A core router was manipulated by a credentialed bypass to send all network traffic through a secondary router under the control of an unauthorized user connected to the network by WiFi. Which of the following would BEST reduce the risk of this attack type occurring?
A) Implement a strong, complex password policy for user accounts that have access to the core router.
B) Deploy 802.1X as the NAC system for the WiFi infrastructure.
C) Add additional port security settings for the switching environment connected to the core router.
D) Allow access to the core router management interface only through an out-of-band channel.
Correct Answer:
Verified
Q237: A Chief Information Security Officer (CISO) is
Q238: A company is migrating systems from an
Q239: A security engineer is assessing a new
Q240: A university's help desk is receiving reports
Q241: A security administrator wants to implement controls
Q243: A company recently implemented a variety of
Q244: While conducting online research about a company
Q245: A software development company lost customers recently
Q246: An enterprise is trying to secure a
Q247: A school contracts with a vendor to
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents