COMPUTER NETWORKING

NETWORK SECURITY

INTRODUCTION

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
A security administrator is tasked with ensuring that all devices have updated virus definition files before they are allowed to access network resources. Which of the following technologies would be used to accomplish this goal?
A
NIDS
B
NAC
C
DLP
D
Port Security
Explanation: 

Detailed explanation-1: -Intrusion Prevention Systems (IPS) IPS technologies can detect or prevent network security attacks such as brute force attacks, Denial of Service (DoS) attacks and exploits of known vulnerabilities.

Detailed explanation-2: -A firewall is a combination of hardware and software that controls the flow of incoming and outgoing network traffic and prevents unauthorized communication into and out of the network. The firewall identifies names, Internet Protocol (IP) addresses, applications, and other characteristics of incoming traffic.

Detailed explanation-3: -Proxy firewalls assess the context and content of data packets against a set of predefined criteria using stateful and deep packet inspection. They either allow or reject a packet based on the results.

Detailed explanation-4: -Which of the following best describes the proper method and reason to implement port security? Apply a security control that ties specific ports to end-device MAC addresses, and prevents additional devices from being connected to the network.

There is 1 question to complete.