Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.

Unlimited Access

Get Unlimited Contributor Access to the all ExamTopics Exams!
Take advantage of PDF Files for 1000+ Exams along with community discussions and pass IT Certification Exams Easily.

Exam CISSP topic 1 question 84 discussion

Actual exam question from ISC's CISSP
Question #: 84
Topic #: 1
[All CISSP Questions]

Which of the following is the MOST effective way to ensure the endpoint devices used by remote users are compliant with an organization's approved policies before being allowed on the network?

  • A. Network Access Control (NAC)
  • B. Privileged Access Management (PAM)
  • C. Group Policy Object (GPO)
  • D. Mobile Device Management (MDM)
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
iamlamzzy
1 week, 4 days ago
Selected Answer: A
Correct answer is NAC. How i know it? I Managed a NAC tool for 3 plus years. They are used to verify the posture of an endpoint before allowing them full network access. If they don't meet the requirement the device is isolated to a limited network state.
upvoted 1 times
...
CCNPWILL
2 months, 3 weeks ago
Selected Answer: D
MDM. With MDM you can ensure the device is in a good posture before being allowed on the network. Answer is D.
upvoted 2 times
...
Hongjun
4 months ago
Selected Answer: D
I prefer D. Keywords- complain company approved policy. It does mentions what policies. NAC is just policy of access. But MDM includes policies for access, how data was encrypted, what software you can used, which website you can't browse etc. So I chose D.
upvoted 1 times
Hongjun
4 months ago
Typo. It does not mention what policies.
upvoted 1 times
...
...
YesPlease
7 months ago
Selected Answer: A
Answer A) Key phrase in question is "on network" NAC can stop devices at Network level (virtual or otherwise). MDM does apply to mobile devices like laptops, but cell phones are not usually connecting directly to a Network. Also, MDM stops mobile devices even before connecting to a network if they don't meet minimum policy requirements like phone OS version is older than the accepted version.
upvoted 1 times
Ramye
1 month, 2 weeks ago
Cell phones (mobile devices) can be restricted to connect/consume company resources if are not registered in MDM system. MDM actually is better solution as it can restrict devices if they’re not compliant with company policies.
upvoted 1 times
...
...
Soleandheel
7 months ago
A. Network Access Control (NAC)
upvoted 1 times
...
AMANSUNAR
7 months, 2 weeks ago
Selected Answer: D
Mobile Device Management (MDM) solutions are designed to manage and enforce policies on mobile devices, including remote users' endpoint devices. MDM allows organizations to ensure compliance with security policies, enforce configuration settings, and remotely manage devices, making it a powerful tool for securing remote endpoints.
upvoted 1 times
...
Bach1968
1 year ago
The MOST effective way to ensure the endpoint devices used by remote users are compliant with an organization's approved policies before being allowed on the network is by using A. Network Access Control (NAC) Network Access Control (NAC) solutions provide organizations with the ability to authenticate and validate the compliance of devices before granting them access to the network. NAC solutions typically perform checks on various aspects of the device, such as its operating system, antivirus software, patches, and configuration settings, to ensure they meet the organization's security policies. By implementing NAC, organizations can enforce policies and control access based on the compliance status of the endpoint devices. Devices that do not meet the required security standards can be prevented from accessing the network or placed in a restricted network segment until they are brought into compliance.
upvoted 4 times
...
waleogere
1 year ago
D. Mobile Device Management (MDM) is the right choice.
upvoted 2 times
...
DapengZhang
1 year, 3 months ago
Selected Answer: D
For sure it is D, the question is asking effective way to ensure the endpoint devices are compliant to company rules. NAC is only for remote user authentication; but for device that is used by users, shall be MDM. Quoted from OSG9: Administrators register employee devices with a mobile device management (MDM) system. Mobile device management (MDM) is a software solution to the challenging task of managing the myriad mobile devices that employees use to access company resources. The MDM system monitors and manages mobile devices and ensures that they are kept up-to-date. The goals of MDM are to improve security, provide monitoring, enable remote management, and support troubleshooting.
upvoted 4 times
jackdryan
1 year, 1 month ago
A is correct
upvoted 1 times
...
BoZT
10 months, 2 weeks ago
MDM is for mobile devices, what if the endpoint is a computer? and for a remote user, they definitely need to have a computer to work.
upvoted 2 times
marziparzi
3 months ago
This is why I think it is not MDM as well, and think it is NAC. It says "remote" not "remote mobile". However, if it said "remote mobile" that would make this really hard to choose for me.
upvoted 1 times
...
b4chali
7 months, 4 weeks ago
A laptop is a mobile device too
upvoted 2 times
...
...
...
Ivanchun
1 year, 6 months ago
Selected Answer: A
A, remote user need to meet the NAC requirement to connect
upvoted 2 times
...
DracoL
1 year, 8 months ago
Selected Answer: A
Network access control (NAC), also known as network admission control, is the process of restricting unauthorized users and devices from gaining access to a corporate or private network. NAC ensures that only users who are authenticated and devices that are authorized and compliant with security policies can enter the network.
upvoted 2 times
...
DracoL
1 year, 8 months ago
Network access control (NAC), also known as network admission control, is the process of restricting unauthorized users and devices from gaining access to a corporate or private network. NAC ensures that only users who are authenticated and devices that are authorized and compliant with security policies can enter the network.
upvoted 1 times
...
franbarpro
1 year, 8 months ago
Selected Answer: A
Before allowing you to connect - who the heck are you? = NAC
upvoted 3 times
examprep900
1 year, 5 months ago
They way you put it 👍
upvoted 1 times
...
Yokota
1 year ago
it's not about "who are you" the question is about being compliant.
upvoted 1 times
...
...
dev46
1 year, 9 months ago
A is correct
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
ex Want to SAVE BIG on Certification Exam Prep?
close
ex Unlock All Exams with ExamTopics Pro 75% Off
  • arrow Choose From 1000+ Exams
  • arrow Access to 10 Exams per Month
  • arrow PDF Format Available
  • arrow Inline Discussions
  • arrow No Captcha/Robot Checks
Limited Time Offer
Ends in