Mark works as a Network Administrator for TechMart Inc. The company has a Windows-based
network. Mark wants to implement a method to ensure that the mobile devices are in a good state
of security health when they are trying to access the corporate network. Which of the following is a
control or strategy that Mark will implement to assure the security health?
A.
TCP/IP protocol
B.
Kerberos
C.
Single Sign On
D.
Network Access Protection
Explanation:
Network Access Protection (NAP) is a set of operating system components included with the
Windows Server 2008 and Windows Vista/7 operating systems. It ensures that the client computers
on a private network meet administrator-defined requirements for system health. NAP policies
define the required configuration and update status for a client computer’s operating system and
critical software. For example, an administrator can set policies that computers might be required to
have antivirus software with the latest virus definition installed and current operating system
updates. Using NAP, a network administrator can enforce compliance with health requirements for
the client computers connection to the network. NAP helps network administrators to reduce the
risk caused by improperly configured client computers that might be exposed to viruses and other
malicious software.
authentication and authorization is used to allow a user to access all computers and systems where
he got a access permission, without entering passwords for multiple times.
a service in a computer network.
for communicating with each other over the internet.
d