A company has recently allowed employees to use their personal devices at work to enhance satisfaction and productivity. Which of the following security measures should be applied to effectively enforce network segregation for these devices?
You selected this option
Create a separate VLAN for personal devices used at work.
You selected this option
Implement time-based authentication for device access.
You selected this option
Disable all unused network ports within the organization.
You selected this option
Implement a guest network for all personal devices.
Creating a separate VLAN for personal devices used at work is the most effective method for network segregation in this scenario. This setup segregates the network traffic of personal devices from the core corporate network, thereby minimizing the risk of a security breach into sensitive business resources. Guest networks, while also providing segregation, are more appropriate for temporary visitors rather than employees who need more consistent network access. Disabling unused ports enhances overall network security but does not contribute directly to the segregation of personal devices. Implementing time-based authentication adds a security layer but doesn't segregate network traffic.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a VLAN and how does it work?
Open an interactive chat with Bash
How does network segregation improve security?
Open an interactive chat with Bash
What are the differences between a guest network and a VLAN?