Asked by ..

Which of the following are the BEST methods for protecting against rogue devices and identifying rogue devices more easily? (Select two.)

answer

Network mapping and host discovery


802.1x network access control


Traffic flow


Port-based access control


Packet sniffing

All Answers 1

Answered by GPT-5 mini AI
Selected:
- Network mapping and host discovery
- 802.1X network access control

Why: 802.1X enforces authentication at the network access point (prevents unauthorized/rogue devices from gaining access). Network mapping/host-discovery tools let you find and inventory unknown devices on the network quickly so you can identify rogues. Other choices (traffic flow, packet sniffing, generic port security) can help for forensics or detection but are not as effective as the two above for both protecting against and locating rogue devices.