A user will be installing a switch in a public location and will allow the six users in the office to connect to it with CAT6 Ethernet. Which of the following actions would best ensure that there is no unauthorized access to the switch?

a. Disable new VLANS
b. Disable unused ports
c. Assign static IP addresses
d. Disable PoE


Answer: b. Disable unused ports

Computer Science & Information Technology

You might also like to view...

List five of the eight ways to minimize user action when keying in data.

What will be an ideal response?

Computer Science & Information Technology

The Table Style ________ group contains check boxes to select format actions

Fill in the blank(s) with correct word

Computer Science & Information Technology

What type of program is available to delete and overwrite data on a computer?

A) File-wiping software B) File-deleting software C) File-overwriting software D) All of the above

Computer Science & Information Technology

In a typical file processing system, each department or area within an organization has its own set of files.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology