A core router was manipulated by a credentialed bypass to send all network traffic through a secondary router under the control of an unauthorized user connected to the network by WiFi.
Which of the following would BEST reduce the risk of this attack type occurring?
A . Implement a strong, complex password policy for user accounts that have access to the core router.
B . Deploy 802.1X as the NAC system for the WiFi infrastructure.
C . Add additional port security settings for the switching environment connected to the core router.
D . Allow access to the core router management interface only through an out-of-band channel.
Answer: A
Latest CAS-003 Dumps Valid Version with 509 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund