ExamGecko
Question list
Search
Search

Related questions

Question 1034 - CISA discussion

Report
Export

Which of the following would be MOST effective in detecting the presence of an unauthorized wireless access point on an internal network?

A.
Continuous network monitoring
Answers
A.
Continuous network monitoring
B.
Periodic network vulnerability assessments
Answers
B.
Periodic network vulnerability assessments
C.
Review of electronic access logs
Answers
C.
Review of electronic access logs
D.
Physical security reviews
Answers
D.
Physical security reviews
Suggested answer: A

Explanation:

The most effective method for detecting the presence of an unauthorized wireless access point on an internal network is A. Continuous network monitoring. This is because continuous network monitoring can capture and analyze all the wireless traffic in the network and identify any rogue or spoofed devices that may be connected to the network without authorization. Continuous network monitoring can also alert the system administrator of any suspicious or anomalous activities on the network and help to locate and remove the unauthorized wireless access point quickly.

Periodic network vulnerability assessments (B) can also help to detect unauthorized wireless access points, but they are not as effective as continuous network monitoring, because they are performed at fixed intervals and may miss some devices that are added or removed between the assessments. Review of electronic access logs can provide some information about the devices that access the network, but they may not be able to detect devices that use fake or stolen credentials or devices that do not generate any logs. Physical security reviews (D) can help to prevent unauthorized physical access to the network ports or devices, but they may not be able to detect wireless access points that are hidden or disguised as legitimate devices.

asked 18/09/2024
Tym Dom
41 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first