Deploying NAC for Network Access Control | Exam N10-007 Answer

NAC - Network Access Control for Botnet Detection and Prevention

Prev Question Next Question

Question

A network administrator has noticed many systems on the network have traffic that is anomalous and may be part of a botnet.

The administrator wants to implement an access control method that requires a computer to have antivirus software installed before being granted network access.

Which of the following should the administrator deploy?

A.

802.1X B.

Captive portal C.

Port security D.

NAC.

D.

Explanations

A network administrator has noticed many systems on the network have traffic that is anomalous and may be part of a botnet.

The administrator wants to implement an access control method that requires a computer to have antivirus software installed before being granted network access.

Which of the following should the administrator deploy?

A.

802.1X

B.

Captive portal

C.

Port security

D.

NAC.

D.

The access control method that the administrator should deploy is NAC, which stands for Network Access Control.

NAC is a security solution that enforces policies on devices attempting to access a network to ensure compliance with security standards. In this case, the policy would be to require antivirus software installed on each device before granting access to the network.

802.1X is an authentication protocol that provides port-based access control to devices attempting to connect to a LAN or WLAN. However, it does not provide antivirus software enforcement.

A captive portal is a web page that requires users to complete a specific action, such as agreeing to terms and conditions, before being granted network access. While this can be used to enforce security policies, it does not provide antivirus software enforcement.

Port security is a feature that limits the number of MAC addresses that can be learned on a switch port. It helps prevent unauthorized access, but it does not provide antivirus software enforcement.

In summary, NAC is the most appropriate solution for this scenario as it provides the required security policy enforcement by verifying the presence of antivirus software on devices before granting access to the network.