What is used to scan a BYOD device to verify that it is compliant with company security policies before the device is permitted to access the network?

IT Questions BankCategory: Network DefenseWhat is used to scan a BYOD device to verify that it is compliant with company security policies before the device is permitted to access the network?

What is used to scan a BYOD device to verify that it is compliant with company security policies before the device is permitted to access the network?

  • ACL
  • NAC
  • reconnaissance
  • proxy server
  • IDS

Explanation: One of the goals of NAC is to evaluate device compliance with security policies by user type, device type, and operating system prior to permitting network access. NAC system automation features make network access of BYOD and IoT devices practical.

Exam with this question: Network Defense – 3.5.2 Module 3: Access Control Quiz


guest

0 Comments
Inline Feedbacks
View all comments
0
Would love your thoughts, please comment.x