Free CompTIA Network+ N10-009 Practice Question

As part of a shift to a Zero Trust security model, a network administrator must configure the system to ascertain full adherence to corporate security policies prior to granting network access. The policies specifically require verification that all devices meet security compliance standards. Which system would be most suited to enforce these stringent access conditions?

  • Utilize a stateful firewall to monitor and restrict traffic from non-compliant devices.

  • Enhance endpoint security with Advanced Threat Protection (ATP) software on all devices.

  • Deploy a Network Access Control (NAC) system to enforce security compliance checks prior to network access.

  • Integrate an Intrusion Detection System (IDS) to pre-screen device compliance.

This question's topic:
CompTIA Network+ N10-009 / 
Networking Concepts
Your Score:

Check or uncheck an objective to set which questions you will receive.