Valid Network-and-Security-Foundation Dumps shared by ExamDiscuss.com for Helping Passing Network-and-Security-Foundation Exam! ExamDiscuss.com now offer the newest Network-and-Security-Foundation exam dumps, the ExamDiscuss.com Network-and-Security-Foundation exam questions have been updated and answers have been corrected get the newest ExamDiscuss.com Network-and-Security-Foundation dumps with Test Engine here:
A company is specifically worried about rogue access points. Which strategy should be used as a mitigation against this type of attack?
Correct Answer: C
Configuring switch port tracinghelps detect unauthorized devices, such as rogue access points, that are connected to the network. Network administrators can useport securityandintrusion detection systems (IDS) to monitor and block unauthorized access points. * Decreasing wireless rangemay limit exposure but does not actively detect rogue APs. * Disabling unnecessary servicesimproves security but does not prevent rogue APs. * Monitoring traffic patternshelps detect anomalies but does not directly stop rogue APs.