Which of the following are the uses of Network Access Protection (NAP)?

Which of the following are the uses of Network Access Protection (NAP)?
Each correct answer represents a complete solution. Choose all that apply.

Which of the following are the uses of Network Access Protection (NAP)?
Each correct answer represents a complete solution. Choose all that apply.

A.
It is used to protect against virus.

B.
It is used to verify the complete integrity of each device.

C.
It permits a user to access all computers and systems where he got a access permission,
without entering passwords for multiple times

D.
It is used to authenticate a request for a service in a computer network.

Explanation:
Network Access Protection (NAP) is a set of operating system components included with the
Windows Server 2008 and Windows Vista/7 operating systems. It ensures that the client computers
on a private network meet administrator-defined requirements for system health. NAP policies
define the required configuration and update status for a client computer’s operating system and
critical software. For example, an administrator can set policies that computers might be required to
have antivirus software with the latest virus definition installed and current operating system
updates. Using NAP, a network administrator can enforce compliance with health requirements for
the client computers connection to the network. NAP helps network administrators to reduce the
risk caused by improperly configured client computers that might be exposed to viruses and other
malicious software. It is used to verify the complete integrity of the device by testing that it has the
most current software updates or configuration modifications because the systems that are not able
to receive the updates can be as problematic as they seem to be infected by malware.

Answer C is incorrect. Single sign-on (SSO) is defined as a mechanism in which a single action of user
authentication and authorization is used to allow a user to access all computers and systems where
he got a access permission, without entering passwords for multiple times.

Answer D is incorrect. Kerberos is defined as a secure method used for authenticating a request for
a service in a computer network.



Leave a Reply 0

Your email address will not be published. Required fields are marked *