Get Unlimited Contributor Access to the all ExamTopics Exams!
Take advantage of PDF Files for 1000+ Exams along with community discussions and pass IT Certification Exams Easily.
An incident response report indicates a virus was introduced through a remote host that was connected to corporate resources. A cybersecurity analyst has been asked for a recommendation to solve this issue. Which of the following should be applied?
I believe NAC is correct. The question doesn’t say whether or not the remote host was authorized to be on the network. NAC is able to perform security checks on authorized remote hosts.
The answer is NAC.
Some of the functions of NAC:
"Security posture check: Evaluates security-policy compliance by user type, device type, and operating system.
Incidence response: Mitigates network threats by enforcing security policies that block, isolate, and repair noncompliant machines without administrator attention."
https://www.cisco.com/c/en/us/products/security/what-is-network-access-control-nac.html#~how-nac-works
firewalls/ACLs are typically placed on the perimeter of a network and control what goes in and out, while NACs are typically used for internal network user authentication. This one should be D. ACL.. google NIST 800-41 for better info.
Holst NAC is used to authenticate devices as they join your network, check if your devices are running up to date software if not then it will quarantine the device, NAC can also be used for contextual authentication the answer here would be NAC.
From NIST 800-41: “Another common requirement for firewalls at the edge of a network is to perform client checks for incoming connections from remote users and allow or disallow access based on those checks. This checking, commonly called network access control (NAC) or network access protection (NAP), allows access based on the user’s credentials...”
“NAC has also become a popular method for firewalls to allow or deny users access to particular network resources. In addition, application firewalls and proxies can allow or deny access to users based on the user authentication within the applications themselves.”
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
KC
Highly Voted 4Â years, 2Â months agoslcc99
Highly Voted 4Â years agoJeend
Most Recent 1Â year, 3Â months ago[Removed]
3Â years, 6Â months agoXAmbivert
4Â years agoholst
4Â years, 3Â months agomaps7
4Â years agoKC
4Â years, 2Â months ago[Removed]
4Â years, 4Â months agos3curity
4Â years, 5Â months ago