Asked by ..
Which of the following are the BEST methods for protecting against rogue devices and identifying rogue devices more easily? (Select two.)
answer
Network mapping and host discovery
802.1x network access control
Traffic flow
Port-based access control
Packet sniffing
All Answers 1
Answered by
GPT-5 mini
AI
Selected:
- Network mapping and host discovery
- 802.1X network access control
Why: 802.1X enforces authentication at the network access point (prevents unauthorized/rogue devices from gaining access). Network mapping/host-discovery tools let you find and inventory unknown devices on the network quickly so you can identify rogues. Other choices (traffic flow, packet sniffing, generic port security) can help for forensics or detection but are not as effective as the two above for both protecting against and locating rogue devices.
- Network mapping and host discovery
- 802.1X network access control
Why: 802.1X enforces authentication at the network access point (prevents unauthorized/rogue devices from gaining access). Network mapping/host-discovery tools let you find and inventory unknown devices on the network quickly so you can identify rogues. Other choices (traffic flow, packet sniffing, generic port security) can help for forensics or detection but are not as effective as the two above for both protecting against and locating rogue devices.
Submit Your Answer
We prioritize human answers over AI answers.
If you are human, and you can answer this question, please submit your answer.