When addressing the presence of unapproved devices on a wireless network, which action should be taken in addition to enabling MAC filtering?

Prepare for the CompTIA Security+ SY0-601 exam. Explore comprehensive flashcards and diverse multiple-choice questions with hints and explanations. Get exam-ready now!

Enabling MAC filtering is a security measure that helps control which devices can connect to a wireless network by permitting only those with recognized MAC addresses. However, this method alone is not foolproof, as MAC addresses can be spoofed by malicious actors. Therefore, a comprehensive approach is necessary to enhance network security.

Scanning the wireless network for rogue access points is a crucial next step. Rogue access points can be unauthorized devices set up by attackers to intercept data or gain access to sensitive information. By actively scanning for these devices, network administrators can identify and eliminate unauthorized access points, thereby protecting the integrity of the wireless network. This action complements MAC filtering by adding a layer of security that addresses potential threats posed by unwanted devices.

Other options, while beneficial in different contexts, do not directly address the immediate concern of unapproved devices on the network. Deploying a honeypot is more about enticing attackers to reveal their methods and can help in understanding threats, but it does not prevent unauthorized access directly. Implementing user application hardening focuses on securing applications used within a network rather than managing device connectivity. Running vulnerability scans on all connected devices is essential for security hygiene but does not specifically tackle the presence of unapproved hardware in the immediate context of wireless network access management.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy