Multiple Choice
A core router was manipulated by a credentialed bypass to send all network traffic through a secondary router under the control of an unauthorized user connected to the network by WiFi. Which of the following would BEST reduce the risk of this attack type occurring?
A) Implement a strong, complex password policy for user accounts that have access to the core router.
B) Deploy 802.1X as the NAC system for the WiFi infrastructure.
C) Add additional port security settings for the switching environment connected to the core router.
D) Allow access to the core router management interface only through an out-of-band channel.
Correct Answer:

Verified
Correct Answer:
Verified
Q12: During a security event investigation, a junior
Q13: A security analyst works for a defense
Q14: Due to a recent breach, the Chief
Q15: A company is acquiring incident response and
Q16: A security analyst has been asked to
Q18: A newly hired systems administrator is trying
Q19: A security assessor is working with an
Q20: A software development manager is running a
Q21: An external red team is brought into
Q22: A security engineer is working to secure