Rogue Devices and Network Security Quiz

VisionarySugilite avatar
VisionarySugilite
·
·
Download

Start Quiz

Study Flashcards

Questions and Answers

What does FortiNAC display a rogue device as on the GUI?

A laptop image with a question mark on the screen

How are rogue devices often referred to?

Unknown or untrusted endpoints

What is the default logical network used to isolate rogue hosts at the point of connection when enforcement is enabled?

Registration

What is a foundation of visibility created from the information that FortiNAC gathers from endpoints?

<p>Endpoint Classification</p> Signup and view all the answers

What tool is used to classify connected devices by using administratively created rules?

<p>Device Profiling Tool</p> Signup and view all the answers

What elements are included in the collection of endpoints?

<p>IP-addresses, physical addresses, vendor names, statuses</p> Signup and view all the answers

What is the method used by the device profiling tool to identify the type of device?

<p>OUI, IP-address range, and network traffic</p> Signup and view all the answers

What is enforced by the Forced Registration port group?

<p>Host state</p> Signup and view all the answers

What does a rogue device represent in FortiNAC?

<p>An unknown physical address on the network</p> Signup and view all the answers

What is the method used to isolate rogue hosts at the point of connection?

<p>Enforcement through the Registration logical network</p> Signup and view all the answers

What is the purpose of the device profiling tool?

<p>To identify the type of connected devices</p> Signup and view all the answers

What is the role of the logical network called Registration?

<p>Isolating rogue hosts at the point of connection</p> Signup and view all the answers

What is used to identify devices as they connect to the network?

<p>Vendor OUI, IP address, and port</p> Signup and view all the answers

How does FortiNAC determine if a device is a match for the selected device type?

<p>By evaluating the gathered information and comparing it to a pre-set list in the database</p> Signup and view all the answers

What are endpoints classified as after they have been evaluated and considered trusted?

<p>Registered hosts</p> Signup and view all the answers

What is the purpose of device profiling rules?

<p>To evaluate and classify rogue devices</p> Signup and view all the answers

How does FortiNAC apply the rule-defined classification settings?

<p>If all selected methods result in a pass result</p> Signup and view all the answers

What method does the 'Valve Control System' rule use for evaluation?

<p>TCP</p> Signup and view all the answers

Which components are used to evaluate and classify unknown, untrusted devices?

<p>Profiling rules comprising classification settings and methods</p> Signup and view all the answers

What is the purpose of evaluating a device against each rule until a fail, pass, or cannot evaluate result is reached?

<p>To determine the device's classification status</p> Signup and view all the answers

What is the purpose of entering user-defined values in device profiling?

<p>To allow for detailed device-specific customizations</p> Signup and view all the answers

What does the 'Epson Robotics' rule use for evaluation?

<p>Vendor OUI, IP Range and Network Traffic</p> Signup and view all the answers

What is the primary method used by the 'HVAC' rule for evaluation?

<p>TCP</p> Signup and view all the answers

What is the first step in classifying an industrial device according to the text?

<p>Verifying the device OUI</p> Signup and view all the answers

More Quizzes Like This

Use Quizgecko on...
Browser
Browser