Which of the follow...
 
Notifications
Clear all

Which of the following should the administrator implement to find and remediate the Issue?

1 Posts
1 Users
0 Likes
196 Views
(@schultzachariah)
Noble Member
Joined: 2 years ago
Posts: 745
Topic starter  

During a routine scan of a wireless segment at a retail company, a security administrator discovers several devices are connected to the network that do not match the company's naming convention and are not in the asset Inventory. WiFi access Is protected with 255-Wt encryption via WPA2. Physical access to the company's facility requires two-factor authentication using a badge and a passcode.

Which of the following should the administrator implement to find and remediate the Issue? (Select TWO).

  • A . Check the SIEM for failed logins to the LDAP directory.
  • B . Enable MAC filtering on the switches that support the wireless network.
  • C . Run a vulnerability scan on all the devices in the wireless network
  • D . Deploy multifactor authentication for access to the wireless network
  • E . Scan the wireless network for rogue access points.
  • F . Deploy a honeypot on the network

Show Answer Hide Answer

Suggested Answer: B,E

Explanation:

security is pretty good already up to a point, clearly Rogue AP bypass is in the picture MAC filtering on the switch the AP's hang from will ensure the only AP's allowed to touch the core network are approved known AP's and ze "bad guys" will find themselves trapped on an AP island with nowhere to go!

   
Quote

Latest CompTIA SY0-601 Dumps Valid Version

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Share: