Visitors to a company's facilities are connecting to the company's corporate network Wi-Fi and open network ports. Which of the following should the security engineer implement to prevent this unauthorized access?
NAC (Network Access Control) should be implemented to prevent unauthorized access.
NAC solutions help ensure that only authorized devices can connect to the corporate network, providing security by enforcing policies regarding device compliance and access control. This is essential for managing visitor access and maintaining the integrity of the corporate network.
A VPN (Virtual Private Network) primarily secures the data transmitted over the network by encrypting it, which is beneficial for protecting information in transit. However, it does not inherently control or restrict access to the network itself, meaning visitors could still connect to it without proper authorization.
WPA3 is a security protocol designed to enhance wireless network security and protect data transmitted over Wi-Fi. While it improves encryption and security measures for wireless communications, it does not address the issue of unauthorized devices connecting to the network, which NAC is specifically designed to manage.
NAC (Network Access Control) technologies enforce policies that ensure only compliant and authorized devices can access the network. By controlling who can connect to the corporate Wi-Fi and managing open network ports, NAC effectively mitigates the risk of unauthorized access by visitors.
HIDS (Host Intrusion Detection System) monitors and analyzes the internals of a computing system rather than the network. While it can detect and alert on suspicious activity within the system, it does not prevent unauthorized devices from connecting to the network, which is the primary concern in this scenario.
To prevent unauthorized access to a corporate network by visitors, implementing NAC is the most effective solution. NAC not only allows for strict control over which devices can connect but also ensures compliance with security policies, thereby safeguarding the network against potential threats posed by unapproved access. Other options, while beneficial in their own right, do not provide the necessary access control needed in this context.
Related Questions
View allA service provider wants a cost-effective way to rapidly expand from p...
A security officer observes that a software development team is not co...
A Chief Information Security Officer (CISO) determines that a major se...
An accounting employee recently used software that was not approved by...
A software engineer is downloading a third-party application from a pu...
Related Quizzes
View allCompTIA A Plus Certification Exam
CompTIA A Plus Exam Questions
CompTIA A Plus 1001 Exams Practice
CompTIA A Plus Practice Exam
CompTIA CySA+ Cybersecurity Analyst Certification all in One Exam Guide
CompTIA Network Plus Certification Exam Quiz
Free CompTIA Security Plus Practice Test
CompTIA Security Plus Simulation Questions
CompTIA Security Plus 501 Practice Questions
CompTIA Security Plus Example Questions
- ✓ 500+ Practice Questions
- ✓ Detailed Explanations
- ✓ Progress Analytics
- ✓ Exam Simulations