Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

IIA Exam IIA-CIA-Part3 Topic 9 Question 94 Discussion

Actual exam question for IIA's IIA-CIA-Part3 exam
Question #: 94
Topic #: 9
[All IIA-CIA-Part3 Questions]

Which of the following would be the strongest control to prevent unauthorized wireless network access?

Show Suggested Answer Hide Answer
Suggested Answer: D

Contribute your Thoughts:

Jeannine
2 months ago
Logging access? Sounds like a lot of paperwork to me. I'm with option A - let's keep it simple and secure with a VPN.
upvoted 0 times
...
Christiane
2 months ago
I'm not sure, but I think tracking physical locations of devices could also be effective in preventing unauthorized access.
upvoted 0 times
...
Salina
2 months ago
Tracking all those mobile devices? That's a bit Big Brother-esque, don't you think? I'd rather keep my location private, thank you very much.
upvoted 0 times
Royce
1 months ago
D) Permitting only authorized IT personnel to have administrative control of mobile devices.
upvoted 0 times
...
Kallie
1 months ago
I agree, tracking locations seems invasive.
upvoted 0 times
...
Kathrine
1 months ago
C) Tracking all mobile device physical locations and banning access from non-designated areas.
upvoted 0 times
...
Soledad
1 months ago
C) Tracking all mobile device physical locations and banning access from non-designated areas.
upvoted 0 times
...
Edgar
1 months ago
B) Logging devices that access the network, including the date, time, and identity of the user.
upvoted 0 times
...
Sarina
1 months ago
B) Logging devices that access the network, including the date, time, and identity of the user.
upvoted 0 times
...
Tesha
2 months ago
A) Allowing access to the organization's network only through a virtual private network.
upvoted 0 times
...
Reyes
2 months ago
A) Allowing access to the organization's network only through a virtual private network.
upvoted 0 times
...
...
Erick
2 months ago
I agree with Kerry. Using a VPN adds an extra layer of security.
upvoted 0 times
...
Kerry
2 months ago
I think the strongest control would be A) Allowing access through a virtual private network.
upvoted 0 times
...
Paulina
2 months ago
A virtual private network is definitely the way to go. It's like a secret handshake for your network, you know? Keeps the riffraff out.
upvoted 0 times
Candra
1 months ago
D) Permitting only authorized IT personnel to have administrative control of mobile devices.
upvoted 0 times
...
Howard
2 months ago
B) Logging devices that access the network, including the date, time, and identity of the user.
upvoted 0 times
...
Dewitt
2 months ago
A) Allowing access to the organization's network only through a virtual private network.
upvoted 0 times
...
...

Save Cancel