answersLogoWhite

0


Best Answer
NAC is a centralised method for controlling network security.

It is based on the following procedures.
  1. Detect - Detection and identification of new devices connecting to the network
  2. Authenticate - Authentication of users and/or devices
  3. Assess - Assessment of end systems regarding their compliance and/or vulnerabilities
  4. Authorise - Authorisation to use the network based on the results of the authentication and the assessment
  5. Monitor - Monitoring users and devices once they are connected to the network
  6. Contain - Quarantine problem end systems and/or users to prevent them from negatively impacting the overall network environment
  7. Re-mediate - Re-mediation of problems with the end system and/or user
User Avatar

Wiki User

11y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What is access control method used on networks?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

Mechanisms used on Ethernet networks to control access to transmission medium?

Csma/cd


Logical access control method can be used to limit access to specific resources in a domain environment?

Access control list (ACL)


What is traverse serveying?

Traverse surveying is a method used in land surveying to establish control points and boundaries by measuring a series of connected survey lines. It involves measuring both angles and distances between points to accurately map out the boundaries of a piece of land. Traverse surveys are commonly used in construction and engineering projects to create detailed site plans.


What is the use of a control network?

A control network is used to control other networks. The networks have their own structure but are controlled remotely by another network connected by a gateway.


What is the use of a network?

A control network is used to control other networks. The networks have their own structure but are controlled remotely by another network connected by a gateway.


What was used for error detection in ATM networks?

CRC is used for this purpose. The control field is HEC (header error control).


A popular OS used to control networks and to support applications used on the internet?

pownage?


What are the popular os used to control networks and support applications used on the internet?

Unix


Remote access connection manager?

Remote Access Connection Manager is a Windows service used to control access to the Internet and other remote networks. Remote Access Connection Manager can be started or stopped using the services.msc tool.


What type of access method is used by ALOHA-net?

WiFi


Which access method is used in Token Ring?

Token Passing


What were the method of control used by the revolutionary elite to control disobedient and rebellious colonist?

One method of control used by the elite on rebellious colonists was to charge people with anger towards the British.