Posted by: Pdfprep
Post Date: November 12, 2020
A core router was manipulated by a credentialed bypass to send all network traffic through a secondary router under the control of an unauthorized user connected to the network by WiFi.
Which of the following would BEST reduce the risk of this attack type occurring?
A . Implement a strong, complex password policy for user accounts that have access to the core router.
B . Deploy 802.1X as the NAC system for the WiFi infrastructure.
C . Add additional port security settings for the switching environment connected to the core router.
D . Allow access to the core router management interface only through an out-of-band channel.
Answer: D
Leave a Reply