Which of the following should Sara, a technician, apply to prevent guests from plugging in their laptops and accessing the company network?

A. Secure router configuration
B. Port security
C. Sniffers
D. Implicit deny


Answer: B. Port security

Computer Science & Information Technology

You might also like to view...

An aggregation relationship is usually represented as __________ in ___________.

a. a data field/the aggregating class b. a data field/the aggregated class c. a method/the aggregating class d. a method/the aggregated class

Computer Science & Information Technology

Describe the differences between a call to an inline function member and a function that is not declared inline.. What advantages are there to inline? What disadvantages?

What will be an ideal response?

Computer Science & Information Technology

What is the default PowerShell execution policy?

A. user policy B. administrator policy C. management policy D. restricted policy

Computer Science & Information Technology

Answer the following statement(s) true (T) or false (F)

By default, Active Directory is configured to use the Kerberos protocol, but can be configured to use LDAP or a combination of LDAP and Kerberos.

Computer Science & Information Technology