1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dafna1 [17]
3 years ago
7

What technology will examine the current state of a network device before allowing it can to connect to the network and force an

y device that does not meet a specified set of criteria to connect only to a quarantine network?
Computers and Technology
1 answer:
miv72 [106K]3 years ago
8 0
Network Access Control (NAC) examines the current state of network device before it is allowed to connect to the network. Any device that does not meet a specified set of criteria is only allowed to connect to a “quarantine” network after the security deficiencies are corrected. NAC Prevents computers with sub-optimal security from potentially infecting other computers through the network. This technology uses, protocols such as Dynamic Host Configuration Protocol (DHCP) server and Address Resolution Protocol (ARP).
You might be interested in
What are 25 items that trees made?
alexandr1967 [171]

Answer:

(things,can't think of more

.......)

  • paper
  • charcoal
  • doors
  • chairs
  • jewelry
  • wood frames
  • broom handles
  • furniture made with wood
6 0
3 years ago
Read 2 more answers
Which feature of presentation software is located under the Insert tab?
blondinia [14]

Answer:

Shapes

Explanation:

7 0
3 years ago
Read 2 more answers
You are the CISO of a company and you need to create logging policies. Please review NIST SP800-92, specifically sections 4–3 th
Kitty [74]

<u>The various systems on a network and develop a logging policy based on the information in the aforementioned sections:</u>

Cisco is router, which is physical device appliance where placed in LAN OR WAN for connecting workstation or desktop or laptop of other offices in organization.

It is a security device and purpose to make organization to access or connected to end use of other networks.

Basically there routers are used ISDN LINE, LEASE LINE or VPN for connecting varies WAN

Purpose of keeping the logging polices to do further analysis how the network packets or traffic is executed and passed different tcpip address. If case any hackers or packet loss the network administrator will do further analysis and protect the system form packet loss or from hackers.  Keeping network logs is policy driven. So network administrator keeps logs for no. of days.

Some network administration export log and keep as reference.

4 0
4 years ago
oftware that is free and whose code can be accessed and potentially modified by anyone is referred to as _____. shared source fi
ad-work [718]

Answer:

open source software

Explanation:

A software that is free and whose code can be accessed and potentially modified by anyone is referred to as an open source software. The license used by the developer of an open source software grants all users the permission to use, distribute and modify the software at any time.

Some examples of an open source software are Firefox, gimp, OpenOffice etc.

8 0
3 years ago
Which sounds better, a cassette or vinyl???
katen-ka-za [31]
A vinyl . I hope I helped !
5 0
3 years ago
Other questions:
  • If you are installing separate anti-virus and anti-spyware programs, which should you install first
    7·1 answer
  • Which of the following statements are true of network packets? Check all of the boxes that apply. They contain control informati
    10·1 answer
  • Word processing software allows users to do which of the following:
    10·1 answer
  • Should you configure if you want to limit access to files with certain classifications within a folder to a specific security gr
    13·1 answer
  • Jane, a marketing manager for the Grocery SuperStore retail chain, fired up a computer program that gave her ready access to inf
    6·1 answer
  • g You are looking to rob a jewelry store. You have been staking it out for a couple of weeks now and have learned the weights an
    10·1 answer
  • Larry has created a web page using HTML 4.01. He hasn’t included the declaration in the file. When he opens the page in a browse
    8·1 answer
  • Which of the following options is not located in the page setup dialog box?
    14·1 answer
  • What do you understand by the term input, output, processing and storage.​
    12·2 answers
  • I am having trouble with this python question. I am in a beginner level class also so any solution that isn't too complex would
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!