Download as pdf or txt
Download as pdf or txt
You are on page 1of 2

23/4/2020 Network Access Control Quiz

 The Evolution of Cybersecurity

Started on Thursday, April 23, 2020, 7:36 AM


State Finished
Completed on Thursday, April 23, 2020, 7:49 AM
Time taken 13 mins 18 secs
Points 4/5
Grade 83 out of 100
Feedback Congratulations, you passed!

Question 1 What two security challenges do IoT devices present to IT security professionals? (Choose two.)
Correct

1 points out of 1 Select one or more:


They can be exploited by bad actors. 

They are frequently stolen.

They often do not support security programs. 

They are time consuming to deploy.

Question 2 When NAC is first deployed, what is one of the first tasks it performs?
Correct

1 points out of 1 Select one:


Installs AV software

Compares the signature of the file with a list of known virus signatures

Profiles all connected devices 

Configures the firewall

Question 3 Which three statements are advantages of implementing a FortiNAC solution? (Choose three.)
Partially correct

0 points out of 1 Select one or more:


FortiNAC is integrated into the security framework. 

The FortiNAC solution has complete visibility into the network. 

The FortiNAC solution supports only wireless networks.

The FortiNAC solution only supports BYOD environments. 

FortiNAC can profile headless devices that are not equipped with an agent.

Question 4 What is one shortcoming of NAC solutions?


Correct

1 points out of 1 Select one:


NAC solutions support only endpoint security.

NAC solutions do not support BYOD environments.

Some NAC solutions underperform in wired environments, creating a security vulnerability. 

NAC solutions do not support IoT devices.

https://training.fortinet.com/mod/quiz/review.php?attempt=3148171&cmid=51349 1/2
23/4/2020 Network Access Control Quiz

Question 5 Which two network security concerns have grown dramatically for businesses in recent years? (Choose two.)
Correct

1 points out of 1 Select one or more:


Need for overall network visibility 

Malware protection requirements

IoT devices connecting to a network 

Need for AVs

https://training.fortinet.com/mod/quiz/review.php?attempt=3148171&cmid=51349 2/2

You might also like