Section 21.202 Network Access Control (NAC) Flashcards

Objective 4.1 Given a scenario, you must be able to apply common security techniques to computing resources. Objective 4.5 Given a scenario, you must be able to modify enterprise capabilities to enhance security.

1
Q

Network Access Control (NAC)

A

Scans devices for theri security status before granting network access, safeguarding against both known and unknown devices

■ Can be applied to devices within the internal network or those connecting remotely via VPN

■ NAC can be implemented as a hardware or software solution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

NAC Process

A

■ When a device attempts to connect, it is placed in a virtual holding area for scanning

■ Scanning checks various factors, including antivirus definitions, security patching, and potential security threats

■ If a device passes inspection, it is allowed network access

■ If a device fails inspection, it is placed in a digital quarantine area for remediation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

NAC Agent Types (Solution)

Persistent Agents

A

Installed on devices in a corporate environment where the organisation
owns and controls device software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

NAC Agent Types (Solution)

Non-Persistent Agents

A

Common in environments with personal devices (e.g college campuses) users connect, access a web-based captive portal, download an agent for scanning, and delete itself after inspection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

IEEE Standard 802.1x Standard

A

■ Port-based Network Access Control mechanism based on the IEEE 802.1x
standard

■ Modern NAC solutions build on 802.1x, enhancing features and capabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Rule-Based Access Control

Time-Based Factors

In addition to health policy, NAC can use rule-based methods for access control

A

Define access periods based on time schedules; may block access
during non-working hours

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Rule-Based Access Control

Location-Based Factors

A

Evaluate the endpoint’s location using geolocation data to detect
unusual login locations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Rule-Based Access Control

Role-Based Factors

A

Reevaluate device authorisation based on its role (adaptive NAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Rule-Based Access Control

Rule-Based Factors

A

Implement complex admission policies with logical statements to
determine access based on conditions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly