Network Access Control (NAC) (obj 2.2) Flashcards

(20 cards)

1
Q

What does NAC stand for?

A

Network Access Control

NAC is a method for increasing network security by inspecting devices before granting them access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the primary purpose of the NAC process?

A

To inspect devices as they connect to determine if they are secure enough for access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What happens to devices during the NAC process?

A

Devices are isolated and inspected based on NAC configurations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Port Security?

A

Secures physical network ports to prevent unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does Port Security limit?

A

Limits the number of devices that can connect to a network switch or hub.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How can Port Security be configured?

A

To allow specific MAC addresses or a set of specified MAC addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is MAC Filtering?

A

Controls access to the network based on devices’ unique MAC addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does MAC Filtering maintain?

A

A list of approved MAC addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the difference between allow listing and block listing in MAC Filtering?

A
  • Allow listing: Only approved MAC addresses allowed
  • Block listing: All devices allowed except those on the list.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does 802.1X Authentication provide?

A

An authentication framework for networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does 802.1X Authentication ensure?

A

Only authenticated users can access network services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What protocol does 802.1X encapsulate?

A

Extensible Authentication Protocol (EAP).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the three components of 802.1X Authentication?

A
  • Supplicant – user device
  • Authenticator – network device
  • Authentication server – authenticates user device.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What type of agents can be used in NAC implementation?

A
  • Persistent agents for company-provided computers
  • Non-persistent agents for personally owned devices.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What happens to devices that fail inspection in the NAC process?

A

They are either denied access or placed in a quarantine zone for further remediation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Time-based Access Control?

A

Limits network access based on specified hours.

17
Q

What is Location-based Access Control?

A

Verifies the physical location of the device.

18
Q

What is Role-based Access Control?

A

Grants permissions based on user roles.

19
Q

What is Rule-based Access Control?

A

Grants or denies access based on predefined rules.

20
Q

What are the benefits of NAC?

A
  • Strengthens network security by ensuring only authenticated devices can access the network
  • Provides a scalable solution for modern and diverse network infrastructures.