In a network access control (NAC) system, what are the two different types of software agents that are commonly used?
What will be an ideal response?
ANSWER: Two types of agents that are commonly used are:
* A nonpersistent agent, or dissolvable agent, remains on the device long enough to verify compliance and complete authentication, and then uninstalls. Devices might be required to periodically reinstall the agent to complete the authentication process again.
* A persistent agent is permanently installed on a device. This more robust program might provide additional security measures, such as remote wipe, virus scans, and mass messaging.
You might also like to view...
Case-Based Critical Thinking QuestionsCase 1Prishna has decided that data entry for the database for her small business would be expedited if she designed a form for her two employees who maintain her records. She studies the tools available to her on the Design tab, to maximize the work that these resources can accomplish for her. Sometimes, Prishna’s team has PDFs of invoices or estimates that they store along with a customer’s record. Which of the following Design tab tools would allow the form that Prishna designs to display to users files stored in an underlying field?
A. Attachment B. Combo Box C. Bound Object Frame D. Text Box
Develop an implementation plan that would be useful to the Training group in changing to a computerized project tracking system. Use a paragraph to explain your approach. Be sure that what you are doing also meets Snowden’s expectations.
The implementation plan would include the following: A. Latest versions of Web software to be installed on the Shiroma computers in the Training Unit. The Training Unit would be able to keep their Shiroma computers and this would help to promote the “peaceful co-existence” between the groups that is important to Snowden. If the data is to reside on the mainframe, provide server-side methods to exchange data with the mainframe. B. The Comtex computers in the Training Unit would be connected to the existing Systems Management department network as well as the Web servers companywide. C. A support person would be assigned to answer questions and resolve problems about the Comtex computers for the Training Unit. D. The Training Unit needs to be trained in several areas: i. How to use the Web software, including the forms, various options available, and so on. ii. A “How to use the Global Engineering Management System (G E M S)” training manual that would be developed for all projects. iii. How to use the intranet services. One approach to developing the training is to have the Training Unit help plan their instruction. This would help to smooth the transition. Another consideration is the personality of the trainer. Because the makeup of the Training Unit consists of people who are fairly artistic, training should be more relaxed, sprinkled with humor, and perhaps more unconventional.
CSS represents the characteristics of every web page element using the ____ model, which treats each element as a rectangular box having several global properties.
A. box B. rectangle C. Element D. CSS
____________________ is the process of making remotely connected computers truly act as though they are on the same LAN as local computers.
Fill in the blank(s) with the appropriate word(s).