Quiz: Locking down endpoint security

A five-question multiple-choice quiz to test your understanding of the content presented by expert Joel Snyder in this lesson of SearchSecurity.com's Integration of Networking and Security School.

SearchSecurity.com Security School
This tip is part of SearchSecurity.com's Integration of Networking and Security School lesson, Locking down the endpoint: How network access control (NAC) can boost host security. Visit the lesson page for more learning resources.

1. Which of the following responses is not one of the four key components of network access control?

  1. Authentication
  2. Unified threat management
  3. Enforcement
  4. Endpoint security
  5. Management

2. Why is a quality remediation system an integral part of a successful network access control architecture?

  1. Because auto-remediation systems are expensive, and hard to learn and manage.
  2. Because remediation should never result in prohibition of network access.
  3. Because virtual LANs (vLANs) aren't a patching and updating cure-all.
  4. Because the remediation system should be managed separately.

3. Which statement about NAC security and policy management is not true?

  1. A NAC implementation will lead to chaos without an overarching policy management system.
  2. Organizational barriers are often a significant challenge during NAC policy management implementations.
  3. Administrators, system designers and firewall managers should all cede some control during a successful NAC policy management implementation.
  4. A viable alternative to an overarching NAC policy management system is several systems that integrate with Active Directory.

4. Which NAC security framework is best for most enterprises?

  1. Cisco's NAC
  2. Microsoft NAP
  3. Trusted Computing Group's TNC
  4. Any of the above

5. Which is the recommended network access control strategy for allowing access to unmanaged clients?

  1. Downloadable software clients
  2. Dynamic session-based updates
  3. No access for unmanaged clients
  4. None of the above

If you answered two or more questions incorrectly, revisit the materials from the lesson Locking down the endpoint: How network access control (NAC) can boost host security:

  • Tip: Essential elements of a network access control (NAC) endpoint security strategy
  • Webcast: NAC and endpoint security demystified
  • Podcast: Top 5 questions to ask when shopping for an endpoint security product

    If you answered four or more questions correctly, return to SearchSecurity.com's Integration of Networking and Security School and begin another lesson, or try another school in SearchSecurity.com's Security School Course Catalog.

  • This was last published in March 2007

    Dig Deeper on Network Access Control technologies

    Start the conversation

    Send me notifications when other members comment.

    Please create a username to comment.