Which of the following would BEST reduce the risk of this attack type occurring?

A core router was manipulated by a credentialed bypass to send all network traffic through a secondary router under the control of an unauthorized user connected to the network by WiFi.

Which of the following would BEST reduce the risk of this attack type occurring?
A . Implement a strong, complex password policy for user accounts that have access to the core router.
B . Deploy 802.1X as the NAC system for the WiFi infrastructure.
C . Add additional port security settings for the switching environment connected to the core router.
D . Allow access to the core router management interface only through an out-of-band channel.

Answer: A

Latest CAS-003 Dumps Valid Version with 509 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments