Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam CISSP All Questions

View all questions & answers for the CISSP exam

Exam CISSP topic 1 question 84 discussion

Actual exam question from ISC's CISSP
Question #: 84
Topic #: 1
[All CISSP Questions]

Which of the following is the MOST effective way to ensure the endpoint devices used by remote users are compliant with an organization's approved policies before being allowed on the network?

  • A. Network Access Control (NAC)
  • B. Privileged Access Management (PAM)
  • C. Group Policy Object (GPO)
  • D. Mobile Device Management (MDM)
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
Chris
4 months, 2 weeks ago
Selected Answer: A
A. Network Access Control (NAC) Here’s why NAC is the best choice: Network Access Control (NAC): NAC solutions provide a comprehensive approach to managing and enforcing security policies for devices attempting to access network resources. They can perform health checks on devices to ensure compliance with security policies (e.g., antivirus presence, up-to-date patches) before granting network access. This makes NAC highly effective for verifying compliance of endpoint devices used by remote users. NAC provides a holistic approach by integrating various checks and balances to ensure all endpoint devices meet the required security policies before accessing the network, making it the most effective solution for this purpose.
upvoted 1 times
...
iamlamzzy
5 months ago
Selected Answer: A
Correct answer is NAC. How i know it? I Managed a NAC tool for 3 plus years. They are used to verify the posture of an endpoint before allowing them full network access. If they don't meet the requirement the device is isolated to a limited network state.
upvoted 1 times
...
CCNPWILL
7 months, 1 week ago
Selected Answer: D
MDM. With MDM you can ensure the device is in a good posture before being allowed on the network. Answer is D.
upvoted 2 times
...
Hongjun
8 months, 3 weeks ago
Selected Answer: D
I prefer D. Keywords- complain company approved policy. It does mentions what policies. NAC is just policy of access. But MDM includes policies for access, how data was encrypted, what software you can used, which website you can't browse etc. So I chose D.
upvoted 1 times
Hongjun
8 months, 3 weeks ago
Typo. It does not mention what policies.
upvoted 1 times
...
...
YesPlease
11 months, 2 weeks ago
Selected Answer: A
Answer A) Key phrase in question is "on network" NAC can stop devices at Network level (virtual or otherwise). MDM does apply to mobile devices like laptops, but cell phones are not usually connecting directly to a Network. Also, MDM stops mobile devices even before connecting to a network if they don't meet minimum policy requirements like phone OS version is older than the accepted version.
upvoted 1 times
Ramye
6 months, 1 week ago
Cell phones (mobile devices) can be restricted to connect/consume company resources if are not registered in MDM system. MDM actually is better solution as it can restrict devices if they’re not compliant with company policies.
upvoted 1 times
...
...
Soleandheel
11 months, 3 weeks ago
A. Network Access Control (NAC)
upvoted 1 times
...
AMANSUNAR
1 year ago
Selected Answer: D
Mobile Device Management (MDM) solutions are designed to manage and enforce policies on mobile devices, including remote users' endpoint devices. MDM allows organizations to ensure compliance with security policies, enforce configuration settings, and remotely manage devices, making it a powerful tool for securing remote endpoints.
upvoted 1 times
...
Bach1968
1 year, 4 months ago
The MOST effective way to ensure the endpoint devices used by remote users are compliant with an organization's approved policies before being allowed on the network is by using A. Network Access Control (NAC) Network Access Control (NAC) solutions provide organizations with the ability to authenticate and validate the compliance of devices before granting them access to the network. NAC solutions typically perform checks on various aspects of the device, such as its operating system, antivirus software, patches, and configuration settings, to ensure they meet the organization's security policies. By implementing NAC, organizations can enforce policies and control access based on the compliance status of the endpoint devices. Devices that do not meet the required security standards can be prevented from accessing the network or placed in a restricted network segment until they are brought into compliance.
upvoted 4 times
...
waleogere
1 year, 5 months ago
D. Mobile Device Management (MDM) is the right choice.
upvoted 2 times
...
DapengZhang
1 year, 8 months ago
Selected Answer: D
For sure it is D, the question is asking effective way to ensure the endpoint devices are compliant to company rules. NAC is only for remote user authentication; but for device that is used by users, shall be MDM. Quoted from OSG9: Administrators register employee devices with a mobile device management (MDM) system. Mobile device management (MDM) is a software solution to the challenging task of managing the myriad mobile devices that employees use to access company resources. The MDM system monitors and manages mobile devices and ensures that they are kept up-to-date. The goals of MDM are to improve security, provide monitoring, enable remote management, and support troubleshooting.
upvoted 4 times
jackdryan
1 year, 6 months ago
A is correct
upvoted 1 times
...
BoZT
1 year, 3 months ago
MDM is for mobile devices, what if the endpoint is a computer? and for a remote user, they definitely need to have a computer to work.
upvoted 2 times
marziparzi
7 months, 3 weeks ago
This is why I think it is not MDM as well, and think it is NAC. It says "remote" not "remote mobile". However, if it said "remote mobile" that would make this really hard to choose for me.
upvoted 1 times
...
b4chali
1 year ago
A laptop is a mobile device too
upvoted 2 times
...
...
...
Ivanchun
1 year, 11 months ago
Selected Answer: A
A, remote user need to meet the NAC requirement to connect
upvoted 2 times
...
DracoL
2 years, 1 month ago
Selected Answer: A
Network access control (NAC), also known as network admission control, is the process of restricting unauthorized users and devices from gaining access to a corporate or private network. NAC ensures that only users who are authenticated and devices that are authorized and compliant with security policies can enter the network.
upvoted 2 times
...
DracoL
2 years, 1 month ago
Network access control (NAC), also known as network admission control, is the process of restricting unauthorized users and devices from gaining access to a corporate or private network. NAC ensures that only users who are authenticated and devices that are authorized and compliant with security policies can enter the network.
upvoted 1 times
...
franbarpro
2 years, 1 month ago
Selected Answer: A
Before allowing you to connect - who the heck are you? = NAC
upvoted 3 times
examprep900
1 year, 10 months ago
They way you put it 👍
upvoted 1 times
...
Yokota
1 year, 5 months ago
it's not about "who are you" the question is about being compliant.
upvoted 1 times
...
...
dev46
2 years, 2 months ago
A is correct
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...