PrepAway - Latest Free Exam Questions & Answers

Which of the following techniques would be BEST suited …

Ann, a network security engineer, is trying to harden her wireless network. Currently, users are able to connect any device to the wireless network as long as they

authenticate with their network username and password. She is concerned that devices that are not company-issued may gain unauthorized access. Which of the
following techniques would be BEST suited to remediate this vulnerability? (Select TWO).

PrepAway - Latest Free Exam Questions & Answers

A.
Utilize a single service account, only known by IT, to authenticate all devices

B.
Install separate access points for personal devices

C.
Install an IPS to protect the network from rogue devices

D.
Filter the MAC addresses of all unknown devices on the wireless controller

E.
server to authenticate via computer end user

One Comment on “Which of the following techniques would be BEST suited …

  1. ikam says:

    I am completely confused by the wording “server to authenticate via computer end user”. Does it mean using a server to authenticate the computer end user? It yes, doing so still will not prevent rogue devices to connect to the wireless network – the user will still be able to connect using rogue devices as long as they can authenticate using username/password. Also, should answer C be valid as well – shouldn’t an IPS be able to prevent connections from rogue devices?




    0



    0

Leave a Reply