Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam CISSP All Questions

View all questions & answers for the CISSP exam

Exam CISSP topic 1 question 418 discussion

Actual exam question from ISC's CISSP
Question #: 418
Topic #: 1
[All CISSP Questions]

An organization is looking to improve threat detection on their wireless network. The company goal is to automate alerts to improve response efforts. Which of the following best practices should be implemented FIRST?

  • A. Deploy a standalone guest Wi-Fi network.
  • B. Implement multi-factor authentication (MFA) on all domain accounts.
  • C. Deploy a wireless intrusion detection system (IDS).
  • D. Implement 802.1x authentication.
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
l00t
Highly Voted 1 year, 9 months ago
Selected Answer: C
The best practice that should be implemented first to improve threat detection on the wireless network is C. Deploy a wireless intrusion detection system (IDS). A wireless IDS can monitor the network traffic and alert the administrator of any suspicious or malicious activity, such as unauthorized access, denial-of-service attacks, or rogue access points. A wireless IDS can also help automate the response efforts by blocking or isolating the attackers. The other options are also important for wireless network security, but they are not directly related to threat detection.
upvoted 10 times
jackdryan
1 year, 6 months ago
C is correct
upvoted 1 times
...
...
iwannapass
Highly Voted 1 year, 9 months ago
Selected Answer: C
IDS detect and send alerts
upvoted 6 times
...
8e1c45b
Most Recent 3 months, 3 weeks ago
Selected Answer: D
802.1x is for both wired and wireless. D is correct
upvoted 1 times
...
CCNPWILL
5 months, 3 weeks ago
Selected Answer: D
Have to go with D. It sounds misleading. But we do need 802.1x first for NAC before implementing IDS solutions. its more organized that way and locks down the network in proper order.
upvoted 1 times
...
ilan0000
12 months ago
Selected Answer: D
D is correct: CBK Reference, 6th Edition, p. 324. EAP should be done first.
upvoted 1 times
...
HughJassole
1 year, 5 months ago
The question is asking for what should be done first. They talk about detecting intrusions to lead you to the wrong answer. First is 802.1X, then the IPS. "802.1X authentication involves making sure something interfacing with the system is actually what it claims it is." https://www.fortinet.com/resources/cyberglossary/802-1x-authentication
upvoted 3 times
...
[Removed]
1 year, 7 months ago
Selected Answer: D
CISSP likes 802.1x authentication very much and names it often in the context of Wifi and unauthorized access.
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...