What is used to scan a BYOD device to verify that it is compliant with company security policies before the device is permitted to access the network?
- ACL
- NAC
- reconnaissance
- proxy server
- IDS
Explanation: One of the goals of NAC is to evaluate device compliance with security policies by user type, device type, and operating system prior to permitting network access. NAC system automation features make network access of BYOD and IoT devices practical.
Exam with this question: Network Defense - 3.5.2 Module 3: Access Control Quiz
Please login or Register to submit your answer