A security analyst finds a rogue device during a monthly audit of current endpoint assets that are connected to the network. The corporate network utilizes 802.1 X for access control. To be allowed on the network, a device must have a known hardware address, and a valid username and password must be entered in a captive portal. The following is the audit report:
Which of the following is the most likely way a rogue device was allowed to connect?
shady23
1 year, 3 months agoMortG7
1 year, 3 months ago7308365
1 year, 5 months agojohnabayot
1 year, 6 months agolicks0re
1 year, 6 months agoDapsie
1 year, 1 month agoSecurityguy42
1 year, 6 months agoHs1208
1 year, 6 months ago