What are the three key activities performed by NAC? (Choose three.)
Select one or more:
Provide appropriate network access to devices
Watch for IoT devices to respond to CNC servers in the Internet
Profile all devices to identify what access they should have
*Discover all devices on the network
Which three statements are advantages of implementing a FortiNAC solution? (Choose three.)
Select one or more:
The FortiNAC solution has complete visibility into the network.
FortiNAC can profile headless devices that are not equipped with an agent.
*FortiNAC is integrated into the security framework.
The FortiNAC solution only supports BYOD environments.
The FortiNAC solution supports only wireless networks
Which two network security concerns have grown dramatically for businesses in recent years? (Choose two.)
Select one or more:
IoT devices connecting to a network
Need for overall network visibility
Need for AVs
Malware protection requirements
What two security challenges do IoT devices present to IT security professionals? (Choose two.)
Select one or more:
They are time consuming to deploy.
They are frequently stolen.
They often do not support security programs.
They can be exploited by bad actors
When NAC is first deployed, what is one of the first tasks it performs?
Select one:
Configures the firewall
Installs AV software
Compares the signature of the file with a list of known virus signatures
*Profiles all connected devices
What is one shortcoming of NAC solutions?
Select one:
NAC solutions do not support IoT devices.
NAC solutions do not support BYOD environments.
NAC solutions support only endpoint security.
*Some NAC solutions underperform in wired environments, creating a security vulnerability
What is one characteristic of headless devices?
Select one:
*Devices that cannot take a 3rd party security agent
Devices that provide only centralized architecture
Devices that have only AV software installed
Devices that are connected only to a wired network
What are the three key activities performed by NAC? (Choose three.) Select one or more: Provide appropriate network access to devices Watch for IoT devices to respond to CNC servers in the Internet Profile all devices to identify what access they should have *Discover all devices on the network
Which three statements are advantages of implementing a FortiNAC solution? (Choose three.) Select one or more: The FortiNAC solution has complete visibility into the network. FortiNAC can profile headless devices that are not equipped with an agent. *FortiNAC is integrated into the security framework. The FortiNAC solution only supports BYOD environments. The FortiNAC solution supports only wireless networks
Which two network security concerns have grown dramatically for businesses in recent years? (Choose two.) Select one or more: IoT devices connecting to a network Need for overall network visibility Need for AVs Malware protection requirements
What two security challenges do IoT devices present to IT security professionals? (Choose two.) Select one or more: They are time consuming to deploy. They are frequently stolen. They often do not support security programs. They can be exploited by bad actors
When NAC is first deployed, what is one of the first tasks it performs? Select one: Configures the firewall Installs AV software Compares the signature of the file with a list of known virus signatures *Profiles all connected devices
What is one shortcoming of NAC solutions? Select one: NAC solutions do not support IoT devices. NAC solutions do not support BYOD environments. NAC solutions support only endpoint security. *Some NAC solutions underperform in wired environments, creating a security vulnerability
What is one characteristic of headless devices? Select one: *Devices that cannot take a 3rd party security agent Devices that provide only centralized architecture Devices that have only AV software installed Devices that are connected only to a wired network