Q. What action do you typically need to do to join a public network, such as one in a coffee shop?
Select one:
- Provide biometric information
- Agree to the legal terms for using the network
- Register your handheld device
- Submit your personal digital certificate
Q. How does NAC effectively segment a network?
Select one:
- Using IP addresses
- Routers
- Using user roles
- Utilizing device profiles
Q. Which security challenge do BYODs pose to networks?
Select one:
- Increase the maintenance cycle for network devices
- MIS does not control what is installed on these devices
- Limited RAM prevents the installation of security software
- Data exfiltration
Q. Why are IoT devices potential conduits of contagion?
Select one:
- Does not support two-factor authentication
- IoT devices are often cheaply made
- There are too many incompatible IoT security standards in use
- Not able to install security software
Q. Which three parties participate in network authentication, according to the IEEE 802.1X standards? (Choose three.)
Select one or more:
- Authenticator
- Authentication server
- Certification authority
- Router
- Client device
Q. What drives organizations to buy IoT devices?
Select one:
- Mandated by government
- Can save time and money
- Required as part of an air-gap solution
- Provide valuable data to the CFO
'Certification > [FCF] Fortinet Certified Fundamentals' 카테고리의 다른 글
[FCF] Cybersecurity 2.0 - Lesson 03 : Sandbox (Quesion&Answer) (0) | 2024.05.19 |
---|---|
[FCF] Cybersecurity 2.0 - Lesson 03 : Sandbox(샌드박스) (0) | 2024.05.19 |
[FCF] Cybersecurity 2.0 - Lesson 02 : Network Access Control(네트워크 접근 제어) (0) | 2024.05.19 |
[FCF] Cybersecurity 2.0 - Lession 01 : Firewalls (Quesion&Answer) (0) | 2024.05.19 |
[FCF] Cybersecurity 2.0 - Lession 01 : Firewalls (방화벽) (0) | 2024.05.19 |