138k views
3 votes
The security team at a multinational cloud services company is working on their port security. they implemented basic media access control (mac) address filtering on all switch ports, but they have concerns about the risk of mac spoofing and the management overhead of maintaining a list of valid mac addresses. to address these concerns, they now require strong authentication before a user can obtain full network access. which of the following measures should the team implement next?

a) Implement EAP and RADIUS.
b) Deploy Intrusion Detection System (IDS)
c) Enable Virtual LANs (VLANs)
d) Implement Port Security Policies

1 Answer

1 vote

Final answer:

To address MAC spoofing and management overhead, the security team should implement a) Implement EAP and RADIUS for stronger authentication before granting full network access. EAP provides an authentication framework that, together with a RADIUS server, ensures only authorized users can access the network and minimizes the risk associated with MAC spoofing.

Step-by-step explanation:

The security team at a multinational cloud services company has implemented basic MAC address filtering to enhance port security, but they are concerned about the risk of MAC spoofing and the overhead of managing a MAC address list. To mitigate these concerns, they are considering stronger authentication measures for users to obtain full network access. The measure they should implement next is a) Implement EAP and RADIUS. Extensible Authentication Protocol (EAP) is an authentication framework frequently used in network and internet connections. It works with mechanisms such as RADIUS to provide a robust method of handling the authentication of users on a network.

Implementing EAP in conjunction with a RADIUS server will provide a centralized authentication service. Users must authenticate with the RADIUS server using credentials like a username and password, smart cards, or certificates before they can access the network. This setup enhances security by ensuring that only authorized users can access network resources and reduces the risk of illicit access through MAC address spoofing.

While an Intrusion Detection System (IDS) can monitor for suspicious activities and Virtual LANs (VLANs) can segment network traffic to enhance security, neither directly address the need for stronger authentication like EAP with RADIUS. Port Security Policies can complement this approach by defining what devices are allowed to connect to what ports, but they do not offer authentication services on their own.

User Croigsalvador
by
8.7k points