2A Flashcards
What does NAC stand for?
Network Access Control
___ is a wired and wireless network security solution that allows
control of access based on predefined conditions that systems must meet prior to being granted access to a network.
NAC
Any system not meeting NAC conditions may be directed to a ___ ___ that allows the user to become compliant and then gain access to the main network. The restricted network does not grant access to network resources.
restricted network
What are the four types of NAC?
- Agent-Based NAC
- Agentless-Based NAC
- Dissolvable Agent
- Permanent Agent
___ ____ ____ utilizes software installed on clients which authenticates the client to the NAC for scanning before allowing network access.
Agent-based NAC
____ ____ does not require agent software to be installed on a client. The authentication server will perform any required checks.
Agentless NAC
NAC agents can be ____, thereby continuously monitoring the system it’s installed on, or they can be dissolvable.
permanent
___ agents are installed on the device when it attempts to connect to the network. After scanning the device for compliance, the ___ NAC will either remove itself immediately, or it may remain on the device until the device disconnects from the network.
Dissolvable agents
Secured system access requires individuals to identify themselves and for a system to verify that they are who they say they are. This verification process is called ___.
authentication
What are the five different kinds of authentication factors?
- Something you know
- Something you have
- Something you are
- Somewhere you are
- Something you do
The following describes which kind of authentication factor?
Users must know something to prove their identity. Examples include passwords and personal identification numbers (PINs). This is the most common authentication factor.
Something you know
The following describes which kind of authentication factor?
Relies on users possessing physical objects prior to being granted access. Examples include swipe cards, physical tokens and codes sent to mobile phones via text message.
Something you have
The following describes which kind of authentication factor?
Based on a user’s physical characteristic, such as fingerprints, voice, retina, or facial recognition. A biometrics system is required for this factor.
Something you are
The following describes which kind of authentication factor?
Based upon a user’s location, determined by the global positioning system (GPS) or Internet protocol (IP) address.
Somewhere you are
The following describes which kind of authentication factor?
Based on user habits like typing patterns, the user’s natural signature, or the way they walk (gait).
Something you do
Combining more than one authentication factor is even more secure than single-factor authentication. ___ ___ uses two or more factors, such as something you have (token) + something you know (password).
Multifactor authentication
It is important to know that combining multiple things within the same factor category is ___ multifactor authentication. For example, a username + password scheme is still based on two
kinds of something you know.
is NOT
Traditionally, every server throughout a network requires a separate logon and authentication process. With ___ ___ ___, users authenticate once onto a network, and are granted access to
multiple systems without needing to provide additional credentials.
single sign-on (SSO)
SSO has advantages for both users and administrators. For users, the advantage is that they don’t have to…?
remember credentials for multiple systems
SSO has advantages for both users and administrators. For administrators, the advantage is that they don’t have to…?
manage multiple logon credentials for every user for each server
However, the drawback to SSO is that if an account is compromised, a hacker can now…?
access multiple servers rather than just one
What are the three types of Network Security Enforcement?
- Host Health Checks
- Wireless Terms of Usage
- 802.1x
The following describes which kind of Network Security Enforcement?
NAC can scan a system attempting to connect to the network for operating system updates, antivirus software and virus definitions, and it can determine whether a host-based firewall is installed and running.
Host Health Check
The following describes which kind of Network Security Enforcement?
NAC may require users connecting to a wireless network to accept terms of usage before permitting them access.
Wireless Terms of Usage
The following describes which kind of Network Security Enforcement?
A popular authentication protocol for hardening a network to ensure that anyone who connects to the network provides valid credentials before the network connection is allowed. An Institute of Electrical and Electronics Engineers (IEEE) standard ____-compliant switch can be configured in conjunction with an authentication service to ensure connecting clients are authenticated before permitting network access.
802.1x