2A Flashcards

1
Q

What does NAC stand for?

A

Network Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

___ is a wired and wireless network security solution that allows
control of access based on predefined conditions that systems must meet prior to being granted access to a network.

A

NAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Any system not meeting NAC conditions may be directed to a ___ ___ that allows the user to become compliant and then gain access to the main network. The restricted network does not grant access to network resources.

A

restricted network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the four types of NAC?

A
  1. Agent-Based NAC
  2. Agentless-Based NAC
  3. Dissolvable Agent
  4. Permanent Agent
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

___ ____ ____ utilizes software installed on clients which authenticates the client to the NAC for scanning before allowing network access.

A

Agent-based NAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

____ ____ does not require agent software to be installed on a client. The authentication server will perform any required checks.

A

Agentless NAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

NAC agents can be ____, thereby continuously monitoring the system it’s installed on, or they can be dissolvable.

A

permanent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

___ agents are installed on the device when it attempts to connect to the network. After scanning the device for compliance, the ___ NAC will either remove itself immediately, or it may remain on the device until the device disconnects from the network.

A

Dissolvable agents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Secured system access requires individuals to identify themselves and for a system to verify that they are who they say they are. This verification process is called ___.

A

authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the five different kinds of authentication factors?

A
  1. Something you know
  2. Something you have
  3. Something you are
  4. Somewhere you are
  5. Something you do
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The following describes which kind of authentication factor?

Users must know something to prove their identity. Examples include passwords and personal identification numbers (PINs). This is the most common authentication factor.

A

Something you know

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The following describes which kind of authentication factor?

Relies on users possessing physical objects prior to being granted access. Examples include swipe cards, physical tokens and codes sent to mobile phones via text message.

A

Something you have

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The following describes which kind of authentication factor?

Based on a user’s physical characteristic, such as fingerprints, voice, retina, or facial recognition. A biometrics system is required for this factor.

A

Something you are

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The following describes which kind of authentication factor?

Based upon a user’s location, determined by the global positioning system (GPS) or Internet protocol (IP) address.

A

Somewhere you are

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The following describes which kind of authentication factor?

Based on user habits like typing patterns, the user’s natural signature, or the way they walk (gait).

A

Something you do

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Combining more than one authentication factor is even more secure than single-factor authentication. ___ ___ uses two or more factors, such as something you have (token) + something you know (password).

A

Multifactor authentication

17
Q

It is important to know that combining multiple things within the same factor category is ___ multifactor authentication. For example, a username + password scheme is still based on two
kinds of something you know.

A

is NOT

18
Q

Traditionally, every server throughout a network requires a separate logon and authentication process. With ___ ___ ___, users authenticate once onto a network, and are granted access to
multiple systems without needing to provide additional credentials.

A

single sign-on (SSO)

19
Q

SSO has advantages for both users and administrators. For users, the advantage is that they don’t have to…?

A

remember credentials for multiple systems

20
Q

SSO has advantages for both users and administrators. For administrators, the advantage is that they don’t have to…?

A

manage multiple logon credentials for every user for each server

21
Q

However, the drawback to SSO is that if an account is compromised, a hacker can now…?

A

access multiple servers rather than just one

22
Q

What are the three types of Network Security Enforcement?

A
  1. Host Health Checks
  2. Wireless Terms of Usage
  3. 802.1x
23
Q

The following describes which kind of Network Security Enforcement?

NAC can scan a system attempting to connect to the network for operating system updates, antivirus software and virus definitions, and it can determine whether a host-based firewall is installed and running.

A

Host Health Check

24
Q

The following describes which kind of Network Security Enforcement?

NAC may require users connecting to a wireless network to accept terms of usage before permitting them access.

A

Wireless Terms of Usage

25
Q

The following describes which kind of Network Security Enforcement?

A popular authentication protocol for hardening a network to ensure that anyone who connects to the network provides valid credentials before the network connection is allowed. An Institute of Electrical and Electronics Engineers (IEEE) standard ____-compliant switch can be configured in conjunction with an authentication service to ensure connecting clients are authenticated before permitting network access.

A

802.1x