Which of the following should Sara, a technician, apply to prevent guests from plugging in their laptops and accessing the company network?
A. Secure router configuration
B. Port security
C. Sniffers
D. Implicit deny
Answer: B. Port security
You might also like to view...
An aggregation relationship is usually represented as __________ in ___________.
a. a data field/the aggregating class b. a data field/the aggregated class c. a method/the aggregating class d. a method/the aggregated class
Describe the differences between a call to an inline function member and a function that is not declared inline.. What advantages are there to inline? What disadvantages?
What will be an ideal response?
What is the default PowerShell execution policy?
A. user policy B. administrator policy C. management policy D. restricted policy
Answer the following statement(s) true (T) or false (F)
By default, Active Directory is configured to use the Kerberos protocol, but can be configured to use LDAP or a combination of LDAP and Kerberos.