Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.

Unlimited Access

Get Unlimited Contributor Access to the all ExamTopics Exams!
Take advantage of PDF Files for 1000+ Exams along with community discussions and pass IT Certification Exams Easily.

Exam CS0-001 topic 1 question 32 discussion

Actual exam question from CompTIA's CS0-001
Question #: 32
Topic #: 1
[All CS0-001 Questions]

An incident response report indicates a virus was introduced through a remote host that was connected to corporate resources. A cybersecurity analyst has been asked for a recommendation to solve this issue. Which of the following should be applied?

  • A. MAC
  • B. TAP
  • C. NAC
  • D. ACL
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
KC
Highly Voted 4 years, 2 months ago
I believe NAC is correct. The question doesn’t say whether or not the remote host was authorized to be on the network. NAC is able to perform security checks on authorized remote hosts.
upvoted 6 times
...
slcc99
Highly Voted 4 years ago
This question was in the exam :)
upvoted 6 times
...
Jeend
Most Recent 1 year, 3 months ago
Network Access Control
upvoted 1 times
...
[Removed]
3 years, 6 months ago
NAC is the correct answer as it also offers to check the health of hosts by putting them in quarantine for remediation before re-joining the network.
upvoted 2 times
...
XAmbivert
4 years ago
The answer is NAC. Some of the functions of NAC: "Security posture check: Evaluates security-policy compliance by user type, device type, and operating system. Incidence response: Mitigates network threats by enforcing security policies that block, isolate, and repair noncompliant machines without administrator attention." https://www.cisco.com/c/en/us/products/security/what-is-network-access-control-nac.html#~how-nac-works
upvoted 2 times
...
holst
4 years, 3 months ago
firewalls/ACLs are typically placed on the perimeter of a network and control what goes in and out, while NACs are typically used for internal network user authentication. This one should be D. ACL.. google NIST 800-41 for better info.
upvoted 1 times
maps7
4 years ago
Holst NAC is used to authenticate devices as they join your network, check if your devices are running up to date software if not then it will quarantine the device, NAC can also be used for contextual authentication the answer here would be NAC.
upvoted 3 times
...
KC
4 years, 2 months ago
From NIST 800-41: “Another common requirement for firewalls at the edge of a network is to perform client checks for incoming connections from remote users and allow or disallow access based on those checks. This checking, commonly called network access control (NAC) or network access protection (NAP), allows access based on the user’s credentials...” “NAC has also become a popular method for firewalls to allow or deny users access to particular network resources. In addition, application firewalls and proxies can allow or deny access to users based on the user authentication within the applications themselves.”
upvoted 5 times
...
...
[Removed]
4 years, 4 months ago
Remote host-NAC would prevent access using location-based access?
upvoted 1 times
...
s3curity
4 years, 5 months ago
This should be ACL and not NAC
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...