Está en la página 1de 2

2/16/2020 Network Access Control Quiz

 The Evolution of Cybersecurity

Started on Sunday, 16 February 2020, 11:19 AM


State Finished
Completed on Sunday, 16 February 2020, 11:20 AM
Time taken 1 min 2 secs
Marks 4/5
Grade 80 out of 100
Feedback Congratulations, you passed!

Question 1 What is one characteristic of headless devices?


Correct

Mark 1 out of 1 Select one:


Devices that cannot take a 3rd party security agent 

Devices that are connected only to a wired network

Devices that have only AV software installed

Devices that provide only centralized architecture

Question 2 What two security challenges do IoT devices present to IT security professionals? (Choose two.)
Correct

Mark 1 out of 1 Select one or more:


They are frequently stolen.

They often do not support security programs. 

They are time consuming to deploy.

They can be exploited by bad actors. 

Question 3 Which three statements are advantages of implementing a FortiNAC solution? (Choose three.)
Correct

Mark 1 out of 1 Select one or more:


FortiNAC can profile headless devices that are not equipped with an agent. 

The FortiNAC solution supports only wireless networks.

FortiNAC is integrated into the security framework. 

The FortiNAC solution has complete visibility into the network. 

The FortiNAC solution only supports BYOD environments.

Question 4 What are the three key activities performed by NAC? (Choose three.)
Correct

Mark 1 out of 1 Select one or more:


Discover all devices on the network 

Provide appropriate network access to devices 

Watch for IoT devices to respond to CNC servers in the Internet

Profile all devices to identify what access they should have 

https://training.fortinet.com/mod/quiz/review.php?attempt=2369995&cmid=51349 1/2
2/16/2020 Network Access Control Quiz

Question 5 When NAC is first deployed, what is one of the first tasks it performs?
Incorrect

Mark 0 out of 1 Select one:


Configures the firewall

Installs AV software 

Compares the signature of the file with a list of known virus signatures

Profiles all connected devices

https://training.fortinet.com/mod/quiz/review.php?attempt=2369995&cmid=51349 2/2