Get Unlimited Contributor Access to the all ExamTopics Exams!
Take advantage of PDF Files for 1000+ Exams along with community discussions and pass IT Certification Exams Easily.
Which of the following is the MOST effective way to ensure the endpoint devices used by remote users are compliant with an organization's approved policies before being allowed on the network?
Correct answer is NAC. How i know it? I Managed a NAC tool for 3 plus years. They are used to verify the posture of an endpoint before allowing them full network access. If they don't meet the requirement the device is isolated to a limited network state.
I prefer D. Keywords- complain company approved policy. It does mentions what policies. NAC is just policy of access. But MDM includes policies for access, how data was encrypted, what software you can used, which website you can't browse etc. So I chose D.
Answer A) Key phrase in question is "on network"
NAC can stop devices at Network level (virtual or otherwise).
MDM does apply to mobile devices like laptops, but cell phones are not usually connecting directly to a Network. Also, MDM stops mobile devices even before connecting to a network if they don't meet minimum policy requirements like phone OS version is older than the accepted version.
Cell phones (mobile devices) can be restricted to connect/consume company resources if are not registered in MDM system.
MDM actually is better solution as it can restrict devices if they’re not compliant with company policies.
Mobile Device Management (MDM) solutions are designed to manage and enforce policies on mobile devices, including remote users' endpoint devices. MDM allows organizations to ensure compliance with security policies, enforce configuration settings, and remotely manage devices, making it a powerful tool for securing remote endpoints.
The MOST effective way to ensure the endpoint devices used by remote users are compliant with an organization's approved policies before being allowed on the network is by using
A. Network Access Control (NAC)
Network Access Control (NAC) solutions provide organizations with the ability to authenticate and validate the compliance of devices before granting them access to the network. NAC solutions typically perform checks on various aspects of the device, such as its operating system, antivirus software, patches, and configuration settings, to ensure they meet the organization's security policies.
By implementing NAC, organizations can enforce policies and control access based on the compliance status of the endpoint devices. Devices that do not meet the required security standards can be prevented from accessing the network or placed in a restricted network segment until they are brought into compliance.
For sure it is D, the question is asking effective way to ensure the endpoint devices are compliant to company rules. NAC is only for remote user authentication; but for device that is used by users, shall be MDM.
Quoted from OSG9: Administrators register employee devices with a mobile device management (MDM)
system. Mobile device management (MDM) is a software solution to the challenging task
of managing the myriad mobile devices that employees use to access company resources.
The MDM system monitors and manages mobile devices and ensures that they are kept
up-to-date. The goals of MDM are to improve security, provide monitoring, enable remote
management, and support troubleshooting.
This is why I think it is not MDM as well, and think it is NAC. It says "remote" not "remote mobile".
However, if it said "remote mobile" that would make this really hard to choose for me.
Network access control (NAC), also known as network admission control, is the process of restricting unauthorized users and devices from gaining access to a corporate or private network. NAC ensures that only users who are authenticated and devices that are authorized and compliant with security policies can enter the network.
Network access control (NAC), also known as network admission control, is the process of restricting unauthorized users and devices from gaining access to a corporate or private network. NAC ensures that only users who are authenticated and devices that are authorized and compliant with security policies can enter the network.
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
iamlamzzy
1 week, 4 days agoCCNPWILL
2 months, 3 weeks agoHongjun
4 months agoHongjun
4 months agoYesPlease
7 months agoRamye
1 month, 2 weeks agoSoleandheel
7 months agoAMANSUNAR
7 months, 2 weeks agoBach1968
1 year agowaleogere
1 year agoDapengZhang
1 year, 3 months agojackdryan
1 year, 1 month agoBoZT
10 months, 2 weeks agomarziparzi
3 months agob4chali
7 months, 4 weeks agoIvanchun
1 year, 6 months agoDracoL
1 year, 8 months agoDracoL
1 year, 8 months agofranbarpro
1 year, 8 months agoexamprep900
1 year, 5 months agoYokota
1 year agodev46
1 year, 9 months ago