Securing Network Access for VoIP Phones and Computers

Preventing Unauthorized Devices from Connecting to the Company Network

Prev Question Next Question

Question

A network administrator wants to ensure that users do not connect any unauthorized devices to the company network.

Each desk needs to connect a VoIP phone and computer.

Which of the following is the BEST way to accomplish this?

Answers

Explanations

Click on the arrows to vote for the correct answer

A. B. C. D.

A.

The best way to ensure that users do not connect unauthorized devices to a company network while allowing each desk to connect a VoIP phone and computer is to configure the phones on one VLAN, and computers on another (option B). This solution provides logical separation between the two types of devices, ensuring that only authorized devices are connected to the network and preventing unauthorized access or data leakage.

Option A, enforcing authentication for network devices, would only authenticate users connecting to the network and not the devices they are connecting. While authentication is important for securing network access, it does not address the issue of unauthorized devices being connected.

Option C, enabling and configuring port channels, is a method of bundling multiple physical connections into a logical connection to increase bandwidth and redundancy. While this can be useful for network performance and availability, it does not address the issue of unauthorized devices being connected.

Option D, making users sign an acceptable use agreement, is an important security practice, but it does not prevent unauthorized devices from being connected to the network. An acceptable use agreement outlines the terms and conditions for using the network and the consequences for violating those terms.

In summary, configuring phones on one VLAN and computers on another is the best way to ensure that users do not connect unauthorized devices to the company network while allowing each desk to connect a VoIP phone and computer. This solution provides logical separation between the two types of devices, ensuring that only authorized devices are connected to the network and preventing unauthorized access or data leakage.