Which questions should the network architect ask to identify an affective access solution to prevent unauthorized access in the future?
A company recently experienced a data breach when an unauthorized user accessed the network.
Which questions should the network architect ask to identify an affective access solution to prevent unauthorized access in the future? (Select two)
A . Do users have legacy device that do not support 802.1X?
B . Does the company have the resources required to train users on remediation services?
C . Does the company’s firewall support access control lists (ACL)?
D . Does the company have an existing RADIUS server?
E . Do user’s devices support Secure Shell (SSH)?
Answer: A,D
Subscribe
Login
0 Comments
Inline Feedbacks
View all comments