CompTIA Exam Questions

Which of the following techniques would be BEST suited …

Ann, a network security engineer, is trying to harden her wireless network. Currently, users are able to connect any device to the wireless network as long as they

authenticate with their network username and password. She is concerned that devices that are not company-issued may gain unauthorized access. Which of the
following techniques would be BEST suited to remediate this vulnerability? (Select TWO).

A.
Utilize a single service account, only known by IT, to authenticate all devices

B.
Install separate access points for personal devices

C.
Install an IPS to protect the network from rogue devices

D.
Filter the MAC addresses of all unknown devices on the wireless controller

E.
server to authenticate via computer end user