CompTIA Network+ N10-009 Practice Question
As part of a shift to a Zero Trust security model, a network administrator must configure the system to ascertain full adherence to corporate security policies prior to granting network access. The policies specifically require verification that all devices meet security compliance standards. Which system would be most suited to enforce these stringent access conditions?
Utilize a stateful firewall to monitor and restrict traffic from non-compliant devices.
Enhance endpoint security with Advanced Threat Protection (ATP) software on all devices.
Integrate an Intrusion Detection System (IDS) to pre-screen device compliance.
Deploy a Network Access Control (NAC) system to enforce security compliance checks prior to network access.