Which of the following is a recommended switch security best practice?


Answer: Disable All Unused Ports

Computer Science & Information Technology

You might also like to view...

The CPU includes

A) the arithmetic and logic unit (ALU) and the control unit. B) the ALU and the I/O unit. C) the I/O unit and the control unit. D) the ALU and the main memory unit. E) all of the above.

Computer Science & Information Technology

After the initial data entry process, emphasis often shifts to the ____ because it most clearly identifies the dependencies between the tasks, as well as the critical path.

A. Gantt chart B. entry table C. network diagram D. calendar

Computer Science & Information Technology

In an index entry field, a ________ separates the main entry from the subentry

A) comma B) colon C) semicolon D) period

Computer Science & Information Technology

After typing a URL in the Address bar, press the Go button to open the Web site. 

Answer the following statement true (T) or false (F)

Computer Science & Information Technology