A viable alternative to an overarching NAC policy management system is several systems that integrate with Active Directory.

4. Which NAC security framework is best for most enterprises?

  1. Cisco's NAC
  2. Microsoft NAP
  3. Trusted Computing Group's TNC
  4. Any of the above

5. Which is the recommended network access control strategy for allowing access to unmanaged clients?

  1. Downloadable software clients
  2. Dynamic session-based updates
  3. No access for unmanaged clients
  4. None of the above

If you answered two or more questions incorrectly, revisit the materials from the lesson Locking down the endpoint: How network access control (NAC) can boost host security:

  • Tip: Essential elements of a network access control (NAC) endpoint security strategy
  • Webcast: NAC and endpoint security demystified
  • Podcast: Top 5 questions to ask when shopping for an endpoint security product

    If you answered four or more questions correctly, return to SearchSecurity.com's Integration of Networking and Security School and begin another lesson, or try another school in SearchSecurity.com's Security School Course Catalog.

    This was first published in March 2007

  • There are Comments. Add yours.

     
    TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

    REGISTER or login:

    Forgot Password?
    By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
    Sort by: OldestNewest

    Forgot Password?

    No problem! Submit your e-mail address below. We'll send you an email containing your password.

    Your password has been sent to: