Final answer:
Access control, specifically authentication, is used by network administrators to verify devices on a network. Methods for this include using MAC addresses, digital certificates, or login credentials, often within a network access control (NAC) framework.
Step-by-step explanation:
The type of access control needed to develop a plan to verify a device on a network is known as authentication. When a network administrator needs to verify a device, they are essentially ensuring that the device is indeed what it claims to be and is authorized to access the network. This process falls under the umbrella of Access Control, which is a key part of network security.
Access control can be implemented in various ways, such as through the use of MAC (Media Access Control) addresses, digital certificates, or username and password combinations. An effective method for device verification could be to use a combination of network access control (NAC) solutions, which typically involve authentication protocols such as 802.1X, and then assigning appropriate access levels or policies once a device is authenticated.