A company has recently allowed employees to use their personal devices at work to enhance satisfaction and productivity. Which of the following security measures should be applied to effectively enforce network segregation for these devices?
Disable all unused network ports within the organization.
Create a separate VLAN for personal devices used at work.
Implement time-based authentication for device access.
Implement a guest network for all personal devices.
Creating a separate VLAN for personal devices used at work is the most effective method for network segregation in this scenario. This setup segregates the network traffic of personal devices from the core corporate network, thereby minimizing the risk of a security breach into sensitive business resources. Guest networks, while also providing segregation, are more appropriate for temporary visitors rather than employees who need more consistent network access. Disabling unused ports enhances overall network security but does not contribute directly to the segregation of personal devices. Implementing time-based authentication adds a security layer but doesn't segregate network traffic.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a VLAN and why is it useful for network segregation?
Open an interactive chat with Bash
Why is a guest network not the best choice for personal devices used at work?
Open an interactive chat with Bash
How does disabling unused ports enhance security, and why is it insufficient for network segregation?