What should a security administrator do upon discovering unknown devices connected to a company's wireless network?

Prepare for the CompTIA Security+ SY0-601 exam. Explore comprehensive flashcards and diverse multiple-choice questions with hints and explanations. Get exam-ready now!

Enabling MAC filtering on the switches is one potential method for managing unknown devices connected to a company's wireless network. This approach allows the security administrator to define which devices are permitted to connect to the network based on their Media Access Control (MAC) addresses. By doing so, it can help in restricting access to only trusted devices, essentially blocking unknown or rogue devices from utilizing network resources.

However, while MAC filtering can be a useful layer of security, it is important to note that it has its limitations, such as being susceptible to MAC address spoofing, where an attacker can mimic the MAC address of an approved device. Therefore, it should be used in conjunction with other security measures.

Scanning the network for rogue access points addresses the immediate concern of unauthorized connections by identifying any potentially malicious devices that could intercept or manipulate data on the network. Deploying multifactor authentication strengthens access security further by requiring multiple forms of verification before granting network access, which is important but does not directly resolve the issue of unknown devices already connected. Running a vulnerability scan on all devices is also valuable for identifying potential security weaknesses but may not address the more pressing concern of how unknown devices gained initial access to the network.

In summary, enabling MAC filtering can be an initial step to mitigate

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy