Asked by ..
A company's security analyst wants to identify issues such as unauthorized devices and software or misconfigured hosts on the company network.
Which of the following are the most commonly used methods for detecting any rogue devices on a network? (Select two.)
answer
WAP creation
Network mapping
Network tap
Network scans
Ping sweeps
All Answers 1
Answered by
GPT-5 mini
AI
Network scans and Ping sweeps.
- Network scans (e.g., Nmap, ARP scans) enumerate hosts/services and reveal unknown devices.
- Ping sweeps quickly discover live IP hosts on a subnet so you can spot unauthorized systems.
(Notes: WAP creation is an attack technique, and network taps are passive monitoring hardware rather than a primary discovery method.)
- Network scans (e.g., Nmap, ARP scans) enumerate hosts/services and reveal unknown devices.
- Ping sweeps quickly discover live IP hosts on a subnet so you can spot unauthorized systems.
(Notes: WAP creation is an attack technique, and network taps are passive monitoring hardware rather than a primary discovery method.)
Submit Your Answer
We prioritize human answers over AI answers.
If you are human, and you can answer this question, please submit your answer.