A threat intelligence team discovered an unauthorized device gaining entry to a protected segment without a challenge. Logs show that this device bypassed policy-based checks, indicating no authentication request was triggered on the switch. Which solution best addresses the cause of the unauthorized entry?
Rotate and reissue the internal certificate authority credentials
Implement anomaly detection on the router that connects external traffic
Enable extended authentication negotiations on the trunk interface to enforce credential checks
Apply domain blocking rules through authoritative DNS filtering
When a switch is not configured to pass extended authentication messages over its interfaces, devices can join the network without being prompted for credentials. Adjusting the trunk interface so it supports 802.1X or other port-based authentication ensures request and response traffic is not dropped. Enabling DNS filtering, reissuing certificates, or monitoring suspicious activity at the edge do not fix the underlying data-link problem that permits access without authentication.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is 802.1X authentication?
Open an interactive chat with Bash
Why is trunk interface configuration important for authentication?
Open an interactive chat with Bash
What are the limitations of DNS filtering for unauthorized access prevention?