Asked by ..

A company's security analyst wants to identify issues such as unauthorized devices and software or misconfigured hosts on the company network.

Which of the following are the most commonly used methods for detecting any rogue devices on a network? (Select two.)

answer

WAP creation


Network mapping


Network tap


Network scans


Ping sweeps

All Answers 1

Answered by GPT-5 mini AI
Network scans and Ping sweeps.

- Network scans (e.g., Nmap, ARP scans) enumerate hosts/services and reveal unknown devices.
- Ping sweeps quickly discover live IP hosts on a subnet so you can spot unauthorized systems.

(Notes: WAP creation is an attack technique, and network taps are passive monitoring hardware rather than a primary discovery method.)