Implementing Security Measures for BYOD Policy: Duplicate IP Addresses and Rogue Network Devices | Exam CAS-003: CompTIA CASP+

Remediation Steps for BYOD Security Challenges | CompTIA CAS-003 Exam

Question

After embracing a BYOD policy, a company is faced with new security challenges from unmanaged mobile devices and laptops.

The company's IT department has seen a large number of the following incidents: -> Duplicate IP addresses -> Rogue network devices -> Infected systems probing the company's network Which of the following should be implemented to remediate the above issues? (Choose two.)

Answers

Explanations

Click on the arrows to vote for the correct answer

A. B. C. D. E.

BC.

The company is facing security challenges due to the adoption of a BYOD policy, which has led to an increase in unmanaged mobile devices and laptops accessing the company's network. The IT department has noticed a significant number of incidents involving duplicate IP addresses, rogue network devices, and infected systems probing the network. To remediate these issues, the company should consider implementing two of the following options:

  1. Network Access Control (NAC): NAC is a security solution that restricts access to the network based on the identity and security posture of the device attempting to connect. NAC helps prevent unauthorized access to the network, which can help reduce the likelihood of duplicate IP addresses and rogue network devices. It also helps enforce security policies and can detect and quarantine infected systems trying to connect to the network.

  2. Host Intrusion Prevention System (HIPS): HIPS is a security solution that monitors and analyzes system behavior to detect and prevent malicious activity. HIPS can help protect against infected systems probing the network by detecting and blocking suspicious activity in real-time. It can also help prevent the spread of malware by isolating infected systems from the rest of the network.

The other options, Port Security, Route Protection, and Network Intrusion Detection System (NIDS), are also important security measures, but they may not be as effective in remedying the issues described in the question.

Port Security limits the number of devices that can connect to a switch port by configuring it to allow only specific MAC addresses. This can help prevent rogue devices from connecting to the network but may not be effective in preventing duplicate IP addresses or infected systems.

Route Protection is used to protect against attacks that exploit the routing protocol. It can help protect against routing-related attacks but may not be as relevant to the issues described in the question.

Network Intrusion Detection System (NIDS) is a security solution that monitors network traffic for signs of malicious activity. It can help detect infected systems and rogue devices but may not be as effective in preventing duplicate IP addresses.