A user will be installing a switch in a public location and will allow the six users in the office to connect to it with CAT6 Ethernet. Which of the following actions would best ensure that there is no unauthorized access to the switch?
a. Disable new VLANS
b. Disable unused ports
c. Assign static IP addresses
d. Disable PoE
Answer: b. Disable unused ports
Computer Science & Information Technology
You might also like to view...
List five of the eight ways to minimize user action when keying in data.
What will be an ideal response?
Computer Science & Information Technology
The Table Style ________ group contains check boxes to select format actions
Fill in the blank(s) with correct word
Computer Science & Information Technology
What type of program is available to delete and overwrite data on a computer?
A) File-wiping software B) File-deleting software C) File-overwriting software D) All of the above
Computer Science & Information Technology
In a typical file processing system, each department or area within an organization has its own set of files.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology