(1)Secure Network Construction Flashcards

1
Q

What do Network Access Control (NAC) systems do?

A

NAC systems help to keep bad people out and to make sure that the system covers the bases of proper security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the 802.1X protocol? What are two connection types that may use it?

A

The 802.1X protocol is a popular standard used with Network Access Control (NAC).

It is involved if a user connects to a network through a physical cable or a wireless network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

In the 802.1X protocol, what is a supplicant?

A

A supplicant is a software program that is on a device that is used to tell a network that it would like to connect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

In the 802.1X protocol, what is the authenticator?

A

The authenticator is a service that is running on a wireless access point or a switch. It passes sign on requests to the Remote Authentication Dial-In User Service (RADIUS) protocol for full authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What if a user tries to connect in 802.1X and fails authentication?

A

If a user tries to connect in 802.1X and fails authentication, then the user is denied access or may be put on a quarantine network until the issue can be resolved.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the difference between an agentless and agent based approach to 802.1X within NAC?

A

Agent based approaches involve a special software (called an agent) to be on the NAC service.

Agentless do authentication in the web browser

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the difference between in band and out of band in terms of NAC solutions within 802.1X?

A

In band solutions use committed appliances that are in the way of devices and the resources that they want to get to. Devices that wish to access the network must pass NAC authentication.

Out of band solutions such as 802.1X use network infrastructure that is already in place and has network devices talk to the authentication servers and then reorient the network to give or reject network access as appropriate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Network Access Control (NAC) solutions often simply allow or deny access based on username/password and a couple other criteria. What other criteria may be involved in NAC?

A

Other criteria involved in NAC could include:

-Time of Day
-Role
-Location
-System Health

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

If Network Access Control (NAC) solutions use the health of a system as a measuring unit to determine access to the network, what does the system health entail?

What is a system’s health is not sufficient based on NAC requirements?

A

System health includes if the device has proper firewalls configured, virus definitions, system updates, and other factors.

If a system health isn’t good enough for a network, then the system can be put on a quarantine network until the system has the proper configurations to be allowed full access to the production network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly