ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 254 - SY0-701 discussion

Report
Export

A business uses Wi-Fi with content filleting enabled. An employee noticed a coworker accessed a blocked sue from a work computer and repotted the issue. While Investigating the issue, a security administrator found another device providing internet access to certain employees. Which of the following best describes the security risk?

A.
The host-based security agent Is not running on all computers.
Answers
A.
The host-based security agent Is not running on all computers.
B.
A rogue access point Is allowing users to bypass controls.
Answers
B.
A rogue access point Is allowing users to bypass controls.
C.
Employees who have certain credentials are using a hidden SSID.
Answers
C.
Employees who have certain credentials are using a hidden SSID.
D.
A valid access point is being jammed to limit availability.
Answers
D.
A valid access point is being jammed to limit availability.
Suggested answer: B

Explanation:

The presence of another device providing internet access that bypasses the content filtering system indicates the existence of a rogue access point. Rogue access points are unauthorized devices that can create a backdoor into the network, allowing users to bypass security controls like content filtering. This presents a significant security risk as it can expose the network to unauthorized access and potential data breaches.

Reference =

CompTIA Security+ SY0-701 Course Content: Rogue access points are highlighted as a major security risk, allowing unauthorized access to the network and bypassing security measures.

asked 02/10/2024
Orenthial Johnson
31 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first