A computer is put into a restricted VLAN until the computer’s virus definitions are up-to-date. Which of the following BEST describes this system type?
A. NAT
B. NIPS
C. NAC
D. DMZ
2 Comments on “Which of the following BEST describes this system type?”
Trinasays:
Why is it a NAC?
0
0
Super_Mariosays:
First for a definition: What is the access control?
In the fields of physical security and information security, access control (AC) is the selective restriction of access to a place or other resource. The act of accessing may mean consuming, entering, or using. Permission to access a resource is called authorization.
In here, I am practicing Network Access Control (NAC) as I want to restrict access to a computer.
This is achieved by manually moving the computer to a restricted VLAN until such a time a certain condition is met. In this case, the required condition is that the computer’s AV definition is up-to-date
As a process of elimination: A, B and D are daft
A- NAT – Network address translation
B- Network Intrussion Prevention System
D- DMS – Demilitarized zone
Why is it a NAC?
0
0
First for a definition: What is the access control?
In the fields of physical security and information security, access control (AC) is the selective restriction of access to a place or other resource. The act of accessing may mean consuming, entering, or using. Permission to access a resource is called authorization.
In here, I am practicing Network Access Control (NAC) as I want to restrict access to a computer.
This is achieved by manually moving the computer to a restricted VLAN until such a time a certain condition is met. In this case, the required condition is that the computer’s AV definition is up-to-date
As a process of elimination: A, B and D are daft
A- NAT – Network address translation
B- Network Intrussion Prevention System
D- DMS – Demilitarized zone
0
0