Which of the following would BEST reduce the risk of this attack type occurring?

Posted by: Pdfprep Category: CAS-003 Tags: , ,

A core router was manipulated by a credentialed bypass to send all network traffic through a secondary router under the control of an unauthorized user connected to the network by WiFi.

Which of the following would BEST reduce the risk of this attack type occurring?
A . Implement a strong, complex password policy for user accounts that have access to the core router.
B . Deploy 802.1X as the NAC system for the WiFi infrastructure.
C . Add additional port security settings for the switching environment connected to the core router.
D . Allow access to the core router management interface only through an out-of-band channel.

Answer: D

Leave a Reply

Your email address will not be published.