A network administrator decides to secure their small network by allowing only specific MAC addresses to gain access to the network from specific switches. Which of the following is described by this example?

A. Packet filtering
B. Hardware firewalls
C. Port security
D. Stateful inspection


Answer: C. Port security

Computer Science & Information Technology

You might also like to view...

Which of these is the correct class de¯nition for a Teacher class?

a. public CLASS Teacher b. public class Teacher c. public class TEACHER d. public class Teacher [] e. public class Teacher extends Object, Person

Computer Science & Information Technology

You can modify CSS code directly in the editing window; however, a safer way to change CSS properties quickly while in Code view is to use the HTML text panel.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Which of the following options for the gpg command will attempt to use the gpg agent and if it cannot will ask for a passphrase?

A. --gpg-agent B. --use-agent C. --agent D. --try-agent

Computer Science & Information Technology

When you are working on a group paper with your classmates, members can take turns to write and edit the content of the paper. Which feature must the group use so that members can see the changes made to the same document?

What will be an ideal response?

Computer Science & Information Technology