PdfPrep.com

Which of the following would BEST reduce the risk of this attack type occurring?

A core router was manipulated by a credentialed bypass to send all network traffic through a secondary router under the control of an unauthorized user connected to the network by WiFi.

Which of the following would BEST reduce the risk of this attack type occurring?
A . Implement a strong, complex password policy for user accounts that have access to the core router.
B . Deploy 802.1X as the NAC system for the WiFi infrastructure.
C . Add additional port security settings for the switching environment connected to the core router.
D . Allow access to the core router management interface only through an out-of-band channel.

Answer: D

Exit mobile version