Soru 1: What is one characteristic of headless devices?
Devices that provide only centralized architecture
Devices that are connected only to a wired network
Devices that cannot take a 3rd party security agent
Devices that have only AV software installed
Soru 2: What two security challenges do IoT devices present to IT security professionals? (Choose two.)
They often do not support security programs.
They are time consuming to deploy.
They can be exploited by bad actors.
They are frequently stolen.
Soru 3: What is one shortcoming of NAC solutions?
NAC solutions support only endpoint security.
Some NAC solutions underperform in wired environments, creating a security vulnerability.
NAC solutions do not support IoT devices.
NAC solutions do not support BYOD environments.
Soru 4: Which two network security concerns have grown dramatically for businesses in recent years? (Choose two.)
Malware protection requirements
Need for overall network visibility
IoT devices connecting to a network
Need for AVs
Soru 5: What are the three key activities performed by NAC? (Choose three.)
Profile all devices to identify what access they should have
Provide appropriate network access to devices
Watch for IoT devices to respond to CNC servers in the Internet
Discover all devices on the network