Which of the following controls would allow a company to reduce the exposure of sensitive systems from unmanaged devices on internal networks?

Which of the following controls would allow a company to reduce the exposure of sensitive
systems from unmanaged devices on internal networks?

Which of the following controls would allow a company to reduce the exposure of sensitive
systems from unmanaged devices on internal networks?

A.
802.1x

B.
Data encryption

C.
Password strength

D.
BGP



Leave a Reply to Berto Cancel reply7

Your email address will not be published. Required fields are marked *

twenty − eight =


Vern Moore

Vern Moore

What would be an example of an “UNMANAGED” device?

Corrector

Corrector

e.g. BYOD (i.e. employees’ mobile phones, tablets, etc.)

Berto

Berto

It could be something like a lawyer 2 switch or a hubs

Tony

Tony

I think you are thinking of a different kind of unmanaged. Unmanaged in this sense is any device on the network that the admins don’t control. This could be guest laptops, or staff BYOD, or improperly deployed equipment, or even equipment that has been compromised and is no longer under their control (eg a staff member reinstalled OS on a work computer).

PeddyBro

PeddyBro

Or a rouge Laptop, any device foreign to the network

Nathan

Nathan

Best advice I’ve seen for these tests so far has come from the “Get Certified Get Ahead CompTIA Security+ SY0-401 Study Guide”, written by Darril Gibson. He states that CompTIA for the most part asks straight forward questions…unlike some other certification exams that try to word screw you. Don’t get creative on these question…the most likely answer will more than likely be the correct one.